- May 15, 2013
-
-
repo sync authored
Bug: 4070557 Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
-
- May 08, 2013
-
-
repo sync authored
Change-Id: I91f6965dafad54e98e2f7deda956e86acf7d0c96
-
- Apr 05, 2013
-
-
Geremy Condra authored
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
-
Robert Craig authored
/data/app-private is used when making an app purchase or forward locking. Provide a new label for the directory as well as the tmp files that appear under it. Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 29, 2013
-
-
Geremy Condra authored
This feels like a hidden bug- it shouldn't be trying to stat everything under /cache anyways- but allowing for now. Change-Id: Ib5ddfbb408c9f0b6c6218c78a678fcdb09360ccd
-
- Mar 28, 2013
-
-
Stephen Smalley authored
Change-Id: Ib37b392cb6f6d3fb80852b9a2a6547ab86cd9bff Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Just allow them unconditionally for compatibility. Change-Id: I85b56532c6389bdfa25731042b98d8f254bd80ee Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 27, 2013
-
-
Geremy Condra authored
This reverts commit ba84bf1d Hidden dependency resolved. Change-Id: I9f0844f643abfda8405db2c722a36c847882c392
-
- Mar 23, 2013
-
-
Robert Craig authored
Initial policy for racoon (IKE key management). Signed-off-by:
Robert Craig <rpcraig@tycho.ncsc.mil> Change-Id: If1e344f39ea914e42afbaa021b272ba1b7113479
-
- Mar 22, 2013
-
-
Geremy Condra authored
This reverts commit 8a814a76 Change-Id: Id1497cc42d07ee7ff2ca44ae4042fc9f2efc9aad
-
Stephen Smalley authored
Change-Id: I5a3584b6cc5eda2b7d82e85452f9fe457877f1d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
Two new types are introduced: sdcard_internal sdcard_external The existing type of sdcard, is dropped and a new attribute sdcard_type is introduced. The boolean app_sdcard_rw has also been changed to allow for controlling untrusted_app domain to use the internal and external sdcards. Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
-
- Mar 19, 2013
-
-
Stephen Smalley authored
The binder_transfer_binder hook was changed in the kernel, obsoleting the receive permission and changing the target of the transfer permission. Update the binder-related policy to match the revised permission checking. Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Iad4ad43ce7ba3c00b69b7aac752b40bc2d3be002 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
rpcraig authored
Policy covers: * backup_data_file type for labeling all files/dirs under /data dealing with backup mechanism. * cache_backup_file type for labeling all files/dirs under /cache dealing with backup mechanism. This also covers the the use of LocalTransport for local archive and restore testing. * the use of 'adb shell bmgr' to initiate backup mechanism from shell. * the use of 'adb backup/restore' to archive and restore the device's data. Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Dec 05, 2012
-
-
rpcraig authored
Generic init.rc allows any process to use socket tagging. Adjust app policy to ensure that any app can read from the misc device. Change-Id: I4076f0fbc1795f57a4227492f6bfc39a4398ffa5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Oct 22, 2012
-
-
rpcraig authored
Creates 2 new types: - asec_apk_file : files found under /mnt/asec when the asec images are mounted - asec_image_file : the actual encrypted apks under /data/app-asec Change-Id: I963472add1980ac068d3a6d36a24f27233022832 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Oct 16, 2012
-
-
Joshua Brindle authored
- allow all apps to connect to the keystore over unix socket - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files - mtp connects to dnsproxyd when a pptp vpn connection is established - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device - WifiWatchDog uses packet_socket when wifi comes up - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949 Signed-off-by:
Joshua Brindle <jbrindle@tresys.com>
-
- Sep 20, 2012
-
-
Stephen Smalley authored
Used when an app service is declared with android:isolatedProcess="true". Place such processes in a separate domain, and further isolate them from each other via categories. Change-Id: I1d64f8278f0619eedb448f9a741f1d2c31985325 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Aug 10, 2012
-
-
rpcraig authored
-
- Jul 30, 2012
-
-
Haiqing Jiang authored
-
Stephen Smalley authored
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-
- Jul 27, 2012
-
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-
Stephen Smalley authored
Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. Platform (any of the apps signed by build keys, i.e. platform|release|shared|media) apps expect to be able to share files with each other or with third party apps by passing open files or pathnames over Binder. Therefore, we switch to only enforcing the per-app process and file isolation via SELinux on third party apps, not platform apps. Make the platform app domains mlstrustedsubjects so that they can access any files created by third party apps. Introduce a new platform_app_data_file type for platform apps so that we can mark it as a mlstrustedobject and allow third party apps to read/write files created by the platform apps. Specify this new type for the platform app entries in seapp_contexts. Remove levelFromUid=true for the platform apps in seapp_contexts since we are no longer enforcing per-app separation among them.
-
- Jul 19, 2012
-
-
hqjiang authored
Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. Actually, some of policies related to qtaguid have been there already, but we refind existing ones and add new ones.
-
- Jul 12, 2012
-
-
Stephen Smalley authored
-
Michal Mašek authored
-
- Jun 28, 2012
-
-
William Roberts authored
-
Stephen Smalley authored
-
- Jun 27, 2012
-
-
Stephen Smalley authored
-
- Apr 04, 2012
-
-
Stephen Smalley authored
-