- Dec 12, 2016
-
-
Jerry Zhang authored
Also move necessary priv_app permissions into MediaProvider domain and remove MediaProvider specific permissions from priv_app. The new MtpServer permissions fix the following denials: avc: denied { write } for comm=6D747020666673206F70656E name="ep0" dev="functionfs" ino=12326 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:functionfs:s0 tclass=file permissive=1 denial from setting property sys.usb.ffs.mtp.ready, context priv_app Bug: 30976142 Test: Manual, verify permissions are allowed Change-Id: I4e66c5a8b36be21cdb726b5d00c1ec99c54a4aa4
-
- Oct 06, 2016
-
-
dcashman authored
Divide policy into public and private components. This is the first step in splitting the policy creation for platform and non-platform policies. The policy in the public directory will be exported for use in non-platform policy creation. Backwards compatibility with it will be achieved by converting the exported policy into attribute-based policy when included as part of the non-platform policy and a mapping file will be maintained to be included with the platform policy that maps exported attributes of previous versions to the current platform version. Eventually we would like to create a clear interface between the platform and non-platform device components so that the exported policy, and the need for attributes is minimal. For now, almost all types and avrules are left in public. Test: Tested by building policy and running on device. Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
-
- Sep 01, 2015
-
-
Robert Craig authored
All non matching apps will simply receive the seinfo label of "default" implicitly. No need to further clarify things anymore with an explicit default stanza. Change-Id: Ib7b01ee004775f24db9a69340a31784b967ce030 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Apr 04, 2014
-
-
Stephen Smalley authored
This change folds the shared_app, media_app, and release_app domains into untrusted_app, reducing the set of app domains down to just distinct domains for the fixed UID apps (e.g. system_app, bluetooth, nfc, radio), a single domain for apps signed by the platform key (platform_app), and a single domain for all other apps (untrusted_app). Thus, SELinux only distinguishes when already distinguished by a predefined Android ID (AID) or by the platform certificate (which get the signature-only Android permissions and thus may require special OS-level accesses). It is still possible to introduce specific app domains for specific apps by adding signer and package stanzas to mac_permissions.xml, but this can be done on an as-needed basis for specialized apps that require particular OS-level permissions outside the usual set. As there is now only a single platform app domains, get rid of the platformappdomain attribute and platform_app_domain() macro. We used to add mlstrustedsubject to those domains but drop this since we are not using MLS in AOSP presently; we can revisit which domains need it if/when we use MLS. Since we are dropping the shared, media, and release seinfo entries from seapp_contexts, drop them from mac_permissions.xml as well. However, we leave the keys.conf entries in case someone wants to add a signer entry in the future for specific apps signed by those keys to mac_permissions.xml. Change-Id: I877192cca07360c4a3c0ef475f016cc273e1d968 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 12, 2014
-
-
Stephen Smalley authored
Copied from our tree, adjusted to note relationship to keys.conf and to be consistent with the AOSP implementation. Change-Id: I09ba86d4c9a1b11a8865890e11283456ea2ffbcf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 28, 2013
-
-
Robert Craig authored
A prior merge accidentally dropped the seinfo tag from the release keys stanza. Change-Id: I99f9ea8d0981c5324c3875896b0673552a03d2ca Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Geremy Condra authored
This reverts commit 31d1a40b Change-Id: I70aab6f01b9a74512dcbd9bff167890747e54355
-
- Mar 26, 2013
-
-
Geremy Condra authored
This reverts commit 60d4d71e This should (finally) be fixed in https://android-review.googlesource.com/#/c/54730/ Change-Id: I3dd358560f7236f28387ffbe247fc2b004e303ea
-
Geremy Condra authored
This reverts commit cd4104e8 This builds clean locally, but seems to explode on the build servers. Reverting until there's a solution. Change-Id: I09200db37c193f39c77486d5957a8f5916e38aa0
-
Geremy Condra authored
This reverts commit b24c30b4 Reverting the changes that depend on insertkeys until the issues there are resolved. Change-Id: Ie7e0d6657d8e7cfb44fc3efa2f99c8d1011a0fe1
-
Robert Craig authored
Rewrite all stanzas to only include seinfo tags. Change-Id: I4d528ce092ec8d1aac15195ed3a8e307d604607e Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Geremy Condra authored
This reverts commit 1446e714 Hidden dependency has been resolved. Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
-
- Mar 19, 2013
-
-
Geremy Condra authored
This reverts commit 22fc0410 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
-
Geremy Condra authored
This reverts commit 22fc0410 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
-
- Dec 08, 2012
-
-
William Roberts authored
Support the inseretion of the public key from pem files into the mac_permissions.xml file at build time. Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
-
- Jul 30, 2012
-
-
rpcraig authored
This was moved from external/mac-policy.git
-