Skip to content
Snippets Groups Projects
  1. Mar 22, 2013
  2. Mar 19, 2013
    • rpcraig's avatar
      watchdog security policy. · bac9992e
      rpcraig authored
      
      Initial policy for software watchdog daemon
      which is started by init.
      
      Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      bac9992e
    • William Roberts's avatar
      Do not allow access to device:chr_file for system · 6a64897a
      William Roberts authored
      Also labels /dev/mpu and /dev/mpuirq as gps device.
      mpu is motion processing unit and is resposible for
      gyroscope functionality.
      
      Change-Id: If7f1a5752c550b72fac681566e1052f09e139ff0
      6a64897a
    • rpcraig's avatar
      App data backup security policy. · 1c8464e1
      rpcraig authored
      
      Policy covers:
      
       * backup_data_file type for labeling all
         files/dirs under /data dealing with
         backup mechanism.
      
       * cache_backup_file type for labeling all
         files/dirs under /cache dealing with
         backup mechanism. This also covers the
         the use of LocalTransport for local archive
         and restore testing.
      
       * the use of 'adb shell bmgr' to initiate
         backup mechanism from shell.
      
       * the use of 'adb backup/restore' to archive
         and restore the device's data.
      
      Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      1c8464e1
  3. Jan 11, 2013
    • Stephen Smalley's avatar
      Fix invalid specification for adb_keys. · 58b0fb6d
      Stephen Smalley authored
      
      A prior change added an entry for adb_keys without any security context,
      yielding warnings like the following during build:
      out/target/product/manta/root/file_contexts:  line 7 is missing fields, skipping
      
      This adds the missing security context field.
      
      Change-Id: If48731c8aa7d22a3f547d0854f288ff68f9006da
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      58b0fb6d
  4. Dec 21, 2012
    • Colin Cross's avatar
      add file_contexts entries for root filesystem · 92b9aa0e
      Colin Cross authored
      It may be useful to generate an ext4 image of the root filesystem
      instead of using a ramdisk.  Whitelist entries in file_contexts to
      support selinux labeling a root filesystem image.
      
      Change-Id: I91a38d0aee4408c46cbfe5dc5e6eda198572e90f
      92b9aa0e
  5. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  6. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  7. Oct 22, 2012
  8. Oct 17, 2012
  9. Sep 20, 2012
  10. Aug 24, 2012
  11. Aug 20, 2012
    • rpcraig's avatar
      Add ppp/mtp policy. · d49f7e6e
      rpcraig authored
      Initial policy for Point-to-Point tunneling and
      tunneling manager services.
      d49f7e6e
  12. Aug 15, 2012
  13. Jul 30, 2012
  14. Jul 19, 2012
    • hqjiang's avatar
      Target the denials/policies over qtaguid file and device: 1. Relabel... · 4c06d273
      hqjiang authored
      Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
      
      Actually, some of policies related to qtaguid have been there already, but
      we refind existing ones and add new ones.
      4c06d273
    • hqjiang's avatar
      allow camera calibration · 20d6963a
      hqjiang authored
      20d6963a
  15. Jul 12, 2012
  16. Jun 20, 2012
  17. May 31, 2012
  18. Apr 03, 2012
  19. Mar 19, 2012
  20. Mar 07, 2012
  21. Jan 06, 2012
  22. Jan 04, 2012
Loading