Skip to content
Snippets Groups Projects
  1. Mar 19, 2013
  2. Feb 19, 2013
  3. Jan 11, 2013
    • Stephen Smalley's avatar
      Fix invalid specification for adb_keys. · 58b0fb6d
      Stephen Smalley authored
      
      A prior change added an entry for adb_keys without any security context,
      yielding warnings like the following during build:
      out/target/product/manta/root/file_contexts:  line 7 is missing fields, skipping
      
      This adds the missing security context field.
      
      Change-Id: If48731c8aa7d22a3f547d0854f288ff68f9006da
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      58b0fb6d
  4. Dec 21, 2012
    • Colin Cross's avatar
      add file_contexts entries for root filesystem · 92b9aa0e
      Colin Cross authored
      It may be useful to generate an ext4 image of the root filesystem
      instead of using a ramdisk.  Whitelist entries in file_contexts to
      support selinux labeling a root filesystem image.
      
      Change-Id: I91a38d0aee4408c46cbfe5dc5e6eda198572e90f
      92b9aa0e
  5. Nov 28, 2012
  6. Nov 27, 2012
  7. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  8. Nov 01, 2012
  9. Oct 31, 2012
  10. Oct 30, 2012
  11. Oct 29, 2012
  12. Oct 26, 2012
    • rpcraig's avatar
      Add better per-device sepolicy support. · 47cd396b
      rpcraig authored
      
      This is a rewrite of the existing implementation.
      Three new variables are now needed to add/modify
      the exisitng base policy. They are, BOARD_SEPOLICY_REPLACE
      and BOARD_SEPOLICY_UNION which govern what files
      are replaced and concatenated, and BOARD_SEPOLICY_DIRS
      which lists the various directories that will contain
      the BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION
      policy files.
      
      Change-Id: Id33381268cef03245c56bc5242fec7da9b6c6493
      Signed-off-by: default avatarrpcraig <robertpcraig@gmail.com>
      47cd396b
    • Ying Wang's avatar
      am d8b122c7: Use file target as dependency. · 6b964fa1
      Ying Wang authored
      * commit 'd8b122c7':
        Use file target as dependency.
      6b964fa1
    • Ying Wang's avatar
      Use file target as dependency. · d8b122c7
      Ying Wang authored
      "sepolicy" is a phony target defined by the build system.
      If you use it as dependency of a file target, you'll get unnecessary
      rebuild.
      
      Change-Id: I3a948ebbaff6a146050eb86a3d04cdc050f7c001
      d8b122c7
  13. Oct 23, 2012
  14. Oct 22, 2012
  15. Oct 19, 2012
  16. Oct 17, 2012
  17. Oct 16, 2012
    • Joshua Brindle's avatar
      allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access · f26d8130
      Joshua Brindle authored
      
      - allow all apps to connect to the keystore over unix socket
      - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files
      - mtp connects to dnsproxyd when a pptp vpn connection is established
      - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device
      - WifiWatchDog uses packet_socket when wifi comes up
      - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction
      - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject
      
      Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949
      Signed-off-by: default avatarJoshua Brindle <jbrindle@tresys.com>
      f26d8130
  18. Oct 10, 2012
  19. Oct 04, 2012
  20. Sep 26, 2012
  21. Sep 24, 2012
    • Stephen Smalley's avatar
      Switch app_* and isolated to _app and _isolated in seapp_contexts. · 3ac1d26a
      Stephen Smalley authored
      
      The app_* syntax was a legacy of the original approach of looking up
      the username returned by getpwuid() and the original username encoding
      scheme by bionic.  With the recent changes to move away from this approach,
      there is no reason to retain that syntax.  Instead, just use _app to match
      app UIDs and _isolated to match isolated service UIDs.  The underscore
      prefix is to signify that these are not real usernames and to avoid
      conflicts with any system usernames.
      
      Requires a corresponding change to libselinux.
      
      Change-Id: Ic388a12c1c9d3e47386c8849db607140ef8a3d75
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      3ac1d26a
  22. Sep 20, 2012
Loading