Sign in
ara-mdk
/
platform
/
external
/
sepolicy
/
HEAD
« Previous
3261fee
untrusted_app reads logs when android_cts enabled
by Haiqing Jiang
· 12 years ago
173cbdd
read permission over lnk_file to devices when android_cts enabled
by Haiqing Jiang
· 12 years ago
e7e65d4
New asec container labeling.
by rpcraig
· 12 years ago
b19665c
Add mac_permissions.xml file.
by rpcraig
· 12 years ago
1f0f77f
Allow CTS Test apps to access to system_data_file
by Haiqing Jiang
· 12 years ago
59e9680
socket permissions to untrusted_app
by Haiqing Jiang
· 12 years ago
1ce0fe3
appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
by Haiqing Jiang
· 12 years ago
dd31ddf
seinfo can be used to select types, and sebool is now supported.
by Stephen Smalley
· 12 years ago
2b47c3f
allocate perms to platformappdomain over system_data_file
by Haiqing Jiang
· 12 years ago
19e7fbe
mediaserver and system require abstract socket connnection
by Haiqing Jiang
· 12 years ago
f6ca160
installd unlink platform_app_data_file
by Haiqing Jiang
· 12 years ago
7585fc6
Platform app domain sdcard accesses
by Haiqing Jiang
· 12 years ago
b9760aa
Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps.
by Stephen Smalley
· 12 years ago
3296dea
external/sepolicy: mediaserver open application data files
by Haiqing Jiang
· 12 years ago
569f589
external/sepolicy: system r/w udp_socket of appdomain
by hqjiang
· 12 years ago
8f781f5
external/sepolicy: install daemon unlink application data files
by hqjiang
· 12 years ago
4c06d27
Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
by hqjiang
· 12 years ago
20d6963
allow camera calibration
by hqjiang
· 12 years ago
af56ac1
Include su.te only for userdebug/eng builds.
by Matt Finifter
· 12 years ago
1c73516
Address various denials introduced by JB/4.1.
by Stephen Smalley
· 12 years ago
c331d0f
Restore devnull initial sid context.
by Stephen Smalley
· 12 years ago
dc10723
Support for ocontexts per device.
by William Roberts
· 12 years ago
96bf505
Fix the app_ndk policy boolean allow rule.
by Michal Mašek
· 12 years ago
e1c545d
correct denies of inter system processes communication over named pipe
by hqjiang
· 12 years ago
ee5f400
Correct denies of rpmsg device when accessing to remote processors.
by hqjiang
· 12 years ago
81039ab
Corrected denials for LocationManager when accessing gps over uart.
by hqjiang
· 12 years ago
60e4f11
Add key_socket class to socket_class_set macro. Allow system to trigger module auto-loading and to write to sockets created under /dev.
by Stephen Smalley
· 12 years ago
965f2ff
Allow system_app to set MAC enforcing mode and read MAC denials.
by Stephen Smalley
· 12 years ago
03d2803
media app should have rw access to sdcard dir and files.
by William Roberts
· 12 years ago
f3b587c
Rewrite app domains and seapp_contexts to leverage new seinfo tags.
by Stephen Smalley
· 12 years ago
92495b3
Add persist.mac_enforcing_mode context
by Bob Craig
· 13 years ago
35c8d4f
system needs open permission to qtaguid ctrl file.
by Stephen Smalley
· 12 years ago
322b37a
Update system rule for qtaguid file.
by Stephen Smalley
· 12 years ago
e4682a6
Allow apps to write to /proc/net/xt_qtaguid/ctrl.
by Stephen Smalley
· 12 years ago
6c39ee0
Make wallpaper_file a mlstrustedobject to permit writes from any app level.
by Stephen Smalley
· 12 years ago
56ad8c7
This patch fixes rild trying to access the bluetooth efs dir with read perms.
by William Roberts
· 12 years ago
70d4fc2
Add selinux network script to policy
by Joshua Brindle
· 12 years ago
07ef722
ion fix
by William Roberts
· 12 years ago
e8bc32b
Public domain notice
by Stephen Smalley
· 12 years ago
f6f8710
Remove all denials caused by rild on tuna devices. Tested on a maguro variant.
by William Roberts
· 12 years ago
80ea1d2
sdcard policy and fuse device label.
by William Roberts
· 12 years ago
7fa2f9e
Policy for hci_attach service.
by William Roberts
· 12 years ago
efd6d6e
Apply m4 to file_contexts and property_contexts to support includes.
by Stephen Smalley
· 13 years ago
4e85633
Merge branch 'aosp'
by Stephen Smalley
· 13 years ago
a83fc37
Added policy to allow SEAndroidManager to read AVC messages.
by James Carter
· 13 years ago
d045eae
am f5f899c3: Merge from upstream sepolicy
by The Android Open Source Project
· 13 years ago
911dd71
am f4ea5b25: Use the checkpolicy built from source.
by Ying Wang
· 13 years ago
f5f899c
Merge from upstream sepolicy
by The Android Open Source Project
· 13 years ago
f4ea5b2
Use the checkpolicy built from source.
by Ying Wang
· 13 years ago
f774148
Use the checkpolicy built from source.
by Ying Wang
· 13 years ago
730957a
Rework the radio vs rild property split.
by Stephen Smalley
· 13 years ago
a883c38
Allow apps to write to anr_data_file for /data/anr/traces.txt.
by Stephen Smalley
· 13 years ago
124720a
Add policy for property service.
by Stephen Smalley
· 13 years ago
2cb1b31
Allow adbd to access the qemu device and label /dev/eac correctly.
by Stephen Smalley
· 13 years ago
f794823
Integrate nfc_power and rild rules from tuna sepolicy by Bryan Hinton.
by Stephen Smalley
· 13 years ago
0e85c17
Rewrite MLS constraints to only constrain open for app_data_file, not read/write.
by Stephen Smalley
· 13 years ago
f6cbbe2
Introduce a separate wallpaper_file type for the wallpaper file.
by Stephen Smalley
· 13 years ago
59d2803
Introduce a separate apk_tmp_file type for the vmdl.*\.tmp files.
by Stephen Smalley
· 13 years ago
b660916
Allow the shell to create files on the sdcard.
by Stephen Smalley
· 13 years ago
d5a70a7
Drop redundant rules.
by Stephen Smalley
· 13 years ago
c83d008
Policy changes to support running the latest CTS.
by Stephen Smalley
· 13 years ago
64935c7
Limit per-device policy files to a well-defined sepolicy prefix.
by Stephen Smalley
· 13 years ago
5b340be
Add support for per-device .te and .fc files.
by Stephen Smalley
· 13 years ago
4c6f1ce
Allow Settings to set enforcing and booleans if settings_manage_selinux is true.
by Stephen Smalley
· 13 years ago
7e8cf24
Do not build if HAVE_SELINUX=false.
by Stephen Smalley
· 13 years ago
2b826fc
Add a dependency on checkpolicy.
by Stephen Smalley
· 13 years ago
02fb5f3
Rewrite Android.mk.
by Ying Wang
· 13 years ago
beefbe5
Add explicit role declaration for newer checkpolicy versions.
by Stephen Smalley
· 13 years ago
6261d6d
Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file.
by Stephen Smalley
· 13 years ago
0d76f4e
Allow system server to set scheduling info for apps.
by Stephen Smalley
· 13 years ago
c94e239
Further policy for Motorola Xoom.
by Stephen Smalley
· 13 years ago
2dd4e51
SE Android policy.
by Stephen Smalley
· 13 years ago