Ver Mensaje Individual
  #1274  
Viejo 19/07/13, 10:41:34
Array

[xs_avatar]
juanpirulo juanpirulo no está en línea
Usuario muy activo
· Votos compra/venta: (2)
 
Fecha de registro: may 2011
Localización: Vitoria
Mensajes: 5,197
Modelo de smartphone: S2 , Sony Xperia Z1,Z3,XZ, Huawei P30Pro
Tu operador: Movistar
Ya tenemos nueva nightly aunque todavía no esta subida al servidor. Parece que en esta ya esta implementada la seguridad Selinux. Saludos.

http://androidayuda.com/2013/07/16/c...a-con-selinux

===================================
Since Thu Jul 18 07:42:17 UTC 2013
===================================

* bootable/recovery
64615ee SELinux: don't suppress the "no file_contexts" message on the UI

* build
6cd5f43 Add auditd to SELinux-enabled builds

* external/sepolicy
b5c32a3 Let system components and apps set the enforce state
96cea0c Fix MMAC permissions
2666f2d Merge branch 'selinux' into cm-10.1
4ba45a3 Fix priority in /cache/dalvik-cache labelling

* frameworks/base
ba124a9 Allow device admin policy to override policy boolean state.
7abdd88 Fix SELinux.java doc errors
18f5453 Restore support for labeling non-system apps based on their certificate.
526e481 Drop "SE Android" from strings.
21a5771 Replace SEAndroid with SELinux.
1c6f7a8 Add data validation on seinfo labels.
62d90c6 Follow AOSP behavior for seinfo assignment.
c22f6e0 Save off the seinfo value with packages.list.
1f7f153 Bring install-time code inline with AOSP.
7e09296 Move seinfo and install-time changes to inside PMS.
c6767eb Change DPMS code to accommodate enforce states on boot.
a5dfcb4 Update location of policy files
81a5623 Proper security labeling of multi-user data directories.
2a091b4 Implement Device Admin API for MMAC
b00a063 Apply MMAC changes from master.
36d685c Simplify check during admin removal for whether to cleanup SELinux
7adb00f Remove SELinux additions from public API
ae74c84 Add APIs to allow Device Admins to change SELinux settings
88aeb65 Save off the seinfo value with packages.list.
e87ce9f Added SELinux enforcing status and booleans keys to secure system settings.
e6a3372 Add seinfo parsing to PackageManagerService.

* packages/apps/Settings
dd7ce06 Merge "Add a quick SELinux mode toggle" into cm-10.1
22bf8e8 Add a quick SELinux mode toggle

* system/core
d0808c7 Fix building without SELINUX
482ec0c Explicitly add the theme manager's AID to fs config
0298df1 Add support for socket security context specification.
2c22ff6 Fix perms on /data/security
ed9fa86 sys/capability.h does not exist in the 4.2 bionic.
01996ab Sync with master auditd.
911cbea Correct run-as with seinfo parsing capability.
44677e4 Auditd initial commit
1f34e1c Reserve AID_AUDIT
345e3d2 Fix mode on /data/security.
cef7220 Create a new location for /data policy files
0cbf7ea toolbox: silence some compiler warnings
56ef4f0 Change setsebool syntax to be consistent with other init built-ins.
0995719 Label sockets consistently with the seclabel value if specified.
fd44b1c Add persist.mac_enforcing_mode property
7db7210 Document the SELinux extensions to the Android init language.
5841849 run-as: Get seinfo from packages.list and pass to libselinux.
e46e20d run-as: set the SELinux security context.
f97984a Allow system UID to setenforce and set booleans for SELinux.
7cee873 Add support for -R (recurse) to init chown builtin.

* vendor/cm
8994907 selinux: When adding userdata labels, do cache too
b52874d selinux: Use a more reliable sentinel to flag /data labelling
Los siguientes 3 usuarios han agradecido a juanpirulo su comentario:
[ Mostrar/Ocultar listado de agradecimientos ]