Skip to content
Snippets Groups Projects
  1. Oct 09, 2018
    • jinhee0207.jo's avatar
      Add sepolicy labeling of wifi.concurrent.interface property. · 2b09698a
      jinhee0207.jo authored
      
      1. "Add sepolicy labeling of wifi.concurrent.interface" in property_contexts.
      wlan1 interface is added first in Pie OS. And wlan1 interface has getIfaceName
      by property_get in wifi_chip.cpp.
      (/hardware/interface/wifi/1.2/default/wifi_chip.cpp)
      But, there is no sepolicy about this interface. wlan0 and p2p0 is definitely specified.
      So, if we try to use wlan1, native sepolicy violation occurs.
      This is why this labeling is necessary.
      
      2. wlan1: Property labeling same with wlan0 or p2p0.
      wifi.interface u:object_r:exported_default_prop:s0 exact string
      
      Test: Basic Sanity - Verified tethering by using wlan1
      Bug: 117302656
      
      Change-Id: I24194bca7176e1927164228e6571870531a9bc56
      Signed-off-by: default avatarJinhee Jo <jinhee0207.jo@lge.com>
      2b09698a
  2. Oct 08, 2018
  3. Oct 07, 2018
  4. Oct 06, 2018
  5. Oct 05, 2018
  6. Oct 04, 2018
  7. Oct 03, 2018
  8. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
    • Howard Ro's avatar
      Merge "Update sepolicies for stats hal" · aabee5fe
      Howard Ro authored
      aabee5fe
  9. Oct 01, 2018
  10. Sep 29, 2018
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      Don't require private types in mapping file. · e3f4f77d
      Tri Vo authored
      Private types are not visible to vendor/odm policy, so we don't need mapping
      entries for them.
      
      We build platform-only public policy .cil file and give it as input to
      treble_sepolicy_tests. Using this public policy the test can now figure out if
      the newly added type in public or private.
      
      Bug: 116344577
      Test: adding public type triggers mapping test failure, adding private type does
      not.
      Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
      e3f4f77d
  11. Sep 28, 2018
Loading