Skip to content
Snippets Groups Projects
  1. Oct 09, 2018
    • Tom Cherry's avatar
    • Nick Kralevich's avatar
      ioctl_defines: Add F2FS ioctls · a605b04f
      Nick Kralevich authored
      Test: policy compiles.
      Change-Id: Icda25a34ce61c28fa2399a1f1f44c9ef7ba44745
      a605b04f
    • Nick Kralevich's avatar
      ioctl_defines: sort file · 61fce68d
      Nick Kralevich authored
      Sort file by ioctl name. This will make it hopefully easier to find
      entries.
      
      Alternatives considered: sorting file by ioctl value. This has the
      advantage that it's easier to map an SELinux ioctlcmd= avc message into
      a variable name, but would otherwise make this file harder to read.
      
      Test: policy compiles.
      Change-Id: I09b1dd4c055446f73185b90c4de5f3cdd98eb4b7
      61fce68d
    • jinhee0207.jo's avatar
      Add sepolicy labeling of wifi.concurrent.interface property. · 2b09698a
      jinhee0207.jo authored
      
      1. "Add sepolicy labeling of wifi.concurrent.interface" in property_contexts.
      wlan1 interface is added first in Pie OS. And wlan1 interface has getIfaceName
      by property_get in wifi_chip.cpp.
      (/hardware/interface/wifi/1.2/default/wifi_chip.cpp)
      But, there is no sepolicy about this interface. wlan0 and p2p0 is definitely specified.
      So, if we try to use wlan1, native sepolicy violation occurs.
      This is why this labeling is necessary.
      
      2. wlan1: Property labeling same with wlan0 or p2p0.
      wifi.interface u:object_r:exported_default_prop:s0 exact string
      
      Test: Basic Sanity - Verified tethering by using wlan1
      Bug: 117302656
      
      Change-Id: I24194bca7176e1927164228e6571870531a9bc56
      Signed-off-by: default avatarJinhee Jo <jinhee0207.jo@lge.com>
      2b09698a
  2. Oct 08, 2018
  3. Oct 07, 2018
  4. Oct 06, 2018
  5. Oct 05, 2018
  6. Oct 04, 2018
  7. Oct 03, 2018
  8. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
    • Howard Ro's avatar
      Merge "Update sepolicies for stats hal" · aabee5fe
      Howard Ro authored
      aabee5fe
  9. Oct 01, 2018
  10. Sep 29, 2018
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      Don't require private types in mapping file. · e3f4f77d
      Tri Vo authored
      Private types are not visible to vendor/odm policy, so we don't need mapping
      entries for them.
      
      We build platform-only public policy .cil file and give it as input to
      treble_sepolicy_tests. Using this public policy the test can now figure out if
      the newly added type in public or private.
      
      Bug: 116344577
      Test: adding public type triggers mapping test failure, adding private type does
      not.
      Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
      e3f4f77d
  11. Sep 28, 2018
Loading