Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

access_vectors

  • Stephen Smalley's avatar
    50992311
    sepolicy: Define validate_trans permission · 50992311
    Stephen Smalley authored
    
    Kernel commit f9df6458218f4fe ("selinux: export validatetrans
    decisions") introduced a /sys/fs/selinux/validatetrans pseudo file
    for use by userspace file system servers and defined a new validatetrans
    permission to control its use.
    
    Define the new permission in the Android SELinux policy.
    This change only defines the new permission; it does not allow it
    to any domains by default.
    
    This avoids a kernel message warning about the undefined permission on
    the policy load, ala:
    SELinux:  Permission validate_trans in class security not defined in policy.
    
    Test: Policy builds
    
    Change-Id: Ib922a83b7d8f94905207663a72f7a1bc3db8d2c2
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    50992311
    History
    sepolicy: Define validate_trans permission
    Stephen Smalley authored
    
    Kernel commit f9df6458218f4fe ("selinux: export validatetrans
    decisions") introduced a /sys/fs/selinux/validatetrans pseudo file
    for use by userspace file system servers and defined a new validatetrans
    permission to control its use.
    
    Define the new permission in the Android SELinux policy.
    This change only defines the new permission; it does not allow it
    to any domains by default.
    
    This avoids a kernel message warning about the undefined permission on
    the policy load, ala:
    SELinux:  Permission validate_trans in class security not defined in policy.
    
    Test: Policy builds
    
    Change-Id: Ib922a83b7d8f94905207663a72f7a1bc3db8d2c2
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>