Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

system_server.te

  • Nick Kralevich's avatar
    4e404290
    Move net.dns* to it's own label. · 4e404290
    Nick Kralevich authored
    Move net.dns* from net_radio_prop to the newly created label
    net_dns_prop. This allows finer grain control over this specific
    property.
    
    Prior to this change, this property was readable to all SELinux domains,
    and writable by the following SELinux domains:
    
      * system_server
      * system_app (apps which run as UID=system)
      * netmgrd
      * radio
    
    This change:
    
    1) Removes read access to this property to everyone EXCEPT untrusted_app
    and system_server.
    2) Limit write access to system_server.
    
    In particular, this change removes read access to priv_apps. Any
    priv_app which ships with the system should not be reading this
    property.
    
    Bug: 34115651
    Test: Device boots, wifi turns on, no problems browsing the internet
    Change-Id: I8a32e98c4f573d634485c4feac91baa35d021d38
    4e404290
    History
    Move net.dns* to it's own label.
    Nick Kralevich authored
    Move net.dns* from net_radio_prop to the newly created label
    net_dns_prop. This allows finer grain control over this specific
    property.
    
    Prior to this change, this property was readable to all SELinux domains,
    and writable by the following SELinux domains:
    
      * system_server
      * system_app (apps which run as UID=system)
      * netmgrd
      * radio
    
    This change:
    
    1) Removes read access to this property to everyone EXCEPT untrusted_app
    and system_server.
    2) Limit write access to system_server.
    
    In particular, this change removes read access to priv_apps. Any
    priv_app which ships with the system should not be reading this
    property.
    
    Bug: 34115651
    Test: Device boots, wifi turns on, no problems browsing the internet
    Change-Id: I8a32e98c4f573d634485c4feac91baa35d021d38