Skip to content
Snippets Groups Projects
Select Git revision
  • 51bfecf49d50982f64aba1fa73bbbdd2e40a444f
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

shell.te

Blame
  • user avatar
    Stephen Smalley authored
    As reported by sepolicy-analyze -D -P /path/to/sepolicy.
    No semantic difference reported by sediff between the policy
    before and after this change.
    
    Deduplication of selinuxfs read access resolved by taking the
    common rules to domain.te (and thereby getting rid of the
    selinux_getenforce macro altogether).
    
    Change-Id: I4de2f86fe2efe11a167e8a7d25dd799cefe482e5
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    00b180df
    History
    shell.te 1.64 KiB