Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

system.te

Blame
    • Nick Kralevich's avatar
      d2703d21
      allow system server to control zygote spawned processes · d2703d21
      Nick Kralevich authored
      System server needs to be able to tell Zygote to create processes
      with differing ids, capabilities, and SELinux security information.
      Allow it.
      
      These rules are not in unconfined.te, and as a result, are not
      automatically allowed by SELinux in enforcing mode.
      
      Change-Id: I010eaa2b0e0cee5d995e08e6c785cc5e01b2c974
      d2703d21
      History
      allow system server to control zygote spawned processes
      Nick Kralevich authored
      System server needs to be able to tell Zygote to create processes
      with differing ids, capabilities, and SELinux security information.
      Allow it.
      
      These rules are not in unconfined.te, and as a result, are not
      automatically allowed by SELinux in enforcing mode.
      
      Change-Id: I010eaa2b0e0cee5d995e08e6c785cc5e01b2c974