Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
02f9e93a
Commit
02f9e93a
authored
11 years ago
by
Nick Kralevich
Committed by
Gerrit Code Review
11 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Replace ctl_default_prop access with explicit service property keys."
parents
2b749272
4b3893f9
No related branches found
No related tags found
No related merge requests found
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
netd.te
+1
-3
1 addition, 3 deletions
netd.te
property.te
+3
-0
3 additions, 0 deletions
property.te
property_contexts
+3
-0
3 additions, 0 deletions
property_contexts
surfaceflinger.te
+1
-1
1 addition, 1 deletion
surfaceflinger.te
vold.te
+1
-1
1 addition, 1 deletion
vold.te
with
9 additions
and
5 deletions
netd.te
+
1
−
3
View file @
02f9e93a
...
@@ -56,9 +56,7 @@ allow netd dnsmasq:process signal;
...
@@ -56,9 +56,7 @@ allow netd dnsmasq:process signal;
domain_auto_trans(netd, clatd_exec, clatd)
domain_auto_trans(netd, clatd_exec, clatd)
allow netd clatd:process signal;
allow netd clatd:process signal;
# Support netd running mdnsd
allow netd ctl_mdnsd_prop:property_service set;
# TODO: prune this back further
allow netd ctl_default_prop:property_service set;
###
###
### Neverallow rules
### Neverallow rules
...
...
This diff is collapsed.
Click to expand it.
property.te
+
3
−
0
View file @
02f9e93a
...
@@ -6,8 +6,11 @@ type radio_prop, property_type;
...
@@ -6,8 +6,11 @@ type radio_prop, property_type;
type system_prop, property_type;
type system_prop, property_type;
type vold_prop, property_type;
type vold_prop, property_type;
type rild_prop, property_type;
type rild_prop, property_type;
type ctl_bootanim_prop, property_type;
type ctl_default_prop, property_type;
type ctl_default_prop, property_type;
type ctl_dumpstate_prop, property_type;
type ctl_dumpstate_prop, property_type;
type ctl_fuse_prop, property_type;
type ctl_mdnsd_prop, property_type;
type ctl_rildaemon_prop, property_type;
type ctl_rildaemon_prop, property_type;
type ctl_bugreport_prop, property_type;
type ctl_bugreport_prop, property_type;
type audio_prop, property_type;
type audio_prop, property_type;
...
...
This diff is collapsed.
Click to expand it.
property_contexts
+
3
−
0
View file @
02f9e93a
...
@@ -52,7 +52,10 @@ vold. u:object_r:vold_prop:s0
...
@@ -52,7 +52,10 @@ vold. u:object_r:vold_prop:s0
crypto. u:object_r:vold_prop:s0
crypto. u:object_r:vold_prop:s0
# ctl properties
# ctl properties
ctl.bootanim u:object_r:ctl_bootanim_prop:s0
ctl.dumpstate u:object_r:ctl_dumpstate_prop:s0
ctl.dumpstate u:object_r:ctl_dumpstate_prop:s0
ctl.fuse_ u:object_r:ctl_fuse_prop:s0
ctl.mdnsd u:object_r:ctl_mdnsd_prop:s0
ctl.ril-daemon u:object_r:ctl_rildaemon_prop:s0
ctl.ril-daemon u:object_r:ctl_rildaemon_prop:s0
ctl.bugreport u:object_r:ctl_bugreport_prop:s0
ctl.bugreport u:object_r:ctl_bugreport_prop:s0
ctl. u:object_r:ctl_default_prop:s0
ctl. u:object_r:ctl_default_prop:s0
This diff is collapsed.
Click to expand it.
surfaceflinger.te
+
1
−
1
View file @
02f9e93a
...
@@ -38,7 +38,7 @@ allow surfaceflinger self:netlink_kobject_uevent_socket create_socket_perms;
...
@@ -38,7 +38,7 @@ allow surfaceflinger self:netlink_kobject_uevent_socket create_socket_perms;
# Set properties.
# Set properties.
allow surfaceflinger system_prop:property_service set;
allow surfaceflinger system_prop:property_service set;
allow surfaceflinger ctl_
default
_prop:property_service set;
allow surfaceflinger ctl_
bootanim
_prop:property_service set;
# Use open files supplied by an app.
# Use open files supplied by an app.
allow surfaceflinger appdomain:fd use;
allow surfaceflinger appdomain:fd use;
...
...
This diff is collapsed.
Click to expand it.
vold.te
+
1
−
1
View file @
02f9e93a
...
@@ -65,7 +65,7 @@ allow vold kernel:process setsched;
...
@@ -65,7 +65,7 @@ allow vold kernel:process setsched;
# Property Service
# Property Service
allow vold vold_prop:property_service set;
allow vold vold_prop:property_service set;
allow vold powerctl_prop:property_service set;
allow vold powerctl_prop:property_service set;
allow vold ctl_
default
_prop:property_service set;
allow vold ctl_
fuse
_prop:property_service set;
# ASEC
# ASEC
allow vold asec_image_file:file create_file_perms;
allow vold asec_image_file:file create_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment