Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
06322b1e
Commit
06322b1e
authored
9 years ago
by
Rubin Xu
Committed by
android-build-merger
9 years ago
Browse files
Options
Downloads
Plain Diff
Merge "SELinux rule for ro.device_owner and persist.logd.security"
am:
65d364b9
* commit '
65d364b9
': SELinux rule for ro.device_owner and persist.logd.security
parents
563b2bfc
65d364b9
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
adbd.te
+3
-0
3 additions, 0 deletions
adbd.te
logd.te
+3
-0
3 additions, 0 deletions
logd.te
property.te
+1
-0
1 addition, 0 deletions
property.te
property_contexts
+5
-0
5 additions, 0 deletions
property_contexts
system_server.te
+1
-0
1 addition, 0 deletions
system_server.te
with
13 additions
and
0 deletions
adbd.te
+
3
−
0
View file @
06322b1e
...
@@ -49,6 +49,9 @@ set_prop(adbd, shell_prop)
...
@@ -49,6 +49,9 @@ set_prop(adbd, shell_prop)
set_prop(adbd, powerctl_prop)
set_prop(adbd, powerctl_prop)
set_prop(adbd, ffs_prop)
set_prop(adbd, ffs_prop)
# Access device logging gating property
get_prop(adbd, device_logging_prop)
# Run /system/bin/bu
# Run /system/bin/bu
allow adbd system_file:file rx_file_perms;
allow adbd system_file:file rx_file_perms;
...
...
This diff is collapsed.
Click to expand it.
logd.te
+
3
−
0
View file @
06322b1e
...
@@ -18,6 +18,9 @@ userdebug_or_eng(`
...
@@ -18,6 +18,9 @@ userdebug_or_eng(`
allow logd pstorefs:dir search;
allow logd pstorefs:dir search;
allow logd pstorefs:file r_file_perms;
allow logd pstorefs:file r_file_perms;
# Access device logging gating property
get_prop(logd, device_logging_prop)
r_dir_file(logd, domain)
r_dir_file(logd, domain)
allow logd kernel:system syslog_mod;
allow logd kernel:system syslog_mod;
...
...
This diff is collapsed.
Click to expand it.
property.te
+
1
−
0
View file @
06322b1e
...
@@ -31,5 +31,6 @@ type powerctl_prop, property_type, core_property_type;
...
@@ -31,5 +31,6 @@ type powerctl_prop, property_type, core_property_type;
type nfc_prop, property_type, core_property_type;
type nfc_prop, property_type, core_property_type;
type dalvik_prop, property_type, core_property_type;
type dalvik_prop, property_type, core_property_type;
type config_prop, property_type, core_property_type;
type config_prop, property_type, core_property_type;
type device_logging_prop, property_type;
allow property_type tmpfs:filesystem associate;
allow property_type tmpfs:filesystem associate;
This diff is collapsed.
Click to expand it.
property_contexts
+
5
−
0
View file @
06322b1e
...
@@ -39,12 +39,17 @@ service.adb.tcp.port u:object_r:shell_prop:s0
...
@@ -39,12 +39,17 @@ service.adb.tcp.port u:object_r:shell_prop:s0
persist.audio. u:object_r:audio_prop:s0
persist.audio. u:object_r:audio_prop:s0
persist.debug. u:object_r:persist_debug_prop:s0
persist.debug. u:object_r:persist_debug_prop:s0
persist.logd. u:object_r:logd_prop:s0
persist.logd. u:object_r:logd_prop:s0
persist.logd.security u:object_r:device_logging_prop:s0
persist.log.tag u:object_r:logd_prop:s0
persist.log.tag u:object_r:logd_prop:s0
persist.sys. u:object_r:system_prop:s0
persist.sys. u:object_r:system_prop:s0
persist.service. u:object_r:system_prop:s0
persist.service. u:object_r:system_prop:s0
persist.service.bdroid. u:object_r:bluetooth_prop:s0
persist.service.bdroid. u:object_r:bluetooth_prop:s0
persist.security. u:object_r:system_prop:s0
persist.security. u:object_r:system_prop:s0
# Boolean property set by system server upon boot indicating
# if device owner is provisioned.
ro.device_owner u:object_r:device_logging_prop:s0
# selinux non-persistent properties
# selinux non-persistent properties
selinux.restorecon_recursive u:object_r:restorecon_prop:s0
selinux.restorecon_recursive u:object_r:restorecon_prop:s0
selinux. u:object_r:security_prop:s0
selinux. u:object_r:security_prop:s0
...
...
This diff is collapsed.
Click to expand it.
system_server.te
+
1
−
0
View file @
06322b1e
...
@@ -288,6 +288,7 @@ set_prop(system_server, system_radio_prop)
...
@@ -288,6 +288,7 @@ set_prop(system_server, system_radio_prop)
set_prop(system_server, debug_prop)
set_prop(system_server, debug_prop)
set_prop(system_server, powerctl_prop)
set_prop(system_server, powerctl_prop)
set_prop(system_server, fingerprint_prop)
set_prop(system_server, fingerprint_prop)
set_prop(system_server, device_logging_prop)
# ctl interface
# ctl interface
set_prop(system_server, ctl_default_prop)
set_prop(system_server, ctl_default_prop)
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment