Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
1c735165
Commit
1c735165
authored
12 years ago
by
Stephen Smalley
Browse files
Options
Downloads
Patches
Plain Diff
Address various denials introduced by JB/4.1.
parent
c331d0fe
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
app.te
+7
-3
7 additions, 3 deletions
app.te
sdcardd.te
+1
-1
1 addition, 1 deletion
sdcardd.te
surfaceflinger.te
+3
-1
3 additions, 1 deletion
surfaceflinger.te
system.te
+3
-0
3 additions, 0 deletions
system.te
vold.te
+1
-1
1 addition, 1 deletion
vold.te
with
15 additions
and
6 deletions
app.te
+
7
−
3
View file @
1c735165
...
...
@@ -40,8 +40,8 @@ allow media_app mtp_device:chr_file rw_file_perms;
allow media_app cache_file:dir rw_dir_perms;
allow media_app cache_file:file create_file_perms;
# Access sdcard.
allow media_app sdcard:dir
rw
_dir_perms;
allow media_app sdcard:file
rw
_file_perms;
allow media_app sdcard:dir
create
_dir_perms;
allow media_app sdcard:file
create
_file_perms;
# Apps signed with the shared key.
type shared_app, domain;
...
...
@@ -119,8 +119,12 @@ allow appdomain zygote_tmpfs:file read;
# Notify zygote of death;
allow appdomain zygote:process sigchld;
# Communicate over a FIFO
to system processes
.
# Communicate over a FIFO
or socket created by the system_server
.
allow appdomain system:fifo_file rw_file_perms;
allow appdomain system:unix_stream_socket { read write };
# Communicate over a socket created by surfaceflinger.
allow appdomain surfaceflinger:unix_stream_socket { read write setopt };
# App sandbox file accesses.
allow appdomain app_data_file:dir create_dir_perms;
...
...
This diff is collapsed.
Click to expand it.
sdcardd.te
+
1
−
1
View file @
1c735165
...
...
@@ -7,7 +7,7 @@ allow sdcardd cgroup:dir create_dir_perms;
allow sdcardd fuse_device:chr_file rw_file_perms;
allow sdcardd rootfs:dir mounton;
allow sdcardd sdcard:filesystem mount;
allow sdcardd self:capability { setuid setgid };
allow sdcardd self:capability { setuid setgid
dac_override
};
allow sdcardd system_data_file:dir create_dir_perms;
allow sdcardd system_data_file:file create_file_perms;
This diff is collapsed.
Click to expand it.
surfaceflinger.te
+
3
−
1
View file @
1c735165
...
...
@@ -23,5 +23,7 @@ allow surfaceflinger video_device:chr_file rw_file_perms;
# Create and use netlink kobject uevent sockets.
allow surfaceflinger self:netlink_kobject_uevent_socket *;
# ctl interface
# Set properties.
allow surfaceflinger system_prop:property_service set;
allow surfaceflinger ctl_default_prop:property_service set;
This diff is collapsed.
Click to expand it.
system.te
+
3
−
0
View file @
1c735165
...
...
@@ -107,6 +107,9 @@ unix_socket_connect(system, gps, gpsd)
unix_socket_connect(system, bluetooth, bluetoothd)
unix_socket_send(system, wpa, wpa)
# Communicate over a socket created by surfaceflinger.
allow system surfaceflinger:unix_stream_socket { read write setopt };
# Perform Binder IPC.
tmpfs_domain(system)
binder_use(system)
...
...
This diff is collapsed.
Click to expand it.
vold.te
+
1
−
1
View file @
1c735165
...
...
@@ -53,7 +53,7 @@ allow vold kernel:system module_request;
allow vold proc:file write;
# Create and mount on /data/tmp_mnt.
allow vold system_data_file:dir { write create add_name mounton };
allow vold system_data_file:dir {
open read
write create add_name mounton };
# Property Service
allow vold vold_prop:property_service set;
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment