Skip to content
Snippets Groups Projects
Commit 1c8e8e0e authored by Michael Schwartz's avatar Michael Schwartz Committed by Android (Google) Code Review
Browse files

Merge "Sepolicy changes for system_server to use libvintf" into oc-dev

parents c67fa9bf bc3150af
No related branches found
No related tags found
No related merge requests found
...@@ -282,6 +282,7 @@ ...@@ -282,6 +282,7 @@
# TODO: b/36790901 move this to /vendor/etc # TODO: b/36790901 move this to /vendor/etc
/(vendor|system/vendor)/manifest.xml u:object_r:vendor_configs_file:s0 /(vendor|system/vendor)/manifest.xml u:object_r:vendor_configs_file:s0
/(vendor|system/vendor)/compatibility_matrix.xml u:object_r:vendor_configs_file:s0
/(vendor|system/vendor)/app(/.*)? u:object_r:vendor_app_file:s0 /(vendor|system/vendor)/app(/.*)? u:object_r:vendor_app_file:s0
/(vendor|system/vendor)/overlay(/.*)? u:object_r:vendor_overlay_file:s0 /(vendor|system/vendor)/overlay(/.*)? u:object_r:vendor_overlay_file:s0
/(vendor|system/vendor)/framework(/.*)? u:object_r:vendor_framework_file:s0 /(vendor|system/vendor)/framework(/.*)? u:object_r:vendor_framework_file:s0
......
...@@ -86,6 +86,9 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms_no_io ...@@ -86,6 +86,9 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms_no_io
allow system_server self:netlink_socket create_socket_perms_no_ioctl; allow system_server self:netlink_socket create_socket_perms_no_ioctl;
allow system_server self:netlink_generic_socket create_socket_perms_no_ioctl; allow system_server self:netlink_generic_socket create_socket_perms_no_ioctl;
# libvintf reads the kernel config to verify vendor interface compatibility.
allow system_server config_gz:file { read open };
# Use generic "sockets" where the address family is not known # Use generic "sockets" where the address family is not known
# to the kernel. The ioctl permission is specifically omitted here, but may # to the kernel. The ioctl permission is specifically omitted here, but may
# be added to device specific policy along with the ioctl commands to be # be added to device specific policy along with the ioctl commands to be
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment