Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
35e41610
Commit
35e41610
authored
11 years ago
by
Nick Kralevich
Committed by
Android Git Automerger
11 years ago
Browse files
Options
Downloads
Plain Diff
am
37339c76
: fix mediaserver selinux denials.
* commit '
37339c76
': fix mediaserver selinux denials.
parents
e58a42f8
37339c76
No related branches found
No related tags found
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
drmserver.te
+3
-0
3 additions, 0 deletions
drmserver.te
mediaserver.te
+3
-2
3 additions, 2 deletions
mediaserver.te
surfaceflinger.te
+1
-0
1 addition, 0 deletions
surfaceflinger.te
system_server.te
+1
-0
1 addition, 0 deletions
system_server.te
with
8 additions
and
2 deletions
drmserver.te
+
3
−
0
View file @
35e41610
...
@@ -34,3 +34,6 @@ allow drmserver apk_data_file:dir rw_dir_perms;
...
@@ -34,3 +34,6 @@ allow drmserver apk_data_file:dir rw_dir_perms;
type_transition drmserver apk_data_file:sock_file drmserver_socket;
type_transition drmserver apk_data_file:sock_file drmserver_socket;
allow drmserver drmserver_socket:sock_file create_file_perms;
allow drmserver drmserver_socket:sock_file create_file_perms;
allow drmserver tee:unix_stream_socket connectto;
allow drmserver tee:unix_stream_socket connectto;
# After taking a video, drmserver looks at the video file.
r_dir_file(drmserver, media_rw_data_file)
This diff is collapsed.
Click to expand it.
mediaserver.te
+
3
−
2
View file @
35e41610
...
@@ -24,6 +24,7 @@ allow mediaserver app_data_file:file rw_file_perms;
...
@@ -24,6 +24,7 @@ allow mediaserver app_data_file:file rw_file_perms;
allow mediaserver platform_app_data_file:file { getattr read };
allow mediaserver platform_app_data_file:file { getattr read };
allow mediaserver sdcard_type:file write;
allow mediaserver sdcard_type:file write;
allow mediaserver graphics_device:chr_file rw_file_perms;
allow mediaserver graphics_device:chr_file rw_file_perms;
allow mediaserver video_device:dir r_dir_perms;
allow mediaserver video_device:chr_file rw_file_perms;
allow mediaserver video_device:chr_file rw_file_perms;
allow mediaserver audio_device:dir r_dir_perms;
allow mediaserver audio_device:dir r_dir_perms;
allow mediaserver qemu_device:chr_file rw_file_perms;
allow mediaserver qemu_device:chr_file rw_file_perms;
...
@@ -47,8 +48,8 @@ allow mediaserver rpmsg_device:chr_file rw_file_perms;
...
@@ -47,8 +48,8 @@ allow mediaserver rpmsg_device:chr_file rw_file_perms;
allow mediaserver system_server:fifo_file r_file_perms;
allow mediaserver system_server:fifo_file r_file_perms;
# Camera data
# Camera data
allow
mediaserver camera_data_file
:dir r_dir_perms;
r_dir_file(
mediaserver
,
camera_data_file
)
allow mediaserver camera_data_file:file r_file_perms;
r_dir_file(mediaserver, media_rw_data_file)
# Grant access to audio files to mediaserver
# Grant access to audio files to mediaserver
allow mediaserver audio_data_file:dir ra_dir_perms;
allow mediaserver audio_data_file:dir ra_dir_perms;
...
...
This diff is collapsed.
Click to expand it.
surfaceflinger.te
+
1
−
0
View file @
35e41610
...
@@ -21,6 +21,7 @@ allow surfaceflinger graphics_device:dir search;
...
@@ -21,6 +21,7 @@ allow surfaceflinger graphics_device:dir search;
allow surfaceflinger graphics_device:chr_file rw_file_perms;
allow surfaceflinger graphics_device:chr_file rw_file_perms;
# Access /dev/video1.
# Access /dev/video1.
allow surfaceflinger video_device:dir r_dir_perms;
allow surfaceflinger video_device:chr_file rw_file_perms;
allow surfaceflinger video_device:chr_file rw_file_perms;
# Create and use netlink kobject uevent sockets.
# Create and use netlink kobject uevent sockets.
...
...
This diff is collapsed.
Click to expand it.
system_server.te
+
1
−
0
View file @
35e41610
...
@@ -132,6 +132,7 @@ allow system_server input_device:chr_file rw_file_perms;
...
@@ -132,6 +132,7 @@ allow system_server input_device:chr_file rw_file_perms;
allow system_server tty_device:chr_file rw_file_perms;
allow system_server tty_device:chr_file rw_file_perms;
allow system_server urandom_device:chr_file rw_file_perms;
allow system_server urandom_device:chr_file rw_file_perms;
allow system_server usbaccessory_device:chr_file rw_file_perms;
allow system_server usbaccessory_device:chr_file rw_file_perms;
allow system_server video_device:dir r_dir_perms;
allow system_server video_device:chr_file rw_file_perms;
allow system_server video_device:chr_file rw_file_perms;
allow system_server qemu_device:chr_file rw_file_perms;
allow system_server qemu_device:chr_file rw_file_perms;
allow system_server adbd_socket:sock_file rw_file_perms;
allow system_server adbd_socket:sock_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment