Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
51ebb601
Commit
51ebb601
authored
7 years ago
by
Jeff Vander Stoep
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
Remove deprecated tagSocket() permissions am:
0d1e52a5
am:
c1753b7a
Change-Id: I5ae0c1791c2e588e6cdd177a4f1a8758cb2de3ad
parents
58e564e2
c1753b7a
No related branches found
Branches containing commit
No related tags found
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
private/system_server.te
+0
-4
0 additions, 4 deletions
private/system_server.te
public/mediaserver.te
+0
-4
0 additions, 4 deletions
public/mediaserver.te
public/update_engine.te
+0
-5
0 additions, 5 deletions
public/update_engine.te
with
0 additions
and
13 deletions
private/system_server.te
+
0
−
4
View file @
51ebb601
...
...
@@ -122,10 +122,6 @@ allow system_server hal_audio_server:file w_file_perms;
# for dumping stack traces of native processes.
r_dir_file(system_server, domain)
# Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid.
allow system_server qtaguid_proc:file rw_file_perms;
allow system_server qtaguid_device:chr_file rw_file_perms;
# Write /proc/uid_cputime/remove_uid_range.
allow system_server proc_uid_cputime_removeuid:file { w_file_perms getattr };
...
...
This diff is collapsed.
Click to expand it.
public/mediaserver.te
+
0
−
4
View file @
51ebb601
...
...
@@ -60,10 +60,6 @@ r_dir_file(mediaserver, media_rw_data_file)
# Grant access to read files on appfuse.
allow mediaserver app_fuse_file:file { read getattr };
# Read/[write] to /proc/net/xt_qtaguid/ctrl and /dev/xt_qtaguid
allow mediaserver qtaguid_proc:file rw_file_perms;
allow mediaserver qtaguid_device:chr_file r_file_perms;
# Needed on some devices for playing DRM protected content,
# but seems expected and appropriate for all devices.
unix_socket_connect(mediaserver, drmserver, drmserver)
...
...
This diff is collapsed.
Click to expand it.
public/update_engine.te
+
0
−
5
View file @
51ebb601
...
...
@@ -4,11 +4,6 @@ type update_engine_exec, exec_type, file_type;
net_domain(update_engine);
# Read/[write] to /proc/net/xt_qtaguid/ctrl and /dev/xt_qtaguid to tag network
# sockets.
allow update_engine qtaguid_proc:file rw_file_perms;
allow update_engine qtaguid_device:chr_file r_file_perms;
# Following permissions are needed for update_engine.
allow update_engine self:process { setsched };
allow update_engine self:global_capability_class_set { fowner sys_admin };
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment