Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
59d28035
Commit
59d28035
authored
13 years ago
by
Stephen Smalley
Browse files
Options
Downloads
Patches
Plain Diff
Introduce a separate apk_tmp_file type for the vmdl.*\.tmp files.
parent
b660916b
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
app.te
+1
-2
1 addition, 2 deletions
app.te
file.te
+2
-1
2 additions, 1 deletion
file.te
file_contexts
+1
-0
1 addition, 0 deletions
file_contexts
installd.te
+1
-0
1 addition, 0 deletions
installd.te
system.te
+7
-0
7 additions, 0 deletions
system.te
with
12 additions
and
3 deletions
app.te
+
1
−
2
View file @
59d28035
...
@@ -28,8 +28,7 @@ allow trusted_app shell_data_file:lnk_file read;
...
@@ -28,8 +28,7 @@ allow trusted_app shell_data_file:lnk_file read;
allow trusted_app sdcard:dir create_dir_perms;
allow trusted_app sdcard:dir create_dir_perms;
allow trusted_app sdcard:file create_file_perms;
allow trusted_app sdcard:file create_file_perms;
# Populate /data/app/vmdl*.tmp file created by system server.
# Populate /data/app/vmdl*.tmp file created by system server.
# It would be better if this was labeled differently.
allow trusted_app apk_tmp_file:file rw_file_perms;
allow trusted_app apk_data_file:file write;
#
#
# An example of a specific domain for a specific app
# An example of a specific domain for a specific app
...
...
This diff is collapsed.
Click to expand it.
file.te
+
2
−
1
View file @
59d28035
...
@@ -29,7 +29,8 @@ type anr_data_file, file_type, data_file_type;
...
@@ -29,7 +29,8 @@ type anr_data_file, file_type, data_file_type;
# /data/tombstones - core dumps
# /data/tombstones - core dumps
type tombstone_data_file, file_type, data_file_type;
type tombstone_data_file, file_type, data_file_type;
# /data/app - user-installed apps
# /data/app - user-installed apps
type apk_data_file, file_type, data_file_type, mlstrustedobject;
type apk_data_file, file_type, data_file_type;
type apk_tmp_file, file_type, data_file_type, mlstrustedobject;
# /data/dalvik-cache
# /data/dalvik-cache
type dalvikcache_data_file, file_type, data_file_type;
type dalvikcache_data_file, file_type, data_file_type;
# /data/local - writable by shell
# /data/local - writable by shell
...
...
This diff is collapsed.
Click to expand it.
file_contexts
+
1
−
0
View file @
59d28035
...
@@ -106,6 +106,7 @@
...
@@ -106,6 +106,7 @@
/data/dalvik-cache(/.*)? u:object_r:dalvikcache_data_file:s0
/data/dalvik-cache(/.*)? u:object_r:dalvikcache_data_file:s0
/data/anr(/.*)? u:object_r:anr_data_file:s0
/data/anr(/.*)? u:object_r:anr_data_file:s0
/data/app(/.*)? u:object_r:apk_data_file:s0
/data/app(/.*)? u:object_r:apk_data_file:s0
/data/app/vmdl.*\.tmp u:object_r:apk_tmp_file:s0
/data/tombstones(/.*)? u:object_r:tombstone_data_file:s0
/data/tombstones(/.*)? u:object_r:tombstone_data_file:s0
/data/local(/.*)? u:object_r:shell_data_file:s0
/data/local(/.*)? u:object_r:shell_data_file:s0
# Misc data
# Misc data
...
...
This diff is collapsed.
Click to expand it.
installd.te
+
1
−
0
View file @
59d28035
...
@@ -12,6 +12,7 @@ allow installd data_file_type:dir create_dir_perms;
...
@@ -12,6 +12,7 @@ allow installd data_file_type:dir create_dir_perms;
allow installd data_file_type:dir { relabelfrom relabelto };
allow installd data_file_type:dir { relabelfrom relabelto };
allow installd data_file_type:file { getattr unlink };
allow installd data_file_type:file { getattr unlink };
allow installd apk_data_file:file r_file_perms;
allow installd apk_data_file:file r_file_perms;
allow installd apk_tmp_file:file r_file_perms;
allow installd system_file:file x_file_perms;
allow installd system_file:file x_file_perms;
allow installd cgroup:dir create_dir_perms;
allow installd cgroup:dir create_dir_perms;
dontaudit installd self:capability sys_admin;
dontaudit installd self:capability sys_admin;
...
...
This diff is collapsed.
Click to expand it.
system.te
+
7
−
0
View file @
59d28035
...
@@ -130,6 +130,13 @@ allow system qemu_device:chr_file rw_file_perms;
...
@@ -130,6 +130,13 @@ allow system qemu_device:chr_file rw_file_perms;
allow system data_file_type:dir create_dir_perms;
allow system data_file_type:dir create_dir_perms;
allow system data_file_type:notdevfile_class_set create_file_perms;
allow system data_file_type:notdevfile_class_set create_file_perms;
# Read /file_contexts.
allow system rootfs:file r_file_perms;
# Relabel apk files.
allow system apk_tmp_file:file { relabelfrom relabelto };
allow system apk_data_file:file { relabelfrom relabelto };
# Create a socket for receiving info from wpa.
# Create a socket for receiving info from wpa.
type_transition system wifi_data_file:sock_file system_wpa_socket;
type_transition system wifi_data_file:sock_file system_wpa_socket;
allow system system_wpa_socket:sock_file create_file_perms;
allow system system_wpa_socket:sock_file create_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment