Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
5a6ab596
Commit
5a6ab596
authored
Mar 29, 2017
by
Sandeep Patil
Committed by
android-build-merger
Mar 29, 2017
Browse files
Options
Downloads
Plain Diff
service_contexts: label service_contexts explicitly
am:
939d16b5
Change-Id: I1c351ee36100730bf98a3fe820d1f51f7b672ba5
parents
b81943b6
939d16b5
Branches
Branches containing commit
Tags
android-wear-5.1.1_r0.12
Tags containing commit
No related merge requests found
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
private/adbd.te
+1
-0
1 addition, 0 deletions
private/adbd.te
private/file_contexts
+4
-2
4 additions, 2 deletions
private/file_contexts
public/file.te
+3
-0
3 additions, 0 deletions
public/file.te
public/servicemanager.te
+2
-1
2 additions, 1 deletion
public/servicemanager.te
with
10 additions
and
3 deletions
private/adbd.te
+
1
−
0
View file @
5a6ab596
...
@@ -100,6 +100,7 @@ allow adbd system_file:file r_file_perms;
...
@@ -100,6 +100,7 @@ allow adbd system_file:file r_file_perms;
allow adbd selinuxfs:dir r_dir_perms;
allow adbd selinuxfs:dir r_dir_perms;
allow adbd selinuxfs:file r_file_perms;
allow adbd selinuxfs:file r_file_perms;
allow adbd kernel:security read_policy;
allow adbd kernel:security read_policy;
allow adbd service_contexts_file:file r_file_perms;
allow adbd surfaceflinger_service:service_manager find;
allow adbd surfaceflinger_service:service_manager find;
allow adbd bootchart_data_file:dir search;
allow adbd bootchart_data_file:dir search;
...
...
This diff is collapsed.
Click to expand it.
private/file_contexts
+
4
−
2
View file @
5a6ab596
...
@@ -50,8 +50,8 @@
...
@@ -50,8 +50,8 @@
/nonplat_seapp_contexts u:object_r:rootfs:s0
/nonplat_seapp_contexts u:object_r:rootfs:s0
/plat_seapp_contexts u:object_r:rootfs:s0
/plat_seapp_contexts u:object_r:rootfs:s0
/sepolicy u:object_r:rootfs:s0
/sepolicy u:object_r:rootfs:s0
/plat_service_contexts u:object_r:
rootfs
:s0
/plat_service_contexts u:object_r:
service_contexts_file
:s0
/nonplat_service_contexts u:object_r:
rootfs
:s0
/nonplat_service_contexts u:object_r:
service_contexts_file
:s0
##########################
##########################
# Devices
# Devices
...
@@ -250,12 +250,14 @@
...
@@ -250,12 +250,14 @@
/system/bin/vr_wm u:object_r:vr_wm_exec:s0
/system/bin/vr_wm u:object_r:vr_wm_exec:s0
/system/bin/hw/android\.hidl\.allocator@1\.0-service u:object_r:hal_allocator_default_exec:s0
/system/bin/hw/android\.hidl\.allocator@1\.0-service u:object_r:hal_allocator_default_exec:s0
/system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
/system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
/system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
#############################
#############################
# Vendor files
# Vendor files
#
#
/vendor(/.*)? u:object_r:system_file:s0
/vendor(/.*)? u:object_r:system_file:s0
/vendor/etc/selinux/nonplat_property_contexts u:object_r:property_contexts_file:s0
/vendor/etc/selinux/nonplat_property_contexts u:object_r:property_contexts_file:s0
/vendor/etc/selinux/nonplat_service_contexts u:object_r:service_contexts_file:s0
#############################
#############################
# OEM and ODM files
# OEM and ODM files
...
...
This diff is collapsed.
Click to expand it.
public/file.te
+
3
−
0
View file @
5a6ab596
...
@@ -259,6 +259,9 @@ type gps_control, file_type;
...
@@ -259,6 +259,9 @@ type gps_control, file_type;
# property_contexts file
# property_contexts file
type property_contexts_file, file_type;
type property_contexts_file, file_type;
# service_contexts file
type service_contexts_file, file_type;
# Allow files to be created in their appropriate filesystems.
# Allow files to be created in their appropriate filesystems.
allow fs_type self:filesystem associate;
allow fs_type self:filesystem associate;
allow sysfs_type sysfs:filesystem associate;
allow sysfs_type sysfs:filesystem associate;
...
...
This diff is collapsed.
Click to expand it.
public/servicemanager.te
+
2
−
1
View file @
5a6ab596
...
@@ -11,7 +11,8 @@ type servicemanager_exec, exec_type, file_type;
...
@@ -11,7 +11,8 @@ type servicemanager_exec, exec_type, file_type;
allow servicemanager self:binder set_context_mgr;
allow servicemanager self:binder set_context_mgr;
allow servicemanager { domain -init }:binder transfer;
allow servicemanager { domain -init }:binder transfer;
r_dir_file(servicemanager, rootfs)
# Access to all (system and vendor) service_contexts
allow servicemanager service_contexts_file:file r_file_perms;
# Check SELinux permissions.
# Check SELinux permissions.
selinux_check_access(servicemanager)
selinux_check_access(servicemanager)
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment