Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
68e31786
Commit
68e31786
authored
7 years ago
by
Paul Crowley
Committed by
Gerrit Code Review
7 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Allow access to the metadata partition for metadata encryption."
parents
64271de1
ab318e30
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
private/e2fs.te
+3
-0
3 additions, 0 deletions
private/e2fs.te
private/fsck.te
+2
-0
2 additions, 0 deletions
private/fsck.te
public/domain.te
+8
-2
8 additions, 2 deletions
public/domain.te
public/fsck.te
+0
-1
0 additions, 1 deletion
public/fsck.te
with
13 additions
and
3 deletions
private/e2fs.te
0 → 100644
+
3
−
0
View file @
68e31786
allow e2fs devpts:chr_file { read write };
allow e2fs metadata_block_device:blk_file rw_file_perms;
This diff is collapsed.
Click to expand it.
private/fsck.te
+
2
−
0
View file @
68e31786
typeattribute fsck coredomain;
init_daemon_domain(fsck)
allow fsck metadata_block_device:blk_file rw_file_perms;
This diff is collapsed.
Click to expand it.
public/domain.te
+
8
−
2
View file @
68e31786
...
...
@@ -556,8 +556,14 @@ neverallow {
# The metadata block device is set aside for device encryption and
# verified boot metadata. It may be reset at will and should not
# be used by other domains.
neverallow { domain -init -recovery -vold } metadata_block_device:blk_file
{ append link rename write open read ioctl lock };
neverallow {
domain
-init
-recovery
-vold
-e2fs
-fsck
} metadata_block_device:blk_file { append link rename write open read ioctl lock };
# No domain other than recovery and update_engine can write to system partition(s).
neverallow { domain -recovery -update_engine } system_block_device:blk_file { write append };
...
...
This diff is collapsed.
Click to expand it.
public/fsck.te
+
0
−
1
View file @
68e31786
...
...
@@ -44,7 +44,6 @@ allow fsck rootfs:dir r_dir_perms;
neverallow fsck {
boot_block_device
frp_block_device
metadata_block_device
recovery_block_device
root_block_device
swap_block_device
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment