Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
7676d3d9
Commit
7676d3d9
authored
9 years ago
by
Jeff Vander Stoep
Committed by
android-build-merger
9 years ago
Browse files
Options
Downloads
Plain Diff
domain: grant write perms to cgroups
am:
be0616ba
* commit '
be0616ba
': domain: grant write perms to cgroups
parents
a321dde8
be0616ba
No related branches found
No related tags found
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
bootanim.te
+0
-4
0 additions, 4 deletions
bootanim.te
domain.te
+4
-0
4 additions, 0 deletions
domain.te
domain_deprecated.te
+0
-4
0 additions, 4 deletions
domain_deprecated.te
with
4 additions
and
8 deletions
bootanim.te
+
0
−
4
View file @
7676d3d9
...
...
@@ -18,10 +18,6 @@ allow bootanim audio_device:chr_file rw_file_perms;
allow bootanim surfaceflinger_service:service_manager find;
# For /acct/uid/*/tasks.
allow bootanim cgroup:dir { search write };
allow bootanim cgroup:file w_file_perms;
# Allow access to ion memory allocation device
allow bootanim ion_device:chr_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
domain.te
+
4
−
0
View file @
7676d3d9
...
...
@@ -121,6 +121,10 @@ allow domain selinuxfs:file getattr;
allow domain sysfs:dir search;
allow domain selinuxfs:filesystem getattr;
# For /acct/uid/*/tasks.
allow domain cgroup:dir { search write };
allow domain cgroup:file w_file_perms;
# Almost all processes log tracing information to
# /sys/kernel/debug/tracing/trace_marker
# The reason behind this is documented in b/6513400
...
...
This diff is collapsed.
Click to expand it.
domain_deprecated.te
+
0
−
4
View file @
7676d3d9
...
...
@@ -49,10 +49,6 @@ allow domain_deprecated cache_file:dir r_dir_perms;
allow domain_deprecated cache_file:file { getattr read };
allow domain_deprecated cache_file:lnk_file r_file_perms;
# For /acct/uid/*/tasks.
allow domain_deprecated cgroup:dir { search write };
allow domain_deprecated cgroup:file w_file_perms;
#Allow access to ion memory allocation device
allow domain_deprecated ion_device:chr_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment