Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
8f32e3f6
Commit
8f32e3f6
authored
12 years ago
by
gcondra@google.com
Committed by
Android Git Automerger
12 years ago
Browse files
Options
Downloads
Plain Diff
am
16203678
: am
9504a507
: Allow ADB to interact extensively with system_data_files.
* commit '
16203678
': Allow ADB to interact extensively with system_data_files.
parents
38c5cba7
16203678
No related branches found
No related tags found
No related merge requests found
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
adbd.te
+4
-0
4 additions, 0 deletions
adbd.te
system.te
+1
-0
1 addition, 0 deletions
system.te
with
5 additions
and
0 deletions
adbd.te
+
4
−
0
View file @
8f32e3f6
...
...
@@ -31,6 +31,10 @@ domain_auto_trans(adbd, shell_exec, shell)
# Do not sanitize the environment of the shell.
allow adbd shell:process noatsecure;
# XXX Mostly to access system properties and keys- maybe those should be their own type?
allow adbd system_data_file:file create_file_perms;
allow adbd system_data_file:dir create_dir_perms;
# Perform binder IPC to surfaceflinger (screencap)
# XXX Run screencap in a separate domain?
binder_use(adbd)
...
...
This diff is collapsed.
Click to expand it.
system.te
+
1
−
0
View file @
8f32e3f6
...
...
@@ -140,6 +140,7 @@ allow system urandom_device:chr_file rw_file_perms;
allow system usbaccessory_device:chr_file rw_file_perms;
allow system video_device:chr_file rw_file_perms;
allow system qemu_device:chr_file rw_file_perms;
allow system devpts:chr_file rw_file_perms;
# tun device used for 3rd party vpn apps
allow system tun_device:chr_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment