Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
997fcf16
Commit
997fcf16
authored
7 years ago
by
Chenbo Feng
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Allow netd to read the /dev/xt_qtaguid" am:
cd753d11
am:
a6966554
Change-Id: I8c09069290ffe1827212206b81616e9302bfe7ea
parents
51871966
a6966554
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
public/netd.te
+2
-0
2 additions, 0 deletions
public/netd.te
with
2 additions
and
0 deletions
public/netd.te
+
2
−
0
View file @
997fcf16
...
@@ -37,6 +37,8 @@ allow netd system_file:file lock;
...
@@ -37,6 +37,8 @@ allow netd system_file:file lock;
# TODO: Add proper rules to prevent other process to access qtaguid_proc file after migration
# TODO: Add proper rules to prevent other process to access qtaguid_proc file after migration
# complete
# complete
allow netd qtaguid_proc:file rw_file_perms;
allow netd qtaguid_proc:file rw_file_perms;
# Allow netd to read /dev/qtaguid. This is the same privilege level that normal apps have.
allow netd qtaguid_device:chr_file r_file_perms;
r_dir_file(netd, proc_net)
r_dir_file(netd, proc_net)
# For /proc/sys/net/ipv[46]/route/flush.
# For /proc/sys/net/ipv[46]/route/flush.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment