Skip to content
Snippets Groups Projects
Commit a62d5c66 authored by Stephen Smalley's avatar Stephen Smalley Committed by Nick Kralevich
Browse files

Drop obsolete comments about SEAndroidManager.


Change-Id: I6b27418507ebd0113a97bea81f37e4dc1de6da14
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent c0845036
No related branches found
No related tags found
No related merge requests found
...@@ -133,7 +133,6 @@ neverallow { appdomain -unconfineddomain } dev_type:blk_file { read write }; ...@@ -133,7 +133,6 @@ neverallow { appdomain -unconfineddomain } dev_type:blk_file { read write };
neverallow { appdomain -unconfineddomain } kmem_device:chr_file { read write }; neverallow { appdomain -unconfineddomain } kmem_device:chr_file { read write };
# Setting SELinux enforcing status or booleans. # Setting SELinux enforcing status or booleans.
# Conditionally allowed to system_app for SEAndroidManager.
neverallow { appdomain -unconfineddomain } kernel:security { setenforce setbool }; neverallow { appdomain -unconfineddomain } kernel:security { setenforce setbool };
# Load security policy. # Load security policy.
......
...@@ -68,7 +68,6 @@ neverallow netd dev_type:blk_file { read write }; ...@@ -68,7 +68,6 @@ neverallow netd dev_type:blk_file { read write };
neverallow netd kmem_device:chr_file { read write }; neverallow netd kmem_device:chr_file { read write };
# Setting SELinux enforcing status or booleans. # Setting SELinux enforcing status or booleans.
# Conditionally allowed to system_app for SEAndroidManager.
neverallow netd kernel:security { setenforce setbool }; neverallow netd kernel:security { setenforce setbool };
# Load security policy. # Load security policy.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment