Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
b4720ae7
Commit
b4720ae7
authored
8 years ago
by
Treehugger Robot
Committed by
Gerrit Code Review
8 years ago
Browse files
Options
Downloads
Plain Diff
Merge "reduce duplicate SELinux rules"
parents
1f690c6a
34936824
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
system_server.te
+0
-3
0 additions, 3 deletions
system_server.te
te_macros
+1
-1
1 addition, 1 deletion
te_macros
ueventd.te
+0
-1
0 additions, 1 deletion
ueventd.te
with
1 addition
and
5 deletions
system_server.te
+
0
−
3
View file @
b4720ae7
...
@@ -111,9 +111,6 @@ allow system_server node:rawip_socket node_bind;
...
@@ -111,9 +111,6 @@ allow system_server node:rawip_socket node_bind;
# 3rd party VPN clients require a tun_socket to be created
# 3rd party VPN clients require a tun_socket to be created
allow system_server self:tun_socket create_socket_perms;
allow system_server self:tun_socket create_socket_perms;
# Notify init of death.
allow system_server init:process sigchld;
# Talk to init and various daemons via sockets.
# Talk to init and various daemons via sockets.
unix_socket_connect(system_server, installd, installd)
unix_socket_connect(system_server, installd, installd)
unix_socket_connect(system_server, lmkd, lmkd)
unix_socket_connect(system_server, lmkd, lmkd)
...
...
This diff is collapsed.
Click to expand it.
te_macros
+
1
−
1
View file @
b4720ae7
...
@@ -13,7 +13,7 @@ allow $1 $3:process transition;
...
@@ -13,7 +13,7 @@ allow $1 $3:process transition;
# New domain is entered by executing the file.
# New domain is entered by executing the file.
allow $3 $2:file { entrypoint open read execute getattr };
allow $3 $2:file { entrypoint open read execute getattr };
# New domain can send SIGCHLD to its caller.
# New domain can send SIGCHLD to its caller.
allow $3 $1:process sigchld;
ifelse($1, `init', `', `
allow $3 $1:process sigchld;
')
# Enable AT_SECURE, i.e. libc secure mode.
# Enable AT_SECURE, i.e. libc secure mode.
dontaudit $1 $3:process noatsecure;
dontaudit $1 $3:process noatsecure;
# XXX dontaudit candidate but requires further study.
# XXX dontaudit candidate but requires further study.
...
...
This diff is collapsed.
Click to expand it.
ueventd.te
+
0
−
1
View file @
b4720ae7
...
@@ -8,7 +8,6 @@ tmpfs_domain(ueventd)
...
@@ -8,7 +8,6 @@ tmpfs_domain(ueventd)
type_transition ueventd device:chr_file klog_device "__kmsg__";
type_transition ueventd device:chr_file klog_device "__kmsg__";
allow ueventd klog_device:chr_file { create open write unlink };
allow ueventd klog_device:chr_file { create open write unlink };
allow ueventd init:process sigchld;
allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
allow ueventd device:file create_file_perms;
allow ueventd device:file create_file_perms;
allow ueventd device:chr_file rw_file_perms;
allow ueventd device:chr_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment