Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
c4121add
Commit
c4121add
authored
9 years ago
by
Narayan Kamath
Committed by
Gerrit Code Review
9 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Revert "Remove domain_deprecated from sdcard domains""
parents
be0616ba
f4d7eef7
No related branches found
No related tags found
No related merge requests found
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
blkid.te
+1
-4
1 addition, 4 deletions
blkid.te
blkid_untrusted.te
+1
-1
1 addition, 1 deletion
blkid_untrusted.te
fsck.te
+1
-3
1 addition, 3 deletions
fsck.te
fsck_untrusted.te
+1
-1
1 addition, 1 deletion
fsck_untrusted.te
sdcardd.te
+1
-1
1 addition, 1 deletion
sdcardd.te
sgdisk.te
+1
-1
1 addition, 1 deletion
sgdisk.te
with
6 additions
and
11 deletions
blkid.te
+
1
−
4
View file @
c4121add
# blkid called from vold
# blkid called from vold
type blkid, domain;
type blkid, domain
, domain_deprecated
;
type blkid_exec, exec_type, file_type;
type blkid_exec, exec_type, file_type;
# Allowed read-only access to encrypted devices to extract UUID/label
# Allowed read-only access to encrypted devices to extract UUID/label
...
@@ -14,9 +14,6 @@ allow blkid vold:fifo_file { read write getattr };
...
@@ -14,9 +14,6 @@ allow blkid vold:fifo_file { read write getattr };
# For blkid launched through popen()
# For blkid launched through popen()
allow blkid blkid_exec:file rx_file_perms;
allow blkid blkid_exec:file rx_file_perms;
# access to /proc/filesystems
allow blkid proc:file r_file_perms;
# Only allow entry from vold
# Only allow entry from vold
neverallow { domain -vold } blkid:process transition;
neverallow { domain -vold } blkid:process transition;
neverallow domain blkid:process dyntransition;
neverallow domain blkid:process dyntransition;
...
...
This diff is collapsed.
Click to expand it.
blkid_untrusted.te
+
1
−
1
View file @
c4121add
# blkid for untrusted block devices
# blkid for untrusted block devices
type blkid_untrusted, domain;
type blkid_untrusted, domain
, domain_deprecated
;
# Allowed read-only access to vold block devices to extract UUID/label
# Allowed read-only access to vold block devices to extract UUID/label
allow blkid_untrusted block_device:dir search;
allow blkid_untrusted block_device:dir search;
...
...
This diff is collapsed.
Click to expand it.
fsck.te
+
1
−
3
View file @
c4121add
# Any fsck program run by init
# Any fsck program run by init
type fsck, domain;
type fsck, domain
, domain_deprecated
;
type fsck_exec, exec_type, file_type;
type fsck_exec, exec_type, file_type;
init_daemon_domain(fsck)
init_daemon_domain(fsck)
...
@@ -24,8 +24,6 @@ allow fsck dm_device:blk_file rw_file_perms;
...
@@ -24,8 +24,6 @@ allow fsck dm_device:blk_file rw_file_perms;
# fsck performs a stat() on swap to verify that it is a valid
# fsck performs a stat() on swap to verify that it is a valid
# swap device before setting the EXT2_MF_SWAP mount flag.
# swap device before setting the EXT2_MF_SWAP mount flag.
allow fsck swap_block_device:blk_file getattr;
allow fsck swap_block_device:blk_file getattr;
# access to /proc/swaps
allow fsck proc:file r_file_perms;
###
###
### neverallow rules
### neverallow rules
...
...
This diff is collapsed.
Click to expand it.
fsck_untrusted.te
+
1
−
1
View file @
c4121add
# Any fsck program run on untrusted block devices
# Any fsck program run on untrusted block devices
type fsck_untrusted, domain;
type fsck_untrusted, domain
, domain_deprecated
;
# Inherit and use pty created by android_fork_execvp_ext().
# Inherit and use pty created by android_fork_execvp_ext().
allow fsck_untrusted devpts:chr_file { read write ioctl getattr };
allow fsck_untrusted devpts:chr_file { read write ioctl getattr };
...
...
This diff is collapsed.
Click to expand it.
sdcardd.te
+
1
−
1
View file @
c4121add
type sdcardd, domain;
type sdcardd, domain
, domain_deprecated
;
type sdcardd_exec, exec_type, file_type;
type sdcardd_exec, exec_type, file_type;
allow sdcardd cgroup:dir create_dir_perms;
allow sdcardd cgroup:dir create_dir_perms;
...
...
This diff is collapsed.
Click to expand it.
sgdisk.te
+
1
−
1
View file @
c4121add
# sgdisk called from vold
# sgdisk called from vold
type sgdisk, domain;
type sgdisk, domain
, domain_deprecated
;
type sgdisk_exec, exec_type, file_type;
type sgdisk_exec, exec_type, file_type;
# Allowed to read/write low-level partition tables
# Allowed to read/write low-level partition tables
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment