Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
d15ac5ba
Commit
d15ac5ba
authored
7 years ago
by
John Stultz
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
sepolicy: Define and allow map permission for vendor dir am:
24537b2e
am:
e63f7f32
am:
01cd12a0
Change-Id: I4318fedbee9c45b7a3b738743dfac59a76329336
parents
9d974c1f
01cd12a0
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
public/domain.te
+4
-4
4 additions, 4 deletions
public/domain.te
public/te_macros
+2
-2
2 additions, 2 deletions
public/te_macros
with
6 additions
and
6 deletions
public/domain.te
+
4
−
4
View file @
d15ac5ba
...
...
@@ -106,7 +106,7 @@ allow domain system_file:lnk_file { getattr read };
# devices
not_full_treble(`
allow domain vendor_file_type:dir { search getattr };
allow domain vendor_file_type:file { execute read open getattr };
allow domain vendor_file_type:file { execute read open getattr
map
};
allow domain vendor_file_type:lnk_file { getattr read };
')
...
...
@@ -117,12 +117,12 @@ allow domain vendor_hal_file:dir r_dir_perms;
# Everyone can read and execute all same process HALs
allow domain same_process_hal_file:dir r_dir_perms;
allow domain same_process_hal_file:file { execute read open getattr };
allow domain same_process_hal_file:file { execute read open getattr
map
};
# Any process can load vndk-sp libraries, which are system libraries
# used by same process HALs
allow domain vndk_sp_file:dir r_dir_perms;
allow domain vndk_sp_file:file { execute read open getattr };
allow domain vndk_sp_file:file { execute read open getattr
map
};
# All domains get access to /vendor/etc
allow domain vendor_configs_file:dir r_dir_perms;
...
...
@@ -139,7 +139,7 @@ full_treble_only(`
# Allow reading and executing out of /vendor to all vendor domains
allow { domain -coredomain } vendor_file_type:dir r_dir_perms;
allow { domain -coredomain } vendor_file_type:file { read open getattr execute };
allow { domain -coredomain } vendor_file_type:file { read open getattr execute
map
};
allow { domain -coredomain } vendor_file_type:lnk_file { getattr read };
')
...
...
This diff is collapsed.
Click to expand it.
public/te_macros
+
2
−
2
View file @
d15ac5ba
...
...
@@ -236,7 +236,7 @@ typeattribute $1 $2;
# Find passthrough HAL implementations
allow $2 system_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:file { read open getattr execute };
allow $2 vendor_file:file { read open getattr execute
map
};
')
')
...
...
@@ -255,7 +255,7 @@ typeattribute $1 $2;
# Find passthrough HAL implementations
allow $2 system_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:file { read open getattr execute };
allow $2 vendor_file:file { read open getattr execute
map
};
')
#####################################
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment