Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
dde428a9
Commit
dde428a9
authored
10 years ago
by
Nick Kralevich
Committed by
Gerrit Code Review
10 years ago
Browse files
Options
Downloads
Plain Diff
Merge "More recovery rules"
parents
3d2eb27d
03dbf07a
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
recovery.te
+22
-2
22 additions, 2 deletions
recovery.te
with
22 additions
and
2 deletions
recovery.te
+
22
−
2
View file @
dde428a9
...
@@ -10,10 +10,13 @@ recovery_only(`
...
@@ -10,10 +10,13 @@ recovery_only(`
allow recovery rootfs:file entrypoint;
allow recovery rootfs:file entrypoint;
permissive_or_unconfined(recovery)
permissive_or_unconfined(recovery)
allow recovery self:capability { chown dac_override fowner fsetid sys_admin };
# Set security contexts on files that are not known to the loaded policy.
# Set security contexts on files that are not known to the loaded policy.
allow recovery self:capability2 mac_admin;
allow recovery self:capability2 mac_admin;
# Mount filesystems.
# Mount filesystems.
allow recovery rootfs:dir mounton;
allow recovery fs_type:filesystem *;
allow recovery fs_type:filesystem *;
allow recovery unlabeled:filesystem *;
allow recovery unlabeled:filesystem *;
...
@@ -22,15 +25,32 @@ recovery_only(`
...
@@ -22,15 +25,32 @@ recovery_only(`
allow recovery system_file:{ file dir lnk_file } { create write setattr relabelfrom relabelto append unlink link rename };
allow recovery system_file:{ file dir lnk_file } { create write setattr relabelfrom relabelto append unlink link rename };
# Required to e.g. wipe userdata/cache.
# Required to e.g. wipe userdata/cache.
allow recovery block_device:dir r_dir_perms;
allow recovery dev_type:blk_file rw_file_perms;
allow recovery dev_type:blk_file rw_file_perms;
# GUI
# GUI
allow recovery self:process execmem;
allow recovery self:process execmem;
allow recovery ashmem_device:chr_file execute;
allow recovery ashmem_device:chr_file execute;
allow recovery graphics_device:chr_file rw_file_perms;
allow recovery graphics_device:dir r_dir_perms;
allow recovery input_device:dir r_dir_perms;
allow recovery input_device:chr_file r_file_perms;
# Create /tmp/recovery.log and execute /tmp/update_binary.
allow recovery tmpfs:file { create_file_perms x_file_perms };
allow recovery tmpfs:dir create_dir_perms;
# Execute /tmp/update_binary.
# Manage files on /cache
allow recovery tmpfs:file rx_file_perms;
allow recovery cache_file:dir create_dir_perms;
allow recovery cache_file:file create_file_perms;
# Reboot the device
allow recovery powerctl_prop:property_service set;
unix_socket_connect(recovery, property, init)
# Use setfscreatecon() to label files for OTA updates.
# Use setfscreatecon() to label files for OTA updates.
allow recovery self:process setfscreate;
allow recovery self:process setfscreate;
wakelock_use(recovery)
allow recovery kernel:process setsched;
')
')
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment