Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
f7895a5e
Commit
f7895a5e
authored
7 years ago
by
Jeff Sharkey
Committed by
Android (Google) Code Review
7 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Move vdc commands over to Binder."
parents
bb03d751
06b1fd66
No related branches found
No related tags found
Loading
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
public/vdc.te
+9
-0
9 additions, 0 deletions
public/vdc.te
public/vold.te
+2
-2
2 additions, 2 deletions
public/vold.te
with
11 additions
and
2 deletions
public/vdc.te
+
9
−
0
View file @
f7895a5e
...
@@ -8,16 +8,20 @@
...
@@ -8,16 +8,20 @@
type vdc, domain;
type vdc, domain;
type vdc_exec, exec_type, file_type;
type vdc_exec, exec_type, file_type;
# TODO: remove as part of 13758960
unix_socket_connect(vdc, vold, vold)
unix_socket_connect(vdc, vold, vold)
# vdc sends information back to dumpstate when "adb bugreport" is used
# vdc sends information back to dumpstate when "adb bugreport" is used
# TODO: remove as part of 13758960
allow vdc dumpstate:fd use;
allow vdc dumpstate:fd use;
allow vdc dumpstate:unix_stream_socket { read write getattr };
allow vdc dumpstate:unix_stream_socket { read write getattr };
# vdc information is written to shell owned bugreport files
# vdc information is written to shell owned bugreport files
# TODO: remove as part of 13758960
allow vdc shell_data_file:file { write getattr };
allow vdc shell_data_file:file { write getattr };
# Why?
# Why?
# TODO: remove as part of 13758960
allow vdc dumpstate:unix_dgram_socket { read write };
allow vdc dumpstate:unix_dgram_socket { read write };
# vdc can be invoked with logwrapper, so let it write to pty
# vdc can be invoked with logwrapper, so let it write to pty
...
@@ -25,3 +29,8 @@ allow vdc devpts:chr_file rw_file_perms;
...
@@ -25,3 +29,8 @@ allow vdc devpts:chr_file rw_file_perms;
# vdc writes directly to kmsg during the boot process
# vdc writes directly to kmsg during the boot process
allow vdc kmsg_device:chr_file w_file_perms;
allow vdc kmsg_device:chr_file w_file_perms;
# vdc talks to vold over Binder
binder_use(vdc)
binder_call(vdc, vold)
allow vdc vold_service:service_manager find;
This diff is collapsed.
Click to expand it.
public/vold.te
+
2
−
2
View file @
f7895a5e
...
@@ -198,8 +198,8 @@ neverallow { domain -vold -init } vold_data_file:dir *;
...
@@ -198,8 +198,8 @@ neverallow { domain -vold -init } vold_data_file:dir *;
neverallow { domain -vold -init -kernel } vold_data_file:notdevfile_class_set *;
neverallow { domain -vold -init -kernel } vold_data_file:notdevfile_class_set *;
neverallow { domain -vold -init } restorecon_prop:property_service set;
neverallow { domain -vold -init } restorecon_prop:property_service set;
# Only system_server can interact with vold over binder
# Only system_server
and vdc
can interact with vold over binder
neverallow { domain -system_server -vold } vold_service:service_manager find;
neverallow { domain -system_server
-vdc
-vold } vold_service:service_manager find;
neverallow vold {
neverallow vold {
domain
domain
-hal_keymaster
-hal_keymaster
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment