Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
f8fe149f
Commit
f8fe149f
authored
7 years ago
by
Jeff Vander Stoep
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
Restore recovery's ability to format cache and preserve logs
am:
87dd195b
Change-Id: Id3fde8b3c5901986a25d0e5daba4e34e8e471c93
parents
91bdd48d
87dd195b
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
public/domain.te
+1
-1
1 addition, 1 deletion
public/domain.te
public/recovery.te
+14
-1
14 additions, 1 deletion
public/recovery.te
with
15 additions
and
2 deletions
public/domain.te
+
1
−
1
View file @
f8fe149f
...
...
@@ -239,7 +239,7 @@ neverallowxperm domain domain:socket_class_set ioctl { SIOCATMARK };
neverallowxperm * devpts:chr_file ioctl TIOCSTI;
# Do not allow any domain other than init to create unlabeled files.
neverallow { domain -init } unlabeled:dir_file_class_set create;
neverallow { domain -init
-recovery
} unlabeled:dir_file_class_set create;
# Limit device node creation to these whitelisted domains.
neverallow {
...
...
This diff is collapsed.
Click to expand it.
public/recovery.te
+
14
−
1
View file @
f8fe149f
...
...
@@ -12,7 +12,15 @@ recovery_only(`
# Recovery can only use HALs in passthrough mode
passthrough_hal_client_domain(recovery, hal_bootctl)
allow recovery self:global_capability_class_set { dac_override fowner setuid setgid sys_admin sys_tty_config };
allow recovery self:global_capability_class_set {
chown
dac_override
fowner
setuid
setgid
sys_admin
sys_tty_config
};
# Run helpers from / or /system without changing domain.
r_dir_file(recovery, rootfs)
...
...
@@ -26,6 +34,11 @@ recovery_only(`
allow recovery unlabeled:filesystem ~relabelto;
allow recovery contextmount_type:filesystem relabelto;
# We may be asked to set an SELinux label for a type not known to the
# currently loaded policy. Allow it.
allow recovery unlabeled:{ file lnk_file } { create_file_perms relabelfrom relabelto };
allow recovery unlabeled:dir { create_dir_perms relabelfrom relabelto };
# Get file contexts
allow recovery file_contexts_file:file r_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment