Skip to content
Snippets Groups Projects
Commit 3e23ae97 authored by Treehugger Robot's avatar Treehugger Robot Committed by android-build-merger
Browse files

Merge "reduce duplicate SELinux rules" am: b4720ae7

am: d266768a

* commit 'd266768a':
  reduce duplicate SELinux rules

Change-Id: Id2ebcc7fb73442f34b643f074c7317ebfe60c41c
parents 42982013 d266768a
No related branches found
No related tags found
No related merge requests found
...@@ -121,9 +121,6 @@ allow system_server node:rawip_socket node_bind; ...@@ -121,9 +121,6 @@ allow system_server node:rawip_socket node_bind;
# 3rd party VPN clients require a tun_socket to be created # 3rd party VPN clients require a tun_socket to be created
allow system_server self:tun_socket create_socket_perms; allow system_server self:tun_socket create_socket_perms;
# Notify init of death.
allow system_server init:process sigchld;
# Talk to init and various daemons via sockets. # Talk to init and various daemons via sockets.
unix_socket_connect(system_server, installd, installd) unix_socket_connect(system_server, installd, installd)
unix_socket_connect(system_server, lmkd, lmkd) unix_socket_connect(system_server, lmkd, lmkd)
......
...@@ -13,7 +13,7 @@ allow $1 $3:process transition; ...@@ -13,7 +13,7 @@ allow $1 $3:process transition;
# New domain is entered by executing the file. # New domain is entered by executing the file.
allow $3 $2:file { entrypoint open read execute getattr }; allow $3 $2:file { entrypoint open read execute getattr };
# New domain can send SIGCHLD to its caller. # New domain can send SIGCHLD to its caller.
allow $3 $1:process sigchld; ifelse($1, `init', `', `allow $3 $1:process sigchld;')
# Enable AT_SECURE, i.e. libc secure mode. # Enable AT_SECURE, i.e. libc secure mode.
dontaudit $1 $3:process noatsecure; dontaudit $1 $3:process noatsecure;
# XXX dontaudit candidate but requires further study. # XXX dontaudit candidate but requires further study.
......
...@@ -8,7 +8,6 @@ tmpfs_domain(ueventd) ...@@ -8,7 +8,6 @@ tmpfs_domain(ueventd)
type_transition ueventd device:chr_file klog_device "__kmsg__"; type_transition ueventd device:chr_file klog_device "__kmsg__";
allow ueventd klog_device:chr_file { create open write unlink }; allow ueventd klog_device:chr_file { create open write unlink };
allow ueventd init:process sigchld;
allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner }; allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
allow ueventd device:file create_file_perms; allow ueventd device:file create_file_perms;
allow ueventd device:chr_file rw_file_perms; allow ueventd device:chr_file rw_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment