Skip to content
Snippets Groups Projects
Commit 57247153 authored by Stephen Smalley's avatar Stephen Smalley Committed by android-build-merger
Browse files

Merge "sepolicy: Define and allow map permission" am: 770214ab

am: 90f46dd9

Change-Id: I8ce1862e574d6890bf2b4eb0d1e2e8e38f5bb0dd
parents ebd400d3 90f46dd9
No related branches found
No related tags found
No related merge requests found
...@@ -20,6 +20,7 @@ common file ...@@ -20,6 +20,7 @@ common file
relabelfrom relabelfrom
relabelto relabelto
append append
map
unlink unlink
link link
rename rename
...@@ -46,6 +47,7 @@ common socket ...@@ -46,6 +47,7 @@ common socket
relabelfrom relabelfrom
relabelto relabelto
append append
map
# socket-specific # socket-specific
bind bind
connect connect
......
...@@ -99,7 +99,7 @@ write_logd(domain) ...@@ -99,7 +99,7 @@ write_logd(domain)
# System file accesses. # System file accesses.
allow domain system_file:dir { search getattr }; allow domain system_file:dir { search getattr };
allow domain system_file:file { execute read open getattr }; allow domain system_file:file { execute read open getattr map };
allow domain system_file:lnk_file { getattr read }; allow domain system_file:lnk_file { getattr read };
# Make sure system/vendor split doesn not affect non-treble # Make sure system/vendor split doesn not affect non-treble
......
...@@ -18,9 +18,9 @@ define(`ipc_class_set', `{ sem msgq shm ipc }') ...@@ -18,9 +18,9 @@ define(`ipc_class_set', `{ sem msgq shm ipc }')
##################################### #####################################
# Common groupings of permissions. # Common groupings of permissions.
# #
define(`x_file_perms', `{ getattr execute execute_no_trans }') define(`x_file_perms', `{ getattr execute execute_no_trans map }')
define(`r_file_perms', `{ getattr open read ioctl lock }') define(`r_file_perms', `{ getattr open read ioctl lock map }')
define(`w_file_perms', `{ open append write lock }') define(`w_file_perms', `{ open append write lock map }')
define(`rx_file_perms', `{ r_file_perms x_file_perms }') define(`rx_file_perms', `{ r_file_perms x_file_perms }')
define(`ra_file_perms', `{ r_file_perms append }') define(`ra_file_perms', `{ r_file_perms append }')
define(`rw_file_perms', `{ r_file_perms w_file_perms }') define(`rw_file_perms', `{ r_file_perms w_file_perms }')
......
...@@ -8,10 +8,10 @@ ...@@ -8,10 +8,10 @@
# #
define(`domain_trans', ` define(`domain_trans', `
# Old domain may exec the file and transition to the new domain. # Old domain may exec the file and transition to the new domain.
allow $1 $2:file { getattr open read execute }; allow $1 $2:file { getattr open read execute map };
allow $1 $3:process transition; allow $1 $3:process transition;
# New domain is entered by executing the file. # New domain is entered by executing the file.
allow $3 $2:file { entrypoint open read execute getattr }; allow $3 $2:file { entrypoint open read execute getattr map };
# New domain can send SIGCHLD to its caller. # New domain can send SIGCHLD to its caller.
ifelse($1, `init', `', `allow $3 $1:process sigchld;') ifelse($1, `init', `', `allow $3 $1:process sigchld;')
# Enable AT_SECURE, i.e. libc secure mode. # Enable AT_SECURE, i.e. libc secure mode.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment