Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
S
sepolicy
Manage
Activity
Members
Plan
Wiki
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Package Registry
Model registry
Operate
Terraform modules
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
CodeLinaro
public-release-test
platform
system
sepolicy
Commits
9c66416f
Commit
9c66416f
authored
7 years ago
by
TreeHugger Robot
Committed by
Android (Google) Code Review
7 years ago
Browse files
Options
Downloads
Plain Diff
Merge "sepolicy: Define and allow map permission for vendor dir" into oc-mr1-dev
parents
cdf186e4
9f3f3784
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
public/domain.te
+4
-4
4 additions, 4 deletions
public/domain.te
public/te_macros
+2
-2
2 additions, 2 deletions
public/te_macros
with
6 additions
and
6 deletions
public/domain.te
+
4
−
4
View file @
9c66416f
...
@@ -106,7 +106,7 @@ allow domain system_file:lnk_file { getattr read };
...
@@ -106,7 +106,7 @@ allow domain system_file:lnk_file { getattr read };
# devices
# devices
not_full_treble(`
not_full_treble(`
allow domain vendor_file_type:dir { search getattr };
allow domain vendor_file_type:dir { search getattr };
allow domain vendor_file_type:file { execute read open getattr };
allow domain vendor_file_type:file { execute read open getattr
map
};
allow domain vendor_file_type:lnk_file { getattr read };
allow domain vendor_file_type:lnk_file { getattr read };
')
')
...
@@ -117,12 +117,12 @@ allow domain vendor_hal_file:dir r_dir_perms;
...
@@ -117,12 +117,12 @@ allow domain vendor_hal_file:dir r_dir_perms;
# Everyone can read and execute all same process HALs
# Everyone can read and execute all same process HALs
allow domain same_process_hal_file:dir r_dir_perms;
allow domain same_process_hal_file:dir r_dir_perms;
allow domain same_process_hal_file:file { execute read open getattr };
allow domain same_process_hal_file:file { execute read open getattr
map
};
# Any process can load vndk-sp libraries, which are system libraries
# Any process can load vndk-sp libraries, which are system libraries
# used by same process HALs
# used by same process HALs
allow domain vndk_sp_file:dir r_dir_perms;
allow domain vndk_sp_file:dir r_dir_perms;
allow domain vndk_sp_file:file { execute read open getattr };
allow domain vndk_sp_file:file { execute read open getattr
map
};
# All domains get access to /vendor/etc
# All domains get access to /vendor/etc
allow domain vendor_configs_file:dir r_dir_perms;
allow domain vendor_configs_file:dir r_dir_perms;
...
@@ -139,7 +139,7 @@ full_treble_only(`
...
@@ -139,7 +139,7 @@ full_treble_only(`
# Allow reading and executing out of /vendor to all vendor domains
# Allow reading and executing out of /vendor to all vendor domains
allow { domain -coredomain } vendor_file_type:dir r_dir_perms;
allow { domain -coredomain } vendor_file_type:dir r_dir_perms;
allow { domain -coredomain } vendor_file_type:file { read open getattr execute };
allow { domain -coredomain } vendor_file_type:file { read open getattr execute
map
};
allow { domain -coredomain } vendor_file_type:lnk_file { getattr read };
allow { domain -coredomain } vendor_file_type:lnk_file { getattr read };
')
')
...
...
This diff is collapsed.
Click to expand it.
public/te_macros
+
2
−
2
View file @
9c66416f
...
@@ -234,7 +234,7 @@ typeattribute $1 $2;
...
@@ -234,7 +234,7 @@ typeattribute $1 $2;
# Find passthrough HAL implementations
# Find passthrough HAL implementations
allow $2 system_file:dir r_dir_perms;
allow $2 system_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:file { read open getattr execute };
allow $2 vendor_file:file { read open getattr execute
map
};
')
')
')
')
...
@@ -253,7 +253,7 @@ typeattribute $1 $2;
...
@@ -253,7 +253,7 @@ typeattribute $1 $2;
# Find passthrough HAL implementations
# Find passthrough HAL implementations
allow $2 system_file:dir r_dir_perms;
allow $2 system_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:dir r_dir_perms;
allow $2 vendor_file:file { read open getattr execute };
allow $2 vendor_file:file { read open getattr execute
map
};
')
')
#####################################
#####################################
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment