Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
E external_sepolicy
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • halo
  • external_sepolicy
  • Repository

Switch branch/tag
  • external_sepolicy
  • access_vectors
Find file BlameHistoryPermalink
  • Woojung Min's avatar
    Add audit_read permission to capability2 · 3198cb51
    Woojung Min authored Oct 01, 2015
    In kernel 3.18 following error message is seen
    since audit_read is added to capability2 at classmap.h
    So add audit_read permission to capability2.
    
    SELinux:  Permission audit_read in class capability2 not defined in policy.
    SELinux: the above unknown classes and permissions will be denied
    
    The kernel change from AOSP is:
    https://android.googlesource.com/kernel/common/+/3a101b8de0d39403b2c7e5c23fd0b005668acf48%5E%21/security/selinux/include/classmap.h
    
    
    
    Change-Id: I236fbb8ac575c5cb8df097014da6395e20378175
    Signed-off-by: default avatarWoojung Min <wmin@nvidia.com>
    3198cb51
access_vectors 6.21 KB
EditWeb IDE

Replace access_vectors

Attach a file by drag & drop or click to upload


Cancel
A new branch will be created in your fork and a new merge request will be started.