Drop obsolete comments about SEAndroidManager.
Change-Id: I6b27418507ebd0113a97bea81f37e4dc1de6da14 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
This commit is contained in:
parent
c0845036cc
commit
a62d5c6679
2 changed files with 0 additions and 2 deletions
1
app.te
1
app.te
|
@ -133,7 +133,6 @@ neverallow { appdomain -unconfineddomain } dev_type:blk_file { read write };
|
|||
neverallow { appdomain -unconfineddomain } kmem_device:chr_file { read write };
|
||||
|
||||
# Setting SELinux enforcing status or booleans.
|
||||
# Conditionally allowed to system_app for SEAndroidManager.
|
||||
neverallow { appdomain -unconfineddomain } kernel:security { setenforce setbool };
|
||||
|
||||
# Load security policy.
|
||||
|
|
1
netd.te
1
netd.te
|
@ -68,7 +68,6 @@ neverallow netd dev_type:blk_file { read write };
|
|||
neverallow netd kmem_device:chr_file { read write };
|
||||
|
||||
# Setting SELinux enforcing status or booleans.
|
||||
# Conditionally allowed to system_app for SEAndroidManager.
|
||||
neverallow netd kernel:security { setenforce setbool };
|
||||
|
||||
# Load security policy.
|
||||
|
|
Loading…
Reference in a new issue