aboutsummaryrefslogtreecommitdiff
path: root/en/security/selinux/customize.html
diff options
context:
space:
mode:
authorAndroid Partner Docs <noreply@android.com>2017-06-13 21:04:48 +0000
committerandroid-build-merger <android-build-merger@google.com>2017-06-13 21:04:48 +0000
commit6ccb9c7cc8450031ad567d3c9776484b50db738b (patch)
tree7f6d4c62e59afb217fa73d96441bdc0d5478e586 /en/security/selinux/customize.html
parent5bb2fb12897c2c887e0808f9b794557f461b04d3 (diff)
parentc391221fea1ab8d0d0fafc0d9a5d099583bcd379 (diff)
downloadsource.android.com-6ccb9c7cc8450031ad567d3c9776484b50db738b.tar.gz
Merge "Docs: Changes to source.android.com" am: 0a9ccdf0b0
am: c391221fea Change-Id: I40a59e562166dc00442d2098fca6cddfad1f8b4c
Diffstat (limited to 'en/security/selinux/customize.html')
-rw-r--r--en/security/selinux/customize.html6
1 files changed, 3 insertions, 3 deletions
diff --git a/en/security/selinux/customize.html b/en/security/selinux/customize.html
index c8ead37c..294d4040 100644
--- a/en/security/selinux/customize.html
+++ b/en/security/selinux/customize.html
@@ -100,7 +100,7 @@ should supply the modifications to the default SELinux policy as a <a href="/sou
<p>In the following example, all domains are granted access to read from or write to <code>/dev/null</code> and read from <code>/dev/zero</code>.</p>
-<pre>
+<pre class="devsite-click-to-copy">
# Allow read / write access to /dev/null
allow domain null_device:chr_file { getattr open read ioctl lock append write};
@@ -111,7 +111,7 @@ allow domain zero_device:chr_file { getattr open read ioctl lock };
<p>This same statement can be written with SELinux <code>*_file_perms</code> macros (shorthand):</p>
-<pre>
+<pre class="devsite-click-to-copy">
# Allow read / write access to /dev/null
allow domain null_device:chr_file rw_file_perms;
@@ -123,7 +123,7 @@ allow domain zero_device:chr_file r_file_perms;
<p>Here is a complete example policy for DHCP, which we examine below:</p>
-<pre>
+<pre class="devsite-click-to-copy">
type dhcp, domain;
permissive dhcp;
type dhcp_exec, exec_type, file_type;