Skip to content
Snippets Groups Projects
Commit 7ceb4cce authored by Nick Kralevich's avatar Nick Kralevich
Browse files

Revert "Allow recovery to create device nodes and modify rootfs"

grouper and tilapia are no longer officially supported. Remove
the neverallow rule added for them in bug 18281224.

This reverts commit 1795b665.
parent be1ac548
No related branches found
No related tags found
No related merge requests found
...@@ -262,7 +262,7 @@ neverallow { domain -kernel -init -recovery -vold -uncrypt } block_device:blk_fi ...@@ -262,7 +262,7 @@ neverallow { domain -kernel -init -recovery -vold -uncrypt } block_device:blk_fi
# Rather force a relabel to a more specific type. # Rather force a relabel to a more specific type.
# init is exempt from this as there are character devices that only it uses. # init is exempt from this as there are character devices that only it uses.
# ueventd is exempt from this, as it is managing these devices. # ueventd is exempt from this, as it is managing these devices.
neverallow { domain -init -ueventd -recovery } device:chr_file { open read write }; neverallow { domain -init -ueventd } device:chr_file { open read write };
# Limit what domains can mount filesystems or change their mount flags. # Limit what domains can mount filesystems or change their mount flags.
# sdcard_type / vfat is exempt as a larger set of domains need # sdcard_type / vfat is exempt as a larger set of domains need
...@@ -300,7 +300,7 @@ neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set ...@@ -300,7 +300,7 @@ neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set
neverallow domain { system_file exec_type }:dir_file_class_set mounton; neverallow domain { system_file exec_type }:dir_file_class_set mounton;
# Nothing should be writing to files in the rootfs. # Nothing should be writing to files in the rootfs.
neverallow { domain -recovery } rootfs:file { create write setattr relabelto append unlink link rename }; neverallow domain rootfs:file { create write setattr relabelto append unlink link rename };
# Restrict context mounts to specific types marked with # Restrict context mounts to specific types marked with
# the contextmount_type attribute. # the contextmount_type attribute.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment