Skip to content
Snippets Groups Projects
Commit bac9992e authored by rpcraig's avatar rpcraig Committed by Gerrit Code Review
Browse files

watchdog security policy.


Initial policy for software watchdog daemon
which is started by init.

Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c
Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
parent 1f5939a9
No related branches found
No related tags found
No related merge requests found
......@@ -41,6 +41,7 @@ type fuse_device, dev_type;
type ion_device, dev_type;
type gps_device, dev_type;
type qtaguid_device, dev_type;
type watchdog_device, dev_type;
# All devices have a uart for the hci
# attach service. The uart dev node
......
......@@ -104,6 +104,7 @@
/dev/urandom u:object_r:urandom_device:s0
/dev/vcs[0-9a-z]* u:object_r:vcs_device:s0
/dev/video[0-9]* u:object_r:video_device:s0
/dev/watchdog u:object_r:watchdog_device:s0
/dev/xt_qtaguid u:object_r:qtaguid_device:s0
/dev/zero u:object_r:zero_device:s0
#############################
......
# watchdogd seclabel is specified in init.<board>.rc
type watchdogd, domain;
allow watchdogd rootfs:file { entrypoint r_file_perms };
allow watchdogd self:capability mknod;
allow watchdogd device:dir { add_name write remove_name };
allow watchdogd watchdog_device:chr_file rw_file_perms;
# because of /dev/__kmsg__ and /dev/__null__
allow watchdogd device:chr_file create_file_perms;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment