Skip to content
Snippets Groups Projects
Commit cf0d7f66 authored by William Roberts's avatar William Roberts
Browse files

init: avoid lengthy allow rules


Some of the init allow rules were well passed 100 characters and
were difficult to read. Format them to use the one-per-line
set subtraction format as seen in other locations within sepolicy.

Change-Id: Ifeeb3a8a81c4c19bfb1e56e7f2493f817e896eaf
Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
parent fc9e8e25
No related branches found
No related tags found
No related merge requests found
...@@ -98,11 +98,58 @@ allow init rootfs:{ dir file } relabelfrom; ...@@ -98,11 +98,58 @@ allow init rootfs:{ dir file } relabelfrom;
# init.<board>.rc files often include device-specific types, so # init.<board>.rc files often include device-specific types, so
# we just allow all file types except /system files here. # we just allow all file types except /system files here.
allow init self:capability { chown fowner fsetid }; allow init self:capability { chown fowner fsetid };
allow init {file_type -system_file -exec_type -app_data_file}:dir { create search getattr open read setattr ioctl };
allow init {file_type -system_file -exec_type -keystore_data_file -app_data_file -shell_data_file -vold_data_file -misc_logd_file }:dir { write add_name remove_name rmdir relabelfrom }; allow init {
allow init {file_type -system_file -exec_type -keystore_data_file -app_data_file -shell_data_file -vold_data_file -misc_logd_file }:file { create getattr open read write setattr relabelfrom unlink }; file_type
allow init {file_type -system_file -exec_type -keystore_data_file -app_data_file -shell_data_file -vold_data_file -misc_logd_file }:{ sock_file fifo_file } { create getattr open read setattr relabelfrom unlink }; -system_file
allow init {file_type -system_file -exec_type -keystore_data_file -app_data_file -shell_data_file -vold_data_file -misc_logd_file }:lnk_file { create getattr setattr relabelfrom unlink }; -exec_type
-app_data_file
}:dir { create search getattr open read setattr ioctl };
allow init {
file_type
-system_file
-exec_type
-keystore_data_file
-app_data_file
-shell_data_file
-vold_data_file
-misc_logd_file
}:dir { write add_name remove_name rmdir relabelfrom };
allow init {
file_type
-system_file
-exec_type
-keystore_data_file
-app_data_file
-shell_data_file
-vold_data_file
-misc_logd_file
}:file { create getattr open read write setattr relabelfrom unlink };
allow init {
file_type
-system_file
-exec_type
-keystore_data_file
-app_data_file
-shell_data_file
-vold_data_file
-misc_logd_file
}:{ sock_file fifo_file } { create getattr open read setattr relabelfrom unlink };
allow init {
file_type
-system_file
-exec_type
-keystore_data_file
-app_data_file
-shell_data_file
-vold_data_file
-misc_logd_file
}:lnk_file { create getattr setattr relabelfrom unlink };
allow init {file_type -system_file -exec_type}:dir_file_class_set relabelto; allow init {file_type -system_file -exec_type}:dir_file_class_set relabelto;
allow init { sysfs debugfs }:{ dir file lnk_file } { getattr relabelfrom }; allow init { sysfs debugfs }:{ dir file lnk_file } { getattr relabelfrom };
allow init { sysfs_type debugfs_type }:{ dir file lnk_file } relabelto; allow init { sysfs_type debugfs_type }:{ dir file lnk_file } relabelto;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment