Skip to content
Snippets Groups Projects
Commit d33c1b01 authored by Nick Kralevich's avatar Nick Kralevich
Browse files

resolved conflicts for merge of cc132037 to lmp-mr1-dev-plus-aosp

Change-Id: Iab0baf0d59240095f7ff653618748da4b206959e
parents 70d32587 cc132037
No related branches found
No related tags found
No related merge requests found
...@@ -264,7 +264,7 @@ neverallow { domain -kernel -init -recovery -vold -uncrypt -install_recovery } b ...@@ -264,7 +264,7 @@ neverallow { domain -kernel -init -recovery -vold -uncrypt -install_recovery } b
# Rather force a relabel to a more specific type. # Rather force a relabel to a more specific type.
# init is exempt from this as there are character devices that only it uses. # init is exempt from this as there are character devices that only it uses.
# ueventd is exempt from this, as it is managing these devices. # ueventd is exempt from this, as it is managing these devices.
neverallow { domain -init -ueventd } device:chr_file { open read write }; neverallow { domain -init -ueventd -recovery } device:chr_file { open read write };
# Limit what domains can mount filesystems or change their mount flags. # Limit what domains can mount filesystems or change their mount flags.
# sdcard_type / vfat is exempt as a larger set of domains need # sdcard_type / vfat is exempt as a larger set of domains need
...@@ -299,7 +299,7 @@ neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set ...@@ -299,7 +299,7 @@ neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set
{ create write setattr relabelfrom relabelto append unlink link rename }; { create write setattr relabelfrom relabelto append unlink link rename };
# Nothing should be writing to files in the rootfs. # Nothing should be writing to files in the rootfs.
neverallow domain rootfs:file { create write setattr relabelto append unlink link rename }; neverallow { domain -recovery } rootfs:file { create write setattr relabelto append unlink link rename };
# Restrict context mounts to specific types marked with # Restrict context mounts to specific types marked with
# the contextmount_type attribute. # the contextmount_type attribute.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment