diff options
author | alk3pInjection <webmaster@raspii.tech> | 2022-05-01 21:36:16 +0800 |
---|---|---|
committer | alk3pInjection <webmaster@raspii.tech> | 2022-05-01 21:36:16 +0800 |
commit | 329b113bc1329f83fe1eecd32213435f8885ca71 (patch) | |
tree | af249b7fce9300b5248cbffe94a08d48fb919f73 /prebuilts/api/32.0/private/kernel.te | |
parent | 18c07b58901c9d0e7fc0d908ed38146847bab5b3 (diff) | |
parent | d7b93dbd049c0eacfb7ad14677457836c79b38f6 (diff) |
Merge tag 'LA.QSSI.12.0.r1-06800-qssi.0' into sugisawa-mr1HEADsugisawa-mr1
"LA.QSSI.12.0.r1-06800-qssi.0"
Change-Id: I35dbb71151ce8b3bf68b425732a761532c638017
Diffstat (limited to 'prebuilts/api/32.0/private/kernel.te')
-rw-r--r-- | prebuilts/api/32.0/private/kernel.te | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/prebuilts/api/32.0/private/kernel.te b/prebuilts/api/32.0/private/kernel.te new file mode 100644 index 000000000..534116343 --- /dev/null +++ b/prebuilts/api/32.0/private/kernel.te @@ -0,0 +1,33 @@ +typeattribute kernel coredomain; + +domain_auto_trans(kernel, init_exec, init) +domain_auto_trans(kernel, snapuserd_exec, snapuserd) + +# Allow the kernel to read otapreopt_chroot's file descriptors and files under +# /postinstall, as it uses apexd logic to mount APEX packages in /postinstall/apex. +allow kernel otapreopt_chroot:fd use; +allow kernel postinstall_file:file read; + +# The following sections are for the transition period during a Virtual A/B +# OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct +# context, and with properly labelled devices. This must be done before +# enabling enforcement, eg, in permissive mode while still in the kernel +# context. +allow kernel tmpfs:blk_file { getattr relabelfrom }; +allow kernel tmpfs:chr_file { getattr relabelfrom }; +allow kernel tmpfs:lnk_file { getattr relabelfrom }; +allow kernel tmpfs:dir { open read relabelfrom }; + +allow kernel block_device:blk_file relabelto; +allow kernel block_device:lnk_file relabelto; +allow kernel dm_device:chr_file relabelto; +allow kernel dm_device:blk_file relabelto; +allow kernel dm_user_device:dir { read open search relabelto }; +allow kernel dm_user_device:chr_file relabelto; +allow kernel kmsg_device:chr_file relabelto; +allow kernel null_device:chr_file relabelto; +allow kernel random_device:chr_file relabelto; +allow kernel snapuserd_exec:file relabelto; + +allow kernel kmsg_device:chr_file write; +allow kernel gsid:fd use; |