2014-09-23 15:11:30 +02:00
|
|
|
# Any toolbox command run by init.
|
|
|
|
# At present, the only known usage is for running mkswap via fs_mgr.
|
|
|
|
# Do NOT use this domain for toolbox when run by any other domain.
|
|
|
|
type toolbox, domain;
|
|
|
|
type toolbox_exec, exec_type, file_type;
|
|
|
|
permissive_or_unconfined(toolbox)
|
|
|
|
|
|
|
|
init_daemon_domain(toolbox)
|
|
|
|
|
|
|
|
# /dev/__null__ created by init prior to policy load,
|
|
|
|
# open fd inherited by fsck.
|
|
|
|
allow toolbox tmpfs:chr_file { read write ioctl };
|
|
|
|
|
|
|
|
# Inherit and use pty created by android_fork_execvp_ext().
|
2014-12-20 01:19:05 +01:00
|
|
|
allow toolbox devpts:chr_file { read write getattr ioctl };
|
2014-09-23 15:11:30 +02:00
|
|
|
|
|
|
|
# mkswap-specific.
|
|
|
|
# Read/write block devices used for swap partitions.
|
|
|
|
# Assign swap_block_device type any such partition in your
|
|
|
|
# device/<vendor>/<product>/sepolicy/file_contexts file.
|
|
|
|
allow toolbox swap_block_device:blk_file rw_file_perms;
|
|
|
|
|
|
|
|
# Only allow entry from init via the toolbox binary.
|
|
|
|
neverallow { domain -init } toolbox:process transition;
|
|
|
|
neverallow domain toolbox:process dyntransition;
|
|
|
|
neverallow toolbox { file_type fs_type -toolbox_exec}:file entrypoint;
|