2012-01-04 18:33:27 +01:00
|
|
|
# Life begins with the kernel.
|
|
|
|
type kernel, domain;
|
2014-01-25 05:43:07 +01:00
|
|
|
|
|
|
|
allow kernel init:process dyntransition;
|
|
|
|
|
2012-01-04 18:33:27 +01:00
|
|
|
# The kernel is unconfined.
|
|
|
|
unconfined_domain(kernel)
|
2013-07-10 23:46:05 +02:00
|
|
|
relabelto_domain(kernel)
|
|
|
|
|
|
|
|
allow kernel {fs_type dev_type file_type}:dir_file_class_set relabelto;
|
2013-09-06 00:36:30 +02:00
|
|
|
allow kernel unlabeled:filesystem mount;
|
2014-02-10 19:29:38 +01:00
|
|
|
allow kernel fs_type:filesystem *;
|
2013-12-06 14:05:53 +01:00
|
|
|
|
|
|
|
# Initial setenforce by init prior to switching to init domain.
|
|
|
|
allow kernel self:security setenforce;
|
2014-01-08 15:29:30 +01:00
|
|
|
|
|
|
|
# Set checkreqprot by init.rc prior to switching to init domain.
|
|
|
|
allow kernel self:security setcheckreqprot;
|
2014-02-10 22:31:04 +01:00
|
|
|
|
|
|
|
# For operations performed by kernel or init prior to switching to init domain.
|
|
|
|
## TODO: Investigate whether it is safe to remove these
|
|
|
|
allow kernel self:capability { sys_rawio mknod };
|
|
|
|
auditallow kernel self:capability { sys_rawio mknod };
|
2014-02-11 20:40:14 +01:00
|
|
|
allow kernel dev_type:blk_file rw_file_perms;
|
|
|
|
auditallow kernel dev_type:blk_file rw_file_perms;
|