sepolicy: Allow fsck_untrusted to be sys_admin

* Needed for custom filesystem support

Change-Id: I98a6116cf2a3c06eb2de599bbaf1a77373fa0a23
Signed-off-by: zlewchan <zlewchan@icloud.com>
This commit is contained in:
someone5678 2023-10-07 14:35:41 +09:00 committed by zlewchan
parent 91c3bb434f
commit 8f5689a655
2 changed files with 2 additions and 2 deletions

View file

@ -51,7 +51,7 @@ neverallow fsck_untrusted { file_type fs_type -fsck_exec }:file entrypoint;
# fsck_untrusted should never have sys_admin permissions. If it requires sys_admin
# permissions, that is a code mistake that needs to be fixed, not a permission that
# should be granted. Same with setgid and setuid.
neverallow fsck_untrusted self:global_capability_class_set { setgid setuid sys_admin };
neverallow fsck_untrusted self:global_capability_class_set { setgid setuid };
###
### dontaudit rules

View file

@ -51,7 +51,7 @@ neverallow fsck_untrusted { file_type fs_type -fsck_exec }:file entrypoint;
# fsck_untrusted should never have sys_admin permissions. If it requires sys_admin
# permissions, that is a code mistake that needs to be fixed, not a permission that
# should be granted. Same with setgid and setuid.
neverallow fsck_untrusted self:global_capability_class_set { setgid setuid sys_admin };
neverallow fsck_untrusted self:global_capability_class_set { setgid setuid };
###
### dontaudit rules