Exclude dev/null from auditing - was producing log spam.
Test: Device boots Change-Id: I2fb0a03c9ed84710dc2db7b170c572a2eae45412
This commit is contained in:
parent
9eff8526b7
commit
f47ee7fbd2
1 changed files with 8 additions and 2 deletions
|
@ -175,7 +175,7 @@ allow init {
|
|||
-vold_data_file
|
||||
}:lnk_file { create getattr setattr relabelfrom unlink };
|
||||
|
||||
allow init {file_type -system_file -exec_type}:dir_file_class_set relabelto;
|
||||
allow init { file_type -system_file -exec_type }:dir_file_class_set relabelto;
|
||||
allow init { sysfs debugfs debugfs_tracing }:{ dir file lnk_file } { getattr relabelfrom };
|
||||
allow init { sysfs_type debugfs_type }:{ dir file lnk_file } relabelto;
|
||||
allow init dev_type:dir create_dir_perms;
|
||||
|
@ -198,7 +198,13 @@ allow init { fs_type -contextmount_type -sdcard_type -rootfs }:dir { open read
|
|||
# init should not be able to read or open generic devices
|
||||
# TODO: auditing to see if this can be deleted entirely
|
||||
allow init { dev_type -kmem_device -port_device -device }:chr_file { read open };
|
||||
auditallow init { dev_type -kmem_device -port_device -device }:chr_file { read open };
|
||||
auditallow init {
|
||||
dev_type
|
||||
-kmem_device
|
||||
-port_device
|
||||
-device
|
||||
-null_device
|
||||
}:chr_file { read open };
|
||||
|
||||
# chown/chmod on devices.
|
||||
allow init { dev_type -kmem_device -port_device }:chr_file setattr;
|
||||
|
|
Loading…
Reference in a new issue