57a17d1434
The Nexus 9 uses f2fs for /data. Make sure to properly label /system/bin/fsck.f2fs so that the appropriate domain transition occurs. Add support for getattr on devpts, required for fsck.f2fs. Addresses the following denials: avc: denied { execute_no_trans } for pid=172 comm="init" path="/system/bin/fsck.f2fs" dev="dm-0" ino=272 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0 avc: denied { getattr } for pid=170 comm="fsck.f2fs" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:fsck:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1 Change-Id: I34b3f91374d1eb3fb4ba76abce14ff67db259f96
26 lines
996 B
Text
26 lines
996 B
Text
# e2fsck or any other fsck program run by init.
|
|
type fsck, domain;
|
|
type fsck_exec, exec_type, file_type;
|
|
permissive_or_unconfined(fsck)
|
|
|
|
init_daemon_domain(fsck)
|
|
|
|
# /dev/__null__ created by init prior to policy load,
|
|
# open fd inherited by fsck.
|
|
allow fsck tmpfs:chr_file { read write ioctl };
|
|
|
|
# Inherit and use pty created by android_fork_execvp_ext().
|
|
allow fsck devpts:chr_file { read write ioctl getattr };
|
|
|
|
# Run e2fsck on block devices.
|
|
# TODO: Assign userdata and cache block device types to the corresponding
|
|
# block devices in all device policies, and then remove access to
|
|
# block_device:blk_file from here.
|
|
allow fsck block_device:blk_file rw_file_perms;
|
|
allow fsck userdata_block_device:blk_file rw_file_perms;
|
|
allow fsck cache_block_device:blk_file rw_file_perms;
|
|
|
|
# Only allow entry from init via the e2fsck binary.
|
|
neverallow { domain -init } fsck:process transition;
|
|
neverallow domain fsck:process dyntransition;
|
|
neverallow fsck { file_type fs_type -fsck_exec}:file entrypoint;
|