blob: babebe04db1d25cf5012a65ced087c14e15081a6 [file] [log] [blame]
Stephen Smalley2dd4e512012-01-04 12:33:27 -05001# ueventd seclabel is specified in init.rc since
2# it lives in the rootfs and has no unique file type.
3type ueventd, domain;
4tmpfs_domain(ueventd)
William Roberts85c5fc22013-10-06 15:36:11 -04005write_klog(ueventd)
6security_access_policy(ueventd)
Stephen Smalley2dd4e512012-01-04 12:33:27 -05007allow ueventd rootfs:file entrypoint;
William Roberts85c5fc22013-10-06 15:36:11 -04008allow ueventd init:process sigchld;
9allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
10allow ueventd device:file create_file_perms;
11allow ueventd device:chr_file rw_file_perms;
12allow ueventd sysfs:file rw_file_perms;
Stephen Smalley9add1f02014-05-08 13:18:52 -040013allow ueventd sysfs_type:file { relabelfrom relabelto setattr };
14allow ueventd sysfs_devices_system_cpu:file rw_file_perms;
William Roberts85c5fc22013-10-06 15:36:11 -040015allow ueventd tmpfs:chr_file rw_file_perms;
16allow ueventd dev_type:dir create_dir_perms;
17allow ueventd dev_type:lnk_file { create unlink };
18allow ueventd dev_type:chr_file { create setattr unlink };
19allow ueventd dev_type:blk_file { create setattr unlink };
Stephen Smalley16011322014-02-24 15:06:11 -050020allow ueventd self:netlink_kobject_uevent_socket create_socket_perms;
William Roberts85c5fc22013-10-06 15:36:11 -040021allow ueventd efs_file:dir search;
22allow ueventd efs_file:file r_file_perms;