android_system_sepolicy/public/e2fs.te
David Anderson c39d14ee25 Allow e2fs more ioctls to device-mapper devices.
Bug: 123906417
Test: manual test

Change-Id: I51d27c54888900ca5c6a31d554487ce0e4d54d80
2019-02-05 18:05:50 -08:00

27 lines
830 B
Plaintext

type e2fs, domain, coredomain;
type e2fs_exec, system_file_type, exec_type, file_type;
allow e2fs devpts:chr_file { read write getattr ioctl };
allow e2fs dev_type:blk_file getattr;
allow e2fs block_device:dir search;
allow e2fs userdata_block_device:blk_file rw_file_perms;
allow e2fs metadata_block_device:blk_file rw_file_perms;
allow e2fs dm_device:blk_file rw_file_perms;
allowxperm e2fs { userdata_block_device metadata_block_device dm_device }:blk_file ioctl {
BLKSECDISCARD BLKDISCARD BLKPBSZGET BLKDISCARDZEROES BLKROGET
};
allow e2fs {
proc_filesystems
proc_mounts
proc_swaps
}:file r_file_perms;
# access /sys/fs/ext4/features
allow e2fs sysfs_fs_ext4_features:dir search;
allow e2fs sysfs_fs_ext4_features:file r_file_perms;
# access SELinux context files
allow e2fs file_contexts_file:file r_file_perms;