diff --git a/domain.te b/domain.te index 48e2d1ac3657a1d0f581ddbacb46212251c85493..6cf7be34b4c190dfda475b782880928c280c0eee 100644 --- a/domain.te +++ b/domain.te @@ -264,7 +264,7 @@ neverallow { domain -kernel -init -recovery -vold -uncrypt -install_recovery } b # Rather force a relabel to a more specific type. # init is exempt from this as there are character devices that only it uses. # ueventd is exempt from this, as it is managing these devices. -neverallow { domain -init -ueventd } device:chr_file { open read write }; +neverallow { domain -init -ueventd -recovery } device:chr_file { open read write }; # Limit what domains can mount filesystems or change their mount flags. # sdcard_type / vfat is exempt as a larger set of domains need @@ -299,7 +299,7 @@ neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set { create write setattr relabelfrom relabelto append unlink link rename }; # Nothing should be writing to files in the rootfs. -neverallow domain rootfs:file { create write setattr relabelto append unlink link rename }; +neverallow { domain -recovery } rootfs:file { create write setattr relabelto append unlink link rename }; # Restrict context mounts to specific types marked with # the contextmount_type attribute.