107 lines
5.1 KiB
Plaintext
107 lines
5.1 KiB
Plaintext
# Domain used for unlabeled_exec processes, as well as for adbd and adb shell
|
|
# after performing an adb root command.
|
|
|
|
# All types must be defined regardless of build variant to ensure
|
|
# policy compilation succeeds with userdebug/user combination at boot
|
|
type unlabeled_exec, domain;
|
|
|
|
userdebug_or_eng(`
|
|
typeattribute unlabeled_exec mlstrustedsubject;
|
|
|
|
# Add unlabeled_exec to various domains
|
|
net_domain(unlabeled_exec)
|
|
|
|
# grant unlabeled_exec access to vndbinder
|
|
vndbinder_use(unlabeled_exec)
|
|
|
|
dontaudit unlabeled_exec self:capability_class_set *;
|
|
dontaudit unlabeled_exec self:capability2 *;
|
|
dontaudit unlabeled_exec kernel:security *;
|
|
dontaudit unlabeled_exec { kernel file_type }:system *;
|
|
dontaudit unlabeled_exec self:memprotect *;
|
|
dontaudit unlabeled_exec domain:anon_inode *;
|
|
dontaudit unlabeled_exec domain:{ process process2 } *;
|
|
dontaudit unlabeled_exec domain:fd *;
|
|
dontaudit unlabeled_exec domain:dir *;
|
|
dontaudit unlabeled_exec domain:lnk_file *;
|
|
dontaudit unlabeled_exec domain:{ fifo_file file } *;
|
|
dontaudit unlabeled_exec domain:socket_class_set *;
|
|
dontaudit unlabeled_exec domain:ipc_class_set *;
|
|
dontaudit unlabeled_exec domain:key *;
|
|
dontaudit unlabeled_exec fs_type:filesystem *;
|
|
dontaudit unlabeled_exec {fs_type dev_type file_type}:dir_file_class_set *;
|
|
dontaudit unlabeled_exec node_type:node *;
|
|
dontaudit unlabeled_exec node_type:{ tcp_socket udp_socket rawip_socket } *;
|
|
dontaudit unlabeled_exec netif_type:netif *;
|
|
dontaudit unlabeled_exec port_type:socket_class_set *;
|
|
dontaudit unlabeled_exec port_type:{ tcp_socket dccp_socket } *;
|
|
dontaudit unlabeled_exec domain:peer *;
|
|
dontaudit unlabeled_exec domain:binder *;
|
|
dontaudit unlabeled_exec property_type:property_service *;
|
|
dontaudit unlabeled_exec property_type:file *;
|
|
dontaudit unlabeled_exec service_manager_type:service_manager *;
|
|
dontaudit unlabeled_exec hwservice_manager_type:hwservice_manager *;
|
|
dontaudit unlabeled_exec vndservice_manager_type:service_manager *;
|
|
dontaudit unlabeled_exec servicemanager:service_manager list;
|
|
dontaudit unlabeled_exec hwservicemanager:hwservice_manager list;
|
|
dontaudit unlabeled_exec vndservicemanager:service_manager list;
|
|
dontaudit unlabeled_exec keystore:keystore_key *;
|
|
dontaudit unlabeled_exec keystore:keystore2 *;
|
|
dontaudit unlabeled_exec domain:drmservice *;
|
|
dontaudit unlabeled_exec unlabeled_exec:filesystem *;
|
|
dontaudit unlabeled_exec postinstall_file:filesystem *;
|
|
dontaudit unlabeled_exec domain:bpf *;
|
|
dontaudit unlabeled_exec unlabeled_exec:vsock_socket *;
|
|
dontaudit unlabeled_exec self:perf_event *;
|
|
|
|
# VTS tests run in the permissive unlabeled_exec domain on debug builds, but the HALs
|
|
# being tested run in enforcing mode. Because hal_foo_server is enforcing
|
|
# unlabeled_exec needs to be declared as hal_foo_client to grant hal_foo_server
|
|
# permission to interact with it.
|
|
typeattribute unlabeled_exec halclientdomain;
|
|
typeattribute unlabeled_exec hal_allocator_client;
|
|
typeattribute unlabeled_exec hal_atrace_client;
|
|
typeattribute unlabeled_exec hal_audio_client;
|
|
typeattribute unlabeled_exec hal_authsecret_client;
|
|
typeattribute unlabeled_exec hal_bluetooth_client;
|
|
typeattribute unlabeled_exec hal_bootctl_client;
|
|
typeattribute unlabeled_exec hal_camera_client;
|
|
typeattribute unlabeled_exec hal_configstore_client;
|
|
typeattribute unlabeled_exec hal_confirmationui_client;
|
|
typeattribute unlabeled_exec hal_contexthub_client;
|
|
typeattribute unlabeled_exec hal_drm_client;
|
|
typeattribute unlabeled_exec hal_cas_client;
|
|
typeattribute unlabeled_exec hal_dumpstate_client;
|
|
typeattribute unlabeled_exec hal_fingerprint_client;
|
|
typeattribute unlabeled_exec hal_gatekeeper_client;
|
|
typeattribute unlabeled_exec hal_gnss_client;
|
|
typeattribute unlabeled_exec hal_graphics_allocator_client;
|
|
typeattribute unlabeled_exec hal_graphics_composer_client;
|
|
typeattribute unlabeled_exec hal_health_client;
|
|
typeattribute unlabeled_exec hal_input_classifier_client;
|
|
typeattribute unlabeled_exec hal_ir_client;
|
|
typeattribute unlabeled_exec hal_keymaster_client;
|
|
typeattribute unlabeled_exec hal_light_client;
|
|
typeattribute unlabeled_exec hal_memtrack_client;
|
|
typeattribute unlabeled_exec hal_neuralnetworks_client;
|
|
typeattribute unlabeled_exec hal_nfc_client;
|
|
typeattribute unlabeled_exec hal_oemlock_client;
|
|
typeattribute unlabeled_exec hal_power_client;
|
|
typeattribute unlabeled_exec hal_rebootescrow_client;
|
|
typeattribute unlabeled_exec hal_secure_element_client;
|
|
typeattribute unlabeled_exec hal_sensors_client;
|
|
typeattribute unlabeled_exec hal_telephony_client;
|
|
typeattribute unlabeled_exec hal_tetheroffload_client;
|
|
typeattribute unlabeled_exec hal_thermal_client;
|
|
typeattribute unlabeled_exec hal_tv_cec_client;
|
|
typeattribute unlabeled_exec hal_tv_input_client;
|
|
typeattribute unlabeled_exec hal_tv_tuner_client;
|
|
typeattribute unlabeled_exec hal_usb_client;
|
|
typeattribute unlabeled_exec hal_vibrator_client;
|
|
typeattribute unlabeled_exec hal_vr_client;
|
|
typeattribute unlabeled_exec hal_weaver_client;
|
|
typeattribute unlabeled_exec hal_wifi_client;
|
|
typeattribute unlabeled_exec hal_wifi_hostapd_client;
|
|
typeattribute unlabeled_exec hal_wifi_supplicant_client;
|
|
')
|