Skip to content
Snippets Groups Projects
Commit 02a101a6 authored by TreeHugger Robot's avatar TreeHugger Robot Committed by Android (Google) Code Review
Browse files

Merge "Move domain_deprecated into private policy" into oc-dev

parents 125a5a0c 76aab82c
No related branches found
No related tags found
No related merge requests found
# rild - radio interface layer daemon # rild - radio interface layer daemon
type rild, domain, domain_deprecated; type rild, domain;
hal_server_domain(rild, hal_telephony) hal_server_domain(rild, hal_telephony)
net_domain(rild) net_domain(rild)
......
type runas, domain, domain_deprecated, mlstrustedsubject; type runas, domain, mlstrustedsubject;
type runas_exec, exec_type, file_type; type runas_exec, exec_type, file_type;
allow runas adbd:process sigchld; allow runas adbd:process sigchld;
......
type sdcardd, domain, domain_deprecated; type sdcardd, domain;
type sdcardd_exec, exec_type, file_type; type sdcardd_exec, exec_type, file_type;
allow sdcardd cgroup:dir create_dir_perms; allow sdcardd cgroup:dir create_dir_perms;
......
# Process which creates/updates shared RELRO files to be used by other apps. # Process which creates/updates shared RELRO files to be used by other apps.
type shared_relro, domain, domain_deprecated; type shared_relro, domain;
# Grant write access to the shared relro files/directory. # Grant write access to the shared relro files/directory.
allow shared_relro shared_relro_file:dir rw_dir_perms; allow shared_relro shared_relro_file:dir rw_dir_perms;
......
# ueventd seclabel is specified in init.rc since # ueventd seclabel is specified in init.rc since
# it lives in the rootfs and has no unique file type. # it lives in the rootfs and has no unique file type.
type ueventd, domain, domain_deprecated; type ueventd, domain;
# Write to /dev/kmsg. # Write to /dev/kmsg.
allow ueventd kmsg_device:chr_file rw_file_perms; allow ueventd kmsg_device:chr_file rw_file_perms;
......
# uncrypt # uncrypt
type uncrypt, domain, domain_deprecated, mlstrustedsubject; type uncrypt, domain, mlstrustedsubject;
type uncrypt_exec, exec_type, file_type; type uncrypt_exec, exec_type, file_type;
allow uncrypt self:capability dac_override; allow uncrypt self:capability dac_override;
......
# Domain for update_engine daemon. # Domain for update_engine daemon.
type update_engine, domain, domain_deprecated, update_engine_common; type update_engine, domain, update_engine_common;
type update_engine_exec, exec_type, file_type; type update_engine_exec, exec_type, file_type;
net_domain(update_engine); net_domain(update_engine);
......
# volume manager # volume manager
type vold, domain, domain_deprecated; type vold, domain;
type vold_exec, exec_type, file_type; type vold_exec, exec_type, file_type;
# Read already opened /cache files. # Read already opened /cache files.
......
## ##
# trusted execution environment (tee) daemon # trusted execution environment (tee) daemon
# #
typeattribute tee domain_deprecated;
type tee_exec, exec_type, vendor_file_type, file_type; type tee_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(tee) init_daemon_domain(tee)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment