Skip to content
Snippets Groups Projects
Commit 50e37b93 authored by repo sync's avatar repo sync
Browse files

Move domains into per-domain permissive mode.

Bug: 4070557
Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
parent b77b3aff
No related branches found
No related tags found
No related merge requests found
# qemu support daemon # qemu support daemon
type qemud, domain; type qemud, domain;
permissive qemud;
type qemud_exec, exec_type, file_type; type qemud_exec, exec_type, file_type;
init_daemon_domain(qemud) init_daemon_domain(qemud)
......
# IKE key management daemon # IKE key management daemon
type racoon, domain; type racoon, domain;
permissive racoon;
type racoon_exec, exec_type, file_type; type racoon_exec, exec_type, file_type;
init_daemon_domain(racoon) init_daemon_domain(racoon)
......
# phone subsystem # phone subsystem
type radio, domain; type radio, domain;
permissive radio;
app_domain(radio) app_domain(radio)
net_domain(radio) net_domain(radio)
bluetooth_domain(radio) bluetooth_domain(radio)
......
# rild - radio interface layer daemon # rild - radio interface layer daemon
type rild, domain; type rild, domain;
permissive rild;
type rild_exec, exec_type, file_type; type rild_exec, exec_type, file_type;
init_daemon_domain(rild) init_daemon_domain(rild)
......
type sdcardd, domain; type sdcardd, domain;
permissive sdcardd;
type sdcardd_exec, exec_type, file_type; type sdcardd_exec, exec_type, file_type;
init_daemon_domain(sdcardd) init_daemon_domain(sdcardd)
......
# servicemanager - the Binder context manager # servicemanager - the Binder context manager
type servicemanager, domain; type servicemanager, domain;
permissive servicemanager;
type servicemanager_exec, exec_type, file_type; type servicemanager_exec, exec_type, file_type;
init_daemon_domain(servicemanager) init_daemon_domain(servicemanager)
......
type su, domain; type su, domain;
permissive su;
type su_exec, file_type; type su_exec, file_type;
domain_auto_trans(shell, su_exec, su) domain_auto_trans(shell, su_exec, su)
......
# surfaceflinger - display compositor service # surfaceflinger - display compositor service
type surfaceflinger, domain; type surfaceflinger, domain;
permissive surfaceflinger;
type surfaceflinger_exec, exec_type, file_type; type surfaceflinger_exec, exec_type, file_type;
init_daemon_domain(surfaceflinger) init_daemon_domain(surfaceflinger)
......
...@@ -4,6 +4,7 @@ ...@@ -4,6 +4,7 @@
# server. # server.
# #
type system_app, domain; type system_app, domain;
permissive system_app;
app_domain(system_app) app_domain(system_app)
# Perform binder IPC to any app domain. # Perform binder IPC to any app domain.
......
...@@ -232,6 +232,7 @@ allow $1 kernel:security setbool; ...@@ -232,6 +232,7 @@ allow $1 kernel:security setbool;
define(`security_access_policy', ` define(`security_access_policy', `
allow $1 security_file:dir r_dir_perms; allow $1 security_file:dir r_dir_perms;
allow $1 security_file:file r_file_perms; allow $1 security_file:file r_file_perms;
allow $1 security_file:lnk_file read;
allow $1 selinuxfs:dir r_dir_perms; allow $1 selinuxfs:dir r_dir_perms;
allow $1 selinuxfs:file r_file_perms; allow $1 selinuxfs:file r_file_perms;
allow $1 rootfs:dir r_dir_perms; allow $1 rootfs:dir r_dir_perms;
......
...@@ -2,6 +2,7 @@ ...@@ -2,6 +2,7 @@
# trusted execution environment (tee) daemon # trusted execution environment (tee) daemon
# #
type tee, domain; type tee, domain;
permissive tee;
type tee_exec, exec_type, file_type; type tee_exec, exec_type, file_type;
type tee_device, dev_type; type tee_device, dev_type;
type tee_data_file, file_type, data_file_type; type tee_data_file, file_type, data_file_type;
......
# ueventd seclabel is specified in init.rc since # ueventd seclabel is specified in init.rc since
# it lives in the rootfs and has no unique file type. # it lives in the rootfs and has no unique file type.
type ueventd, domain; type ueventd, domain;
permissive ueventd;
tmpfs_domain(ueventd) tmpfs_domain(ueventd)
write_klog(ueventd) write_klog(ueventd)
security_access_policy(ueventd) security_access_policy(ueventd)
......
# volume manager # volume manager
type vold, domain; type vold, domain;
permissive vold;
type vold_exec, exec_type, file_type; type vold_exec, exec_type, file_type;
init_daemon_domain(vold) init_daemon_domain(vold)
......
# watchdogd seclabel is specified in init.<board>.rc # watchdogd seclabel is specified in init.<board>.rc
type watchdogd, domain; type watchdogd, domain;
permissive watchdogd;
allow watchdogd rootfs:file { entrypoint r_file_perms }; allow watchdogd rootfs:file { entrypoint r_file_perms };
allow watchdogd self:capability mknod; allow watchdogd self:capability mknod;
allow watchdogd device:dir { add_name write remove_name }; allow watchdogd device:dir { add_name write remove_name };
......
# wpa - wpa supplicant or equivalent # wpa - wpa supplicant or equivalent
type wpa, domain; type wpa, domain;
permissive wpa;
type wpa_exec, exec_type, file_type; type wpa_exec, exec_type, file_type;
init_daemon_domain(wpa) init_daemon_domain(wpa)
......
# zygote # zygote
type zygote, domain; type zygote, domain;
permissive zygote;
type zygote_exec, exec_type, file_type; type zygote_exec, exec_type, file_type;
init_daemon_domain(zygote) init_daemon_domain(zygote)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment