2012-01-04 18:33:27 +01:00
|
|
|
# zygote
|
|
|
|
type zygote, domain;
|
|
|
|
type zygote_exec, exec_type, file_type;
|
|
|
|
|
|
|
|
init_daemon_domain(zygote)
|
2013-07-01 21:07:03 +02:00
|
|
|
typeattribute zygote mlstrustedsubject;
|
|
|
|
# Override DAC on files and switch uid/gid.
|
2013-09-05 01:07:37 +02:00
|
|
|
allow zygote self:capability { dac_override setgid setuid fowner };
|
2013-07-01 21:07:03 +02:00
|
|
|
# Drop capabilities from bounding set.
|
|
|
|
allow zygote self:capability setpcap;
|
|
|
|
# Switch SELinux context to app domains.
|
2013-09-14 00:59:04 +02:00
|
|
|
allow zygote system_server:process dyntransition;
|
2013-07-01 21:07:03 +02:00
|
|
|
allow zygote appdomain:process dyntransition;
|
2013-09-20 22:09:37 +02:00
|
|
|
# Allow zygote to read app /proc/pid dirs (b/10455872)
|
2013-08-30 22:02:30 +02:00
|
|
|
allow zygote appdomain:dir { getattr search };
|
2013-09-20 22:03:04 +02:00
|
|
|
allow zygote appdomain:file { r_file_perms };
|
2013-07-01 21:07:03 +02:00
|
|
|
# Move children into the peer process group.
|
2013-09-14 00:59:04 +02:00
|
|
|
allow zygote system_server:process { getpgid setpgid };
|
2013-07-01 21:07:03 +02:00
|
|
|
allow zygote appdomain:process { getpgid setpgid };
|
|
|
|
# Write to system data.
|
|
|
|
allow zygote system_data_file:dir rw_dir_perms;
|
|
|
|
allow zygote system_data_file:file create_file_perms;
|
|
|
|
allow zygote dalvikcache_data_file:dir rw_dir_perms;
|
2014-01-09 15:27:15 +01:00
|
|
|
allow zygote dalvikcache_data_file:file create_file_perms;
|
|
|
|
# For art.
|
|
|
|
allow zygote dalvikcache_data_file:file execute;
|
2013-07-01 21:07:03 +02:00
|
|
|
# Execute dexopt.
|
|
|
|
allow zygote system_file:file x_file_perms;
|
|
|
|
# Control cgroups.
|
|
|
|
allow zygote cgroup:dir create_dir_perms;
|
|
|
|
allow zygote self:capability sys_admin;
|
|
|
|
# Check validity of SELinux context before use.
|
|
|
|
selinux_check_context(zygote)
|
|
|
|
# Check SELinux permissions.
|
|
|
|
selinux_check_access(zygote)
|
|
|
|
# Read /seapp_contexts and /data/security/seapp_contexts
|
|
|
|
security_access_policy(zygote)
|
|
|
|
|
|
|
|
# Setting up /storage/emulated.
|
|
|
|
allow zygote rootfs:dir mounton;
|
|
|
|
allow zygote sdcard_type:dir { write search setattr create add_name mounton };
|
|
|
|
dontaudit zygote self:capability fsetid;
|
|
|
|
allow zygote tmpfs:dir { write create add_name setattr mounton search };
|
|
|
|
allow zygote tmpfs:filesystem mount;
|
|
|
|
allow zygote labeledfs:filesystem remount;
|
|
|
|
|
|
|
|
# Handle --invoke-with command when launching Zygote with a wrapper command.
|
2014-03-10 15:31:09 +01:00
|
|
|
allow zygote zygote_exec:file rx_file_perms;
|
2013-09-10 00:40:15 +02:00
|
|
|
|
|
|
|
# handle bugreports b/10498304
|
|
|
|
allow zygote ashmem_device:chr_file execute;
|
|
|
|
allow zygote shell_data_file:file { write getattr };
|
2013-09-17 19:07:01 +02:00
|
|
|
allow zygote system_server:binder { transfer call };
|
2013-09-10 02:17:08 +02:00
|
|
|
allow zygote servicemanager:binder { call };
|
2014-03-05 19:18:12 +01:00
|
|
|
|
|
|
|
auditallow zygote ashmem_device:chr_file execute;
|
|
|
|
auditallow zygote shell_data_file:file { write getattr };
|
|
|
|
auditallow zygote system_server:binder { transfer call };
|
|
|
|
auditallow zygote servicemanager:binder { call };
|