Add "DO NOT ADD statements" comments to public
For visibility Bug: 232023812 Test: N/A Change-Id: I0bc6dc568210b81ba1f52acb18afd4bcc454ea1c
This commit is contained in:
parent
5769fd90f2
commit
09b27c7109
136 changed files with 540 additions and 7 deletions
|
@ -2,3 +2,7 @@
|
||||||
# it lives in the rootfs and has no unique file type.
|
# it lives in the rootfs and has no unique file type.
|
||||||
type adbd, domain;
|
type adbd, domain;
|
||||||
type adbd_exec, exec_type, file_type, system_file_type;
|
type adbd_exec, exec_type, file_type, system_file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type aidl_lazy_test_server, domain;
|
type aidl_lazy_test_server, domain;
|
||||||
type aidl_lazy_test_server_exec, exec_type, file_type, system_file_type;
|
type aidl_lazy_test_server_exec, exec_type, file_type, system_file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# apexd -- manager for APEX packages
|
# apexd -- manager for APEX packages
|
||||||
type apexd, domain;
|
type apexd, domain;
|
||||||
type apexd_exec, exec_type, file_type, system_file_type;
|
type apexd_exec, exec_type, file_type, system_file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -7,3 +7,7 @@
|
||||||
### zygote spawned apps should be added here.
|
### zygote spawned apps should be added here.
|
||||||
###
|
###
|
||||||
type appdomain_tmpfs, file_type;
|
type appdomain_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,6 +1,9 @@
|
||||||
# app_zygote is an auxiliary zygote process that is used to spawn
|
# app_zygote is an auxiliary zygote process that is used to spawn
|
||||||
# isolated service processes for individual applications. It is
|
# isolated service processes for individual applications. It is
|
||||||
# spawned from the regular zygote process as a "child zygote".
|
# spawned from the regular zygote process as a "child zygote".
|
||||||
|
|
||||||
type app_zygote, domain;
|
type app_zygote, domain;
|
||||||
type app_zygote_tmpfs, file_type;
|
type app_zygote_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# ART service daemon.
|
# ART service daemon.
|
||||||
type artd, domain;
|
type artd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -7,3 +7,7 @@ with_asan(`
|
||||||
type asan_extract, domain, coredomain;
|
type asan_extract, domain, coredomain;
|
||||||
type asan_extract_exec, exec_type, file_type, system_file_type;
|
type asan_extract_exec, exec_type, file_type, system_file_type;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type atrace, domain, coredomain;
|
type atrace, domain, coredomain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,6 @@
|
||||||
type audioserver, domain;
|
type audioserver, domain;
|
||||||
type audioserver_tmpfs, file_type;
|
type audioserver_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# blkid called from vold
|
# blkid called from vold
|
||||||
type blkid, domain;
|
type blkid, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# bluetooth subsystem
|
# bluetooth subsystem
|
||||||
type bluetooth, domain;
|
type bluetooth, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# bootanimation oneshot service
|
# bootanimation oneshot service
|
||||||
type bootanim, domain;
|
type bootanim, domain;
|
||||||
type bootanim_exec, system_file_type, exec_type, file_type;
|
type bootanim_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# bootstat command
|
# bootstat command
|
||||||
type bootstat, domain;
|
type bootstat, domain;
|
||||||
type bootstat_exec, system_file_type, exec_type, file_type;
|
type bootstat_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type bpfloader, domain, coredomain;
|
type bpfloader, domain, coredomain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# bufferhubd
|
# bufferhubd
|
||||||
type bufferhubd, domain, mlstrustedsubject;
|
type bufferhubd, domain, mlstrustedsubject;
|
||||||
type bufferhubd_exec, system_file_type, exec_type, file_type;
|
type bufferhubd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type cameraserver, domain;
|
type cameraserver, domain;
|
||||||
type cameraserver_exec, system_file_type, exec_type, file_type;
|
type cameraserver_exec, system_file_type, exec_type, file_type;
|
||||||
type cameraserver_tmpfs, file_type;
|
type cameraserver_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type charger, charger_type, domain;
|
type charger, charger_type, domain;
|
||||||
type charger_exec, system_file_type, exec_type, file_type;
|
type charger_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,6 @@
|
||||||
# Context when health HAL runs charger mode
|
# Context when health HAL runs charger mode
|
||||||
|
|
||||||
type charger_vendor, charger_type, domain;
|
type charger_vendor, charger_type, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type crash_dump, domain;
|
type crash_dump, domain;
|
||||||
type crash_dump_exec, system_file_type, exec_type, file_type;
|
type crash_dump_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# credstore daemon
|
# credstore daemon
|
||||||
type credstore, domain;
|
type credstore, domain;
|
||||||
type credstore_exec, system_file_type, exec_type, file_type;
|
type credstore_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -137,3 +137,7 @@ type rootdisk_sysdev, dev_type;
|
||||||
|
|
||||||
# vfio device
|
# vfio device
|
||||||
type vfio_device, dev_type;
|
type vfio_device, dev_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type dhcp, domain;
|
type dhcp, domain;
|
||||||
type dhcp_exec, system_file_type, exec_type, file_type;
|
type dhcp_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# DNS, DHCP services
|
# DNS, DHCP services
|
||||||
type dnsmasq, domain;
|
type dnsmasq, domain;
|
||||||
type dnsmasq_exec, system_file_type, exec_type, file_type;
|
type dnsmasq_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type drmserver, domain;
|
type drmserver, domain;
|
||||||
type drmserver_exec, system_file_type, exec_type, file_type;
|
type drmserver_exec, system_file_type, exec_type, file_type;
|
||||||
type drmserver_socket, file_type;
|
type drmserver_socket, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# dumpstate
|
# dumpstate
|
||||||
type dumpstate, domain, mlstrustedsubject;
|
type dumpstate, domain, mlstrustedsubject;
|
||||||
type dumpstate_exec, system_file_type, exec_type, file_type;
|
type dumpstate_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type e2fs, domain, coredomain;
|
type e2fs, domain, coredomain;
|
||||||
type e2fs_exec, system_file_type, exec_type, file_type;
|
type e2fs_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -12,3 +12,7 @@
|
||||||
### PackageManager flags an app as ephemeral at install time.
|
### PackageManager flags an app as ephemeral at install time.
|
||||||
|
|
||||||
type ephemeral_app, domain;
|
type ephemeral_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# evsmanager daemon
|
# evsmanager daemon
|
||||||
type evsmanagerd, domain;
|
type evsmanagerd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# The extra_free_kbytes.sh script run by init.
|
# The extra_free_kbytes.sh script run by init.
|
||||||
type extra_free_kbytes, domain;
|
type extra_free_kbytes, domain;
|
||||||
type extra_free_kbytes_exec, system_file_type, exec_type, file_type;
|
type extra_free_kbytes_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
# Declare the domain unconditionally so we can always reference it
|
# Declare the domain unconditionally so we can always reference it
|
||||||
# in neverallow rules.
|
# in neverallow rules.
|
||||||
type fastbootd, domain;
|
type fastbootd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -627,3 +627,7 @@ with_asan(`type asanwrapper_exec, exec_type, file_type;')
|
||||||
|
|
||||||
# Deprecated in SDK version 28
|
# Deprecated in SDK version 28
|
||||||
type audiohal_data_file, file_type, data_file_type, core_data_file_type;
|
type audiohal_data_file, file_type, data_file_type, core_data_file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type fingerprintd, domain;
|
type fingerprintd, domain;
|
||||||
type fingerprintd_exec, system_file_type, exec_type, file_type;
|
type fingerprintd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# The flags_health_check command run by init.
|
# The flags_health_check command run by init.
|
||||||
type flags_health_check, domain, coredomain;
|
type flags_health_check, domain, coredomain;
|
||||||
type flags_health_check_exec, system_file_type, exec_type, file_type;
|
type flags_health_check_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# Any fsck program run by init
|
# Any fsck program run by init
|
||||||
type fsck, domain;
|
type fsck, domain;
|
||||||
type fsck_exec, system_file_type, exec_type, file_type;
|
type fsck_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# Any fsck program run on untrusted block devices
|
# Any fsck program run on untrusted block devices
|
||||||
type fsck_untrusted, domain;
|
type fsck_untrusted, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type gatekeeperd, domain;
|
type gatekeeperd, domain;
|
||||||
type gatekeeperd_exec, system_file_type, exec_type, file_type;
|
type gatekeeperd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type gmscore_app, domain;
|
type gmscore_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# gpuservice - server for gpu stats and other gpu related services
|
# gpuservice - server for gpu stats and other gpu related services
|
||||||
type gpuservice, domain;
|
type gpuservice, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
type hal_graphics_composer_server_tmpfs, file_type;
|
type hal_graphics_composer_server_tmpfs, file_type;
|
||||||
attribute hal_graphics_composer_client_tmpfs;
|
attribute hal_graphics_composer_client_tmpfs;
|
||||||
expandattribute hal_graphics_composer_client_tmpfs true;
|
expandattribute hal_graphics_composer_client_tmpfs true;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,4 +1,7 @@
|
||||||
# healthd - battery/charger monitoring service daemon
|
# healthd - battery/charger monitoring service daemon
|
||||||
# healthd is removed. The type is kept for backwards compatibility.
|
# healthd is removed. The type is kept for backwards compatibility.
|
||||||
|
|
||||||
type healthd, domain;
|
type healthd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type heapprofd, domain, coredomain;
|
type heapprofd, domain, coredomain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -90,3 +90,7 @@ type hidl_base_hwservice, hwservice_manager_type;
|
||||||
type hidl_manager_hwservice, hwservice_manager_type, coredomain_hwservice;
|
type hidl_manager_hwservice, hwservice_manager_type, coredomain_hwservice;
|
||||||
type hidl_memory_hwservice, hwservice_manager_type, coredomain_hwservice;
|
type hidl_memory_hwservice, hwservice_manager_type, coredomain_hwservice;
|
||||||
type hidl_token_hwservice, hwservice_manager_type, coredomain_hwservice;
|
type hidl_token_hwservice, hwservice_manager_type, coredomain_hwservice;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# hwservicemanager - the Binder context manager for HAL services
|
# hwservicemanager - the Binder context manager for HAL services
|
||||||
type hwservicemanager, domain, mlstrustedsubject;
|
type hwservicemanager, domain, mlstrustedsubject;
|
||||||
type hwservicemanager_exec, system_file_type, exec_type, file_type;
|
type hwservicemanager_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# idmap, when executed by installd
|
# idmap, when executed by installd
|
||||||
type idmap, domain;
|
type idmap, domain;
|
||||||
type idmap_exec, system_file_type, exec_type, file_type;
|
type idmap_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -6,3 +6,6 @@
|
||||||
# incident
|
# incident
|
||||||
type incident, domain;
|
type incident, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
|
|
||||||
# incident_helper
|
# incident_helper
|
||||||
type incident_helper, domain;
|
type incident_helper, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,6 @@
|
||||||
# incidentd
|
# incidentd
|
||||||
type incidentd, domain;
|
type incidentd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type init, domain, mlstrustedsubject;
|
type init, domain, mlstrustedsubject;
|
||||||
type init_exec, system_file_type, exec_type, file_type;
|
type init_exec, system_file_type, exec_type, file_type;
|
||||||
type init_tmpfs, file_type;
|
type init_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# inputflinger
|
# inputflinger
|
||||||
type inputflinger, domain;
|
type inputflinger, domain;
|
||||||
type inputflinger_exec, system_file_type, exec_type, file_type;
|
type inputflinger_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# installer daemon
|
# installer daemon
|
||||||
type installd, domain;
|
type installd, domain;
|
||||||
type installd_exec, system_file_type, exec_type, file_type;
|
type installd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -7,3 +7,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type isolated_app, domain;
|
type isolated_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type isolated_compute_app, domain;
|
type isolated_compute_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# Life begins with the kernel.
|
# Life begins with the kernel.
|
||||||
type kernel, domain, mlstrustedsubject;
|
type kernel, domain, mlstrustedsubject;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# keystore daemon
|
# keystore daemon
|
||||||
type keystore, domain, keystore2_key_type;
|
type keystore, domain, keystore2_key_type;
|
||||||
type keystore_exec, system_file_type, exec_type, file_type;
|
type keystore_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# A keystore2 namespace for WI-FI.
|
# A keystore2 namespace for WI-FI.
|
||||||
type wifi_key, keystore2_key_type;
|
type wifi_key, keystore2_key_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# llkd Live LocK Daemon
|
# llkd Live LocK Daemon
|
||||||
type llkd, domain, mlstrustedsubject;
|
type llkd, domain, mlstrustedsubject;
|
||||||
type llkd_exec, system_file_type, exec_type, file_type;
|
type llkd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# lmkd low memory killer daemon
|
# lmkd low memory killer daemon
|
||||||
type lmkd, domain, mlstrustedsubject;
|
type lmkd, domain, mlstrustedsubject;
|
||||||
type lmkd_exec, system_file_type, exec_type, file_type;
|
type lmkd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# android user-space log manager
|
# android user-space log manager
|
||||||
type logd, domain, mlstrustedsubject;
|
type logd, domain, mlstrustedsubject;
|
||||||
type logd_exec, system_file_type, exec_type, file_type;
|
type logd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# android debug logging, logpersist domains
|
# android debug logging, logpersist domains
|
||||||
type logpersist, domain;
|
type logpersist, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# mdns daemon
|
# mdns daemon
|
||||||
type mdnsd, domain;
|
type mdnsd, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# mediadrmserver - mediadrm daemon
|
# mediadrmserver - mediadrm daemon
|
||||||
type mediadrmserver, domain;
|
type mediadrmserver, domain;
|
||||||
type mediadrmserver_exec, system_file_type, exec_type, file_type;
|
type mediadrmserver_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type mediaextractor, domain;
|
type mediaextractor, domain;
|
||||||
type mediaextractor_exec, system_file_type, exec_type, file_type;
|
type mediaextractor_exec, system_file_type, exec_type, file_type;
|
||||||
type mediaextractor_tmpfs, file_type;
|
type mediaextractor_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# mediametrics - daemon for collecting media.metrics data
|
# mediametrics - daemon for collecting media.metrics data
|
||||||
type mediametrics, domain;
|
type mediametrics, domain;
|
||||||
type mediametrics_exec, system_file_type, exec_type, file_type;
|
type mediametrics_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -4,3 +4,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type mediaprovider, domain;
|
type mediaprovider, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type mediaserver, domain;
|
type mediaserver, domain;
|
||||||
type mediaserver_exec, system_file_type, exec_type, file_type;
|
type mediaserver_exec, system_file_type, exec_type, file_type;
|
||||||
type mediaserver_tmpfs, file_type;
|
type mediaserver_tmpfs, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type mediaswcodec, domain;
|
type mediaswcodec, domain;
|
||||||
type mediaswcodec_exec, system_file_type, exec_type, file_type;
|
type mediaswcodec_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type mediatranscoding, domain;
|
type mediatranscoding, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type modprobe, domain;
|
type modprobe, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# vpn tunneling protocol manager
|
# vpn tunneling protocol manager
|
||||||
type mtp, domain;
|
type mtp, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
type node, node_type;
|
type node, node_type;
|
||||||
type netif, netif_type;
|
type netif, netif_type;
|
||||||
type port, port_type;
|
type port, port_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# network manager
|
# network manager
|
||||||
type netd, domain, mlstrustedsubject;
|
type netd, domain, mlstrustedsubject;
|
||||||
type netd_exec, system_file_type, exec_type, file_type;
|
type netd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type netutils_wrapper, domain;
|
type netutils_wrapper, domain;
|
||||||
type netutils_wrapper_exec, system_file_type, exec_type, file_type;
|
type netutils_wrapper_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# Network stack service app
|
# Network stack service app
|
||||||
type network_stack, domain;
|
type network_stack, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# nfc subsystem
|
# nfc subsystem
|
||||||
type nfc, domain;
|
type nfc, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
|
|
||||||
# TODO: Only present to allow mediatek/wembley-sepolicy to see it for validation reasons.
|
# TODO: Only present to allow mediatek/wembley-sepolicy to see it for validation reasons.
|
||||||
type otapreopt_chroot, domain;
|
type otapreopt_chroot, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type perfetto, domain, coredomain;
|
type perfetto, domain, coredomain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# performanced
|
# performanced
|
||||||
type performanced, domain, mlstrustedsubject;
|
type performanced, domain, mlstrustedsubject;
|
||||||
type performanced_exec, system_file_type, exec_type, file_type;
|
type performanced_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type platform_app, domain;
|
type platform_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -2,3 +2,7 @@
|
||||||
# Extend the permissions in this domain to allow this program to access other
|
# Extend the permissions in this domain to allow this program to access other
|
||||||
# files needed by the specific device on your device's sepolicy directory.
|
# files needed by the specific device on your device's sepolicy directory.
|
||||||
type postinstall, domain;
|
type postinstall, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# Point to Point Protocol daemon
|
# Point to Point Protocol daemon
|
||||||
type ppp, domain;
|
type ppp, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type priv_app, domain;
|
type priv_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# PRNG seeder daemon
|
# PRNG seeder daemon
|
||||||
type prng_seeder, domain;
|
type prng_seeder, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# profman
|
# profman
|
||||||
type profman, domain;
|
type profman, domain;
|
||||||
type profman_exec, system_file_type, exec_type, file_type;
|
type profman_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -342,3 +342,7 @@ not_compatible_property(`
|
||||||
compatible_property_only(`
|
compatible_property_only(`
|
||||||
vendor_internal_prop(vendor_default_prop)
|
vendor_internal_prop(vendor_default_prop)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# phone subsystem
|
# phone subsystem
|
||||||
type radio, domain, mlstrustedsubject;
|
type radio, domain, mlstrustedsubject;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -3,3 +3,7 @@
|
||||||
# Declare the domain unconditionally so we can always reference it
|
# Declare the domain unconditionally so we can always reference it
|
||||||
# in neverallow rules.
|
# in neverallow rules.
|
||||||
type recovery, domain;
|
type recovery, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# android recovery persistent log manager
|
# android recovery persistent log manager
|
||||||
type recovery_persist, domain;
|
type recovery_persist, domain;
|
||||||
type recovery_persist_exec, system_file_type, exec_type, file_type;
|
type recovery_persist_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# android recovery refresh log manager
|
# android recovery refresh log manager
|
||||||
type recovery_refresh, domain;
|
type recovery_refresh, domain;
|
||||||
type recovery_refresh_exec, system_file_type, exec_type, file_type;
|
type recovery_refresh_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -4,3 +4,7 @@
|
||||||
###
|
###
|
||||||
|
|
||||||
type rkpdapp, domain;
|
type rkpdapp, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type rs, domain, coredomain;
|
type rs, domain, coredomain;
|
||||||
type rs_exec, system_file_type, exec_type, file_type;
|
type rs_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# rss_hwm_reset resets RSS high-water mark counters for all procesess.
|
# rss_hwm_reset resets RSS high-water mark counters for all procesess.
|
||||||
type rss_hwm_reset, domain, coredomain, mlstrustedsubject;
|
type rss_hwm_reset, domain, coredomain, mlstrustedsubject;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type runas, domain, mlstrustedsubject;
|
type runas, domain, mlstrustedsubject;
|
||||||
type runas_exec, system_file_type, exec_type, file_type;
|
type runas_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
type runas_app, domain;
|
type runas_app, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
type sdcardd, domain;
|
type sdcardd, domain;
|
||||||
type sdcardd_exec, system_file_type, exec_type, file_type;
|
type sdcardd_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# secure_element subsystem
|
# secure_element subsystem
|
||||||
type secure_element, domain;
|
type secure_element, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -354,3 +354,7 @@ type hal_wifi_service, protected_service, hal_service_type, service_manager_type
|
||||||
type hal_wifi_hostapd_service, protected_service, hal_service_type, service_manager_type;
|
type hal_wifi_hostapd_service, protected_service, hal_service_type, service_manager_type;
|
||||||
type hal_wifi_supplicant_service, protected_service, hal_service_type, service_manager_type;
|
type hal_wifi_supplicant_service, protected_service, hal_service_type, service_manager_type;
|
||||||
type hal_gatekeeper_service, protected_service, hal_service_type, service_manager_type;
|
type hal_gatekeeper_service, protected_service, hal_service_type, service_manager_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# servicemanager - the Binder context manager
|
# servicemanager - the Binder context manager
|
||||||
type servicemanager, domain, mlstrustedsubject;
|
type servicemanager, domain, mlstrustedsubject;
|
||||||
type servicemanager_exec, system_file_type, exec_type, file_type;
|
type servicemanager_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# sgdisk called from vold
|
# sgdisk called from vold
|
||||||
type sgdisk, domain;
|
type sgdisk, domain;
|
||||||
type sgdisk_exec, system_file_type, exec_type, file_type;
|
type sgdisk_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,2 +1,6 @@
|
||||||
# Process which creates/updates shared RELRO files to be used by other apps.
|
# Process which creates/updates shared RELRO files to be used by other apps.
|
||||||
type shared_relro, domain;
|
type shared_relro, domain;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
# Domain for shell processes spawned by ADB or console service.
|
# Domain for shell processes spawned by ADB or console service.
|
||||||
type shell, domain, mlstrustedsubject;
|
type shell, domain, mlstrustedsubject;
|
||||||
type shell_exec, system_file_type, exec_type, file_type;
|
type shell_exec, system_file_type, exec_type, file_type;
|
||||||
|
|
||||||
|
# system/sepolicy/public is for vendor-facing type and attribute definitions.
|
||||||
|
# DO NOT ADD allow, neverallow, or dontaudit statements here.
|
||||||
|
# Instead, add such policy rules to system/sepolicy/private/*.te.
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue