blob: 73ca51406b8e33399d7e4620f598d04568ad3190 [file] [log] [blame]
Nick Kralevich88ce9512014-01-09 15:25:36 -08001# File types must be defined for file_contexts.
Stephen Smalley01301542013-09-27 10:38:14 -04002type su_exec, exec_type, file_type;
Stephen Smalley2dd4e512012-01-04 12:33:27 -05003
Nick Kralevich88ce9512014-01-09 15:25:36 -08004userdebug_or_eng(`
Stephen Smalleyb3cb9692014-02-21 13:45:29 -05005 # Domain used for su processes, as well as for adbd and adb shell
6 # after performing an adb root command. The domain definition is
7 # wrapped to ensure that it does not exist at all on -user builds.
Nick Kralevich88ce9512014-01-09 15:25:36 -08008 type su, domain;
9 domain_auto_trans(shell, su_exec, su)
Nick Kralevich09e6abd2013-12-13 22:19:45 -080010
Nick Kralevich88ce9512014-01-09 15:25:36 -080011 # Allow dumpstate to call su on userdebug / eng builds to collect
12 # additional information.
13 domain_auto_trans(dumpstate, su_exec, su)
Stephen Smalleyd99e6d52013-12-02 14:18:11 -050014
Nick Kralevich88ce9512014-01-09 15:25:36 -080015 # su is also permissive to permit setenforce.
16 permissive su;
Sreeram Ramachandranbc320182014-05-02 14:50:26 -070017
Nick Kralevichcaf347b2014-07-12 12:46:58 -070018 # Add su to various domains
Sreeram Ramachandranbc320182014-05-02 14:50:26 -070019 net_domain(su)
Nick Kralevichcaf347b2014-07-12 12:46:58 -070020 app_domain(su)
Nick Kralevichaf7deff2014-05-27 15:46:39 -070021
22 dontaudit su self:capability_class_set *;
23 dontaudit su kernel:security *;
24 dontaudit su kernel:system *;
25 dontaudit su self:memprotect *;
26 dontaudit su domain:process *;
27 dontaudit su domain:fd *;
28 dontaudit su domain:dir *;
29 dontaudit su domain:lnk_file *;
30 dontaudit su domain:{ fifo_file file } *;
31 dontaudit su domain:socket_class_set *;
32 dontaudit su domain:ipc_class_set *;
33 dontaudit su domain:key *;
34 dontaudit su fs_type:filesystem *;
35 dontaudit su {fs_type dev_type file_type}:dir_file_class_set *;
36 dontaudit su node_type:node *;
37 dontaudit su node_type:{ tcp_socket udp_socket rawip_socket } *;
38 dontaudit su netif_type:netif *;
39 dontaudit su port_type:socket_class_set *;
40 dontaudit su port_type:{ tcp_socket dccp_socket } *;
41 dontaudit su domain:peer *;
42 dontaudit su domain:binder *;
43 dontaudit su property_type:property_service *;
Nick Kralevich88ce9512014-01-09 15:25:36 -080044')