2013-10-21 13:32:31 -07:00
|
|
|
#######################################################
|
|
|
|
#
|
|
|
|
# This is the unconfined template. This template is the base policy
|
|
|
|
# which is used by daemons and other privileged components of
|
|
|
|
# Android.
|
|
|
|
#
|
|
|
|
# Historically, this template was called "unconfined" because it
|
|
|
|
# allowed the domain to do anything it wanted. Over time,
|
|
|
|
# this has changed, and will continue to change in the future.
|
|
|
|
# The rules in this file will be removed when no remaining
|
|
|
|
# unconfined domains require it, or when the rules contradict
|
|
|
|
# Android security best practices. Domains which need rules not
|
|
|
|
# provided by the unconfined template should add them directly to
|
|
|
|
# the relevant policy.
|
|
|
|
#
|
|
|
|
# The use of this template is discouraged.
|
|
|
|
######################################################
|
|
|
|
|
2012-01-04 09:33:27 -08:00
|
|
|
allow unconfineddomain self:capability_class_set *;
|
2013-12-02 11:18:11 -08:00
|
|
|
allow unconfineddomain kernel:security ~{ load_policy setenforce };
|
2012-01-04 09:33:27 -08:00
|
|
|
allow unconfineddomain kernel:system *;
|
2013-12-09 09:49:47 -08:00
|
|
|
allow unconfineddomain domain:process ~ptrace;
|
2012-01-04 09:33:27 -08:00
|
|
|
allow unconfineddomain domain:fd *;
|
|
|
|
allow unconfineddomain domain:dir r_dir_perms;
|
|
|
|
allow unconfineddomain domain:lnk_file r_file_perms;
|
|
|
|
allow unconfineddomain domain:{ fifo_file file } rw_file_perms;
|
|
|
|
allow unconfineddomain domain:socket_class_set *;
|
|
|
|
allow unconfineddomain domain:ipc_class_set *;
|
|
|
|
allow unconfineddomain domain:key *;
|
|
|
|
allow unconfineddomain fs_type:filesystem *;
|
2013-07-10 14:46:05 -07:00
|
|
|
allow unconfineddomain {fs_type dev_type file_type}:{ dir blk_file lnk_file sock_file fifo_file } ~relabelto;
|
2013-12-06 06:31:40 -08:00
|
|
|
allow unconfineddomain {fs_type -usermodehelper -proc_security}:{ chr_file file } ~{entrypoint relabelto};
|
|
|
|
allow unconfineddomain {dev_type -kmem_device}:{ chr_file file } ~{entrypoint relabelto};
|
|
|
|
allow unconfineddomain file_type:{ chr_file file } ~{entrypoint relabelto};
|
2012-01-04 09:33:27 -08:00
|
|
|
allow unconfineddomain node_type:node *;
|
2013-05-22 13:19:58 -07:00
|
|
|
allow unconfineddomain node_type:{ tcp_socket udp_socket rawip_socket } node_bind;
|
2012-01-04 09:33:27 -08:00
|
|
|
allow unconfineddomain netif_type:netif *;
|
|
|
|
allow unconfineddomain port_type:socket_class_set name_bind;
|
|
|
|
allow unconfineddomain port_type:{ tcp_socket dccp_socket } name_connect;
|
|
|
|
allow unconfineddomain domain:peer recv;
|
2013-05-17 17:11:29 -07:00
|
|
|
allow unconfineddomain domain:binder { call transfer set_context_mgr };
|
2012-04-04 07:11:16 -07:00
|
|
|
allow unconfineddomain property_type:property_service set;
|