1 ###################################### 2 # Attribute declarations 3 # 4 5 # All types used for devices. 6 # On change, update CHECK_FC_ASSERT_ATTRS 7 # in tools/checkfc.c 8 attribute dev_type; 9 10 # All types used for processes. 11 attribute domain; 12 13 # Temporary attribute used for migrating permissions out of domain. 14 # Motivation: Domain is overly permissive. Start removing permissions 15 # from domain and assign them to the domain_deprecated attribute. 16 # Domain_deprecated and domain can initially be assigned to all 17 # domains. The goal is to not assign domain_deprecated to new domains 18 # and to start removing domain_deprecated where it's not required or 19 # reassigning the appropriate permissions to the inheriting domain 20 # when necessary. 21 attribute domain_deprecated; 22 23 # All types used for filesystems. 24 # On change, update CHECK_FC_ASSERT_ATTRS 25 # definition in tools/checkfc.c. 26 attribute fs_type; 27 28 # All types used for context= mounts. 29 attribute contextmount_type; 30 31 # All types used for files that can exist on a labeled fs. 32 # Do not use for pseudo file types. 33 # On change, update CHECK_FC_ASSERT_ATTRS 34 # definition in tools/checkfc.c. 35 attribute file_type; 36 37 # All types used for domain entry points. 38 attribute exec_type; 39 40 # All types used for /data files. 41 attribute data_file_type; 42 43 # All types use for sysfs files. 44 attribute sysfs_type; 45 46 # All types use for debugfs files. 47 attribute debugfs_type; 48 49 # Attribute used for all sdcards 50 attribute sdcard_type; 51 52 # All types used for nodes/hosts. 53 attribute node_type; 54 55 # All types used for network interfaces. 56 attribute netif_type; 57 58 # All types used for network ports. 59 attribute port_type; 60 61 # All types used for property service 62 # On change, update CHECK_PC_ASSERT_ATTRS 63 # definition in tools/checkfc.c. 64 attribute property_type; 65 66 # All properties defined in core SELinux policy. Should not be 67 # used by device specific properties 68 attribute core_property_type; 69 70 # All properties used to configure log filtering. 71 attribute log_property_type; 72 73 # All service_manager types created by system_server 74 attribute system_server_service; 75 76 # services which should be available to all but isolated apps 77 attribute app_api_service; 78 79 # services which export only system_api 80 attribute system_api_service; 81 82 # All types used for services managed by service_manager. 83 # On change, update CHECK_SC_ASSERT_ATTRS 84 # definition in tools/checkfc.c. 85 attribute service_manager_type; 86 87 # All domains that can override MLS restrictions. 88 # i.e. processes that can read up and write down. 89 attribute mlstrustedsubject; 90 91 # All types that can override MLS restrictions. 92 # i.e. files that can be read by lower and written by higher 93 attribute mlstrustedobject; 94 95 # All domains used for apps. 96 attribute appdomain; 97 98 # All domains used for apps with network access. 99 attribute netdomain; 100 101 # All domains used for apps with bluetooth access. 102 attribute bluetoothdomain; 103 104 # All domains used for binder service domains. 105 attribute binderservicedomain; 106 107 # All domains that access the boot_control HAL. The permissions the HAL 108 # requires are specific to the implementation provided in each device, but 109 # common daemons need to be aware of those when calling into the HAL. 110 attribute boot_control_hal; 111 112 # update_engine related domains that need to apply an update and run 113 # postinstall. This includes the background daemon and the sideload tool from 114 # recovery for A/B devices. 115 attribute update_engine_common; 116