domain: relax execmod restrictions

Some devices still have pre-built binaries with text relocations
on them. As a result, it's premature to assert a neverallow rule
for files in /system

Bug: 20013628
Change-Id: I3a1e43db5c610164749dee6882f645a0559c789b
diff --git a/domain.te b/domain.te
index 3a84659..5a3d3c9 100644
--- a/domain.te
+++ b/domain.te
@@ -390,10 +390,13 @@
 # which, long term, need to go away.
 neverallow domain {
   file_type
+  -system_file      # needs to die. b/20013628
   -system_data_file
   -apk_data_file
   -app_data_file
   -asec_public_file
 }:file execmod;
 
-neverallow { domain -appdomain } file_type:file execmod;
+# TODO: prohibit non-zygote spawned processes from using shared libraries
+# with text relocations. b/20013628 .
+# neverallow { domain -appdomain } file_type:file execmod;