blob: b6c49b952819f0fa9264a5a37a13793ae2768f09 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute init coredomain;
2
dcashmancc39f632016-07-22 13:13:11 -07003tmpfs_domain(init)
4
5# Transitions to seclabel processes in init.rc
6domain_trans(init, rootfs, adbd)
Sandeep Patildc082452016-11-01 13:49:10 -07007domain_trans(init, rootfs, charger)
Sandeep Patil137a13d2016-12-15 12:36:45 -08008domain_trans(init, rootfs, healthd)
dcashmancc39f632016-07-22 13:13:11 -07009domain_trans(init, rootfs, slideshow)
10recovery_only(`
11 domain_trans(init, rootfs, recovery)
12')
13domain_trans(init, shell_exec, shell)
14domain_trans(init, init_exec, ueventd)
15domain_trans(init, init_exec, watchdogd)
Sandeep Patild46b5d32017-05-22 12:09:14 -070016domain_trans(init, { rootfs toolbox_exec vendor_toolbox_exec }, modprobe)
dcashmancc39f632016-07-22 13:13:11 -070017# case where logpersistd is actually logcat -f in logd context (nee: logcatd)
18userdebug_or_eng(`
Mark Salyzynda62cb42016-08-10 11:10:02 -070019 domain_auto_trans(init, logcat_exec, logpersist)
dcashmancc39f632016-07-22 13:13:11 -070020')
Paul Lawrencee9cb7632017-02-13 08:48:51 -080021
22# Creating files on sysfs is impossible so this isn't a threat
23# Sometimes we have to write to non-existent files to avoid conditional
24# init behavior. See b/35303861 for an example.
25dontaudit init sysfs:dir write;