2019-11-25 14:10:10 +01:00
|
|
|
|
|
|
|
# Domain for derive_sdk
|
|
|
|
type derive_sdk, domain, coredomain;
|
|
|
|
type derive_sdk_exec, system_file_type, exec_type, file_type;
|
|
|
|
init_daemon_domain(derive_sdk)
|
|
|
|
|
|
|
|
# Read /apex
|
|
|
|
allow derive_sdk apex_mnt_dir:dir r_dir_perms;
|
2023-05-31 10:51:14 +02:00
|
|
|
allow derive_sdk vendor_apex_metadata_file:dir r_dir_perms;
|
2019-11-25 14:10:10 +01:00
|
|
|
|
|
|
|
# Prop rules: writable by derive_sdk, readable by bootclasspath (apps)
|
2020-01-06 18:29:13 +01:00
|
|
|
set_prop(derive_sdk, module_sdkextensions_prop)
|
|
|
|
neverallow { domain -init -derive_sdk } module_sdkextensions_prop:property_service set;
|
2022-09-20 14:19:30 +02:00
|
|
|
|
|
|
|
# Allow derive_sdk to write data back to dumpstate when forked from dumpstate.
|
|
|
|
# The shell_data_file permissions are needed when a bugreport is taken:
|
|
|
|
# dumpstate will redirect its stdout to a temporary shell_data_file:file, and
|
|
|
|
# this makes derive_sdk append to that file.
|
|
|
|
allow derive_sdk dumpstate:fd use;
|
|
|
|
allow derive_sdk dumpstate:unix_stream_socket { read write };
|
|
|
|
allow derive_sdk shell_data_file:file { getattr append read write };
|