platform_system_sepolicy/private/migrate_legacy_obb_data.te

21 lines
886 B
Text
Raw Normal View History

type migrate_legacy_obb_data, domain, coredomain;
type migrate_legacy_obb_data_exec, system_file_type, exec_type, file_type;
allow migrate_legacy_obb_data media_rw_data_file:dir create_dir_perms;
allow migrate_legacy_obb_data media_rw_data_file:file create_file_perms;
allow migrate_legacy_obb_data shell_exec:file rx_file_perms;
allow migrate_legacy_obb_data toolbox_exec:file rx_file_perms;
allow migrate_legacy_obb_data self:capability { chown dac_override dac_read_search fowner fsetid };
# TODO: This should not be necessary. We don't deliberately hand over
# any open file descriptors to this domain, so anything that triggers this
# should be a candidate for O_CLOEXEC.
allow migrate_legacy_obb_data installd:fd use;
# This rule is required to let this process read /proc/{parent_pid}/mount.
# TODO: Why is this required ?
allow migrate_legacy_obb_data installd:file read;