2019-02-26 22:13:28 +01:00
|
|
|
# Domain for the otapreopt executable, running under postinstall_dexopt
|
|
|
|
#
|
|
|
|
# Note: otapreopt is a driver for dex2oat, and reuses parts of installd. As such,
|
|
|
|
# this is derived and adapted from installd.te.
|
|
|
|
|
2020-12-04 15:07:52 +01:00
|
|
|
type postinstall_dexopt, domain, coredomain, mlstrustedsubject;
|
2021-03-11 20:26:08 +01:00
|
|
|
type postinstall_dexopt_exec, system_file_type, exec_type, file_type;
|
2021-04-27 01:46:57 +02:00
|
|
|
type postinstall_dexopt_tmpfs, file_type;
|
2017-03-23 22:27:32 +01:00
|
|
|
|
2016-07-22 22:13:11 +02:00
|
|
|
# Run dex2oat/patchoat in its own sandbox.
|
|
|
|
# We have to manually transition, as we don't have an entrypoint.
|
2019-03-13 19:52:23 +01:00
|
|
|
# - Case where dex2oat is in a non-flattened APEX, which has retained
|
|
|
|
# the correct type (`dex2oat_exec`).
|
2019-01-19 13:42:11 +01:00
|
|
|
domain_auto_trans(postinstall_dexopt, dex2oat_exec, dex2oat)
|
2019-03-13 19:52:23 +01:00
|
|
|
# - Case where dex2oat is in a flattened APEX, which has been tagged
|
|
|
|
# with the `postinstall_file` type by update_engine.
|
|
|
|
domain_auto_trans(postinstall_dexopt, postinstall_file, dex2oat)
|
2019-02-26 22:13:28 +01:00
|
|
|
|
2021-04-27 01:46:57 +02:00
|
|
|
# Run derive_classpath to get the current BCP.
|
|
|
|
domain_auto_trans(postinstall_dexopt, derive_classpath_exec, derive_classpath)
|
|
|
|
# Allow postinstall_dexopt to make a tempfile for derive_classpath to write into
|
|
|
|
tmpfs_domain(postinstall_dexopt);
|
|
|
|
allow postinstall_dexopt postinstall_dexopt_tmpfs:file open;
|
|
|
|
|
2019-02-26 22:13:28 +01:00
|
|
|
allow postinstall_dexopt self:global_capability_class_set { chown dac_override dac_read_search fowner fsetid setgid setuid };
|
|
|
|
|
|
|
|
allow postinstall_dexopt postinstall_file:filesystem getattr;
|
|
|
|
allow postinstall_dexopt postinstall_file:dir { getattr read search };
|
|
|
|
allow postinstall_dexopt postinstall_file:lnk_file { getattr read };
|
|
|
|
allow postinstall_dexopt proc_filesystems:file { getattr open read };
|
2021-03-11 20:26:08 +01:00
|
|
|
allow postinstall_dexopt rootfs:file r_file_perms;
|
|
|
|
|
2019-02-26 22:13:28 +01:00
|
|
|
allow postinstall_dexopt tmpfs:file read;
|
|
|
|
|
2021-07-19 19:58:43 +02:00
|
|
|
# Allow access odsign verification status
|
|
|
|
get_prop(postinstall_dexopt, odsign_prop)
|
|
|
|
|
2019-02-26 22:13:28 +01:00
|
|
|
# Allow access to /postinstall/apex.
|
|
|
|
allow postinstall_dexopt postinstall_apex_mnt_dir:dir { getattr search };
|
|
|
|
|
|
|
|
# Note: /data/ota is created by init (see system/core/rootdir/init.rc) to avoid giving access
|
|
|
|
# here and having to relabel the directory.
|
|
|
|
|
|
|
|
# Read app data (APKs) as input to dex2oat.
|
|
|
|
r_dir_file(postinstall_dexopt, apk_data_file)
|
|
|
|
# Read vendor app data (APKs) as input to dex2oat.
|
|
|
|
r_dir_file(postinstall_dexopt, vendor_app_file)
|
2019-03-22 20:13:53 +01:00
|
|
|
# Read vendor overlay files (APKs) as input to dex2oat.
|
|
|
|
r_dir_file(postinstall_dexopt, vendor_overlay_file)
|
2023-06-09 06:26:54 +02:00
|
|
|
# Vendor overlay can be found in vendor apex
|
|
|
|
allow postinstall_dexopt vendor_apex_metadata_file:dir { getattr search };
|
2019-02-26 22:13:28 +01:00
|
|
|
# Access to app oat directory.
|
|
|
|
r_dir_file(postinstall_dexopt, dalvikcache_data_file)
|
|
|
|
|
|
|
|
# Read profile data.
|
2020-12-04 15:07:52 +01:00
|
|
|
allow postinstall_dexopt { user_profile_root_file user_profile_data_file }:dir { getattr search };
|
2019-02-26 22:13:28 +01:00
|
|
|
allow postinstall_dexopt user_profile_data_file:file r_file_perms;
|
|
|
|
# Suppress deletion denial (we do not want to update the profile).
|
|
|
|
dontaudit postinstall_dexopt user_profile_data_file:file { write };
|
|
|
|
|
|
|
|
# Write to /data/ota(/*). Create symlinks in /data/ota(/*)
|
|
|
|
allow postinstall_dexopt ota_data_file:dir create_dir_perms;
|
|
|
|
allow postinstall_dexopt ota_data_file:file create_file_perms;
|
|
|
|
allow postinstall_dexopt ota_data_file:lnk_file create_file_perms;
|
|
|
|
|
|
|
|
# Need to write .b files, which are dalvikcache_data_file, not ota_data_file.
|
|
|
|
# TODO: See whether we can apply ota_data_file?
|
|
|
|
allow postinstall_dexopt dalvikcache_data_file:dir rw_dir_perms;
|
|
|
|
allow postinstall_dexopt dalvikcache_data_file:file create_file_perms;
|
|
|
|
|
|
|
|
# Allow labeling of files under /data/app/com.example/oat/
|
|
|
|
# TODO: Restrict to .b suffix?
|
|
|
|
allow postinstall_dexopt dalvikcache_data_file:dir relabelto;
|
|
|
|
allow postinstall_dexopt dalvikcache_data_file:file { relabelto link };
|
|
|
|
|
|
|
|
# Check validity of SELinux context before use.
|
|
|
|
selinux_check_context(postinstall_dexopt)
|
|
|
|
selinux_check_access(postinstall_dexopt)
|
|
|
|
|
|
|
|
|
|
|
|
# Postinstall wants to know about our child.
|
|
|
|
allow postinstall_dexopt postinstall:process sigchld;
|
|
|
|
|
|
|
|
# Allow otapreopt to use file descriptors from otapreopt_chroot.
|
|
|
|
# TODO: Probably we can actually close file descriptors...
|
|
|
|
allow postinstall_dexopt otapreopt_chroot:fd use;
|
2019-03-01 11:05:35 +01:00
|
|
|
|
|
|
|
# Allow postinstall_dexopt to access the runtime feature flag properties.
|
|
|
|
get_prop(postinstall_dexopt, device_config_runtime_native_prop)
|
|
|
|
get_prop(postinstall_dexopt, device_config_runtime_native_boot_prop)
|