5e37271df8
system_file_type is a new attribute used to identify files which exist on the /system partition. It's useful for allow rules in init, which are based off of a blacklist of writable files. Additionally, it's useful for constructing neverallow rules to prevent regressions. Additionally, add commented out tests which enforce that all files on the /system partition have the system_file_type attribute. These tests will be uncommented in a future change after all the device-specific policies are cleaned up. Test: Device boots and no obvious problems. Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
29 lines
1 KiB
Text
29 lines
1 KiB
Text
# profman
|
|
type profman, domain;
|
|
type profman_exec, system_file_type, exec_type, file_type;
|
|
|
|
allow profman user_profile_data_file:file { getattr read write lock map };
|
|
|
|
# Dumping profile info opens the application APK file for pretty printing.
|
|
allow profman asec_apk_file:file { read map };
|
|
allow profman apk_data_file:file { getattr read map };
|
|
allow profman apk_data_file:dir { getattr read search };
|
|
|
|
allow profman oemfs:file { read map };
|
|
# Reading an APK opens a ZipArchive, which unpack to tmpfs.
|
|
allow profman tmpfs:file { read map };
|
|
allow profman profman_dump_data_file:file { write map };
|
|
|
|
allow profman installd:fd use;
|
|
|
|
# Allow profman to analyze profiles for the secondary dex files. These
|
|
# are application dex files reported back to the framework when using
|
|
# BaseDexClassLoader.
|
|
allow profman { privapp_data_file app_data_file }:file { getattr read write lock map };
|
|
allow profman { privapp_data_file app_data_file }:dir { getattr read search };
|
|
|
|
###
|
|
### neverallow rules
|
|
###
|
|
|
|
neverallow profman { privapp_data_file app_data_file }:notdevfile_class_set open;
|