08d4c8fa6e
This commit adds fake 31.0 prebuilt. The prebuilt is based on AOSP policy, but slightly modified so the set of types and attributes is a subset of real 31.0 prebuilt (sc-dev policy). Steps taken to make the fake prebuilt: 1) build plat_sepolicy.cil both on AOSP and sc-dev, with lunch target aosp_arm64-eng. 2) diff both outputs to find out which types and attributes don't exist. 3) remove all relevant files and statements. As a result, the following types are removed. artd artd_exec artd_service power_stats_service transformer_service virtualizationservice virtualizationservice_data_file virtualizationservice_exec Bug: 189161483 Test: N/A, will do after adding 31.0 mapping files. Change-Id: Ia957fc32b1838dae730d9dd7bd917d684d4a24cf Merged-In: Ia4ea2999f4bc8ae80f13e51d99fba3e98e293447
33 lines
1.2 KiB
Text
33 lines
1.2 KiB
Text
# profman
|
|
type profman, domain;
|
|
type profman_exec, system_file_type, exec_type, file_type;
|
|
|
|
allow profman user_profile_data_file:file { getattr read write lock map };
|
|
|
|
# Dumping profile info opens the application APK file for pretty printing.
|
|
allow profman asec_apk_file:file { read map };
|
|
allow profman apk_data_file:file { getattr read map };
|
|
allow profman apk_data_file:dir { getattr read search };
|
|
|
|
allow profman oemfs:file { read map };
|
|
# Reading an APK opens a ZipArchive, which unpack to tmpfs.
|
|
allow profman tmpfs:file { read map };
|
|
allow profman profman_dump_data_file:file { write map };
|
|
|
|
allow profman installd:fd use;
|
|
|
|
# Allow profman to analyze profiles for the secondary dex files. These
|
|
# are application dex files reported back to the framework when using
|
|
# BaseDexClassLoader.
|
|
allow profman { privapp_data_file app_data_file }:file { getattr read write lock map };
|
|
allow profman { privapp_data_file app_data_file }:dir { getattr read search };
|
|
|
|
# Allow query ART device config properties
|
|
get_prop(profman, device_config_runtime_native_prop)
|
|
get_prop(profman, device_config_runtime_native_boot_prop)
|
|
|
|
###
|
|
### neverallow rules
|
|
###
|
|
|
|
neverallow profman { privapp_data_file app_data_file }:notdevfile_class_set open;
|