5131ff6544
This prebuilt is based on the AOSP policy, but slightly manipulated so that the set of types and attributes are identical with R policy. Following types are removed. boot_status_prop dalvik_config_prop gnss_device surfaceflinger_color_prop surfaceflinger_prop systemsound_config_prop vold_config_prop vold_status_prop Following type is renamed. wificond_service -> wifinl80211_service Bug: 153661471 Test: N/A Change-Id: I018d5e43f53c2bf721db1d13f5f4be42b9782b29
25 lines
1 KiB
Text
25 lines
1 KiB
Text
# viewcompiler
|
|
type viewcompiler, domain, coredomain, mlstrustedsubject;
|
|
type viewcompiler_exec, system_file_type, exec_type, file_type;
|
|
type viewcompiler_tmpfs, file_type;
|
|
|
|
# Reading an APK opens a ZipArchive, which unpack to tmpfs.
|
|
# Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
|
|
# own label, which differs from other labels created by other processes.
|
|
# This allows to distinguish in policy files created by viewcompiler vs other
|
|
# processes.
|
|
tmpfs_domain(viewcompiler)
|
|
|
|
allow viewcompiler installd:fd use;
|
|
|
|
# Include write permission for app data files so viewcompiler can generate
|
|
# compiled layout dex files
|
|
allow viewcompiler app_data_file:file { getattr write };
|
|
|
|
# Allow the view compiler to read resources from the apps APK.
|
|
allow viewcompiler apk_data_file:file { read map };
|
|
|
|
# priv-apps are moving to a world where they can only execute
|
|
# signed code. Make sure viewcompiler never can write to privapp
|
|
# directories to avoid introducing unsigned executable code
|
|
neverallow viewcompiler privapp_data_file:file no_w_file_perms;
|