9561e19573
Bug: 231579544 Test: see allowlisted system properties in the VM Ignore-AOSP-First: Cherry-pick from AOSP Change-Id: Idb263087639e4677e437ac2fcd2726ee71547f48 Merged-In: Idb263087639e4677e437ac2fcd2726ee71547f48
37 lines
1.2 KiB
Text
37 lines
1.2 KiB
Text
type composd, domain, coredomain;
|
|
type composd_exec, system_file_type, exec_type, file_type;
|
|
|
|
# Host dynamic AIDL services
|
|
init_daemon_domain(composd)
|
|
binder_use(composd)
|
|
add_service(composd, compos_service)
|
|
|
|
# Call back into system server
|
|
binder_call(composd, system_server)
|
|
|
|
# Start a VM
|
|
virtualizationservice_use(composd)
|
|
|
|
# Prepare staging directory for odrefresh
|
|
allow composd apex_art_data_file:dir { create_dir_perms relabelfrom };
|
|
allow composd apex_art_staging_data_file:dir { create_dir_perms relabelto };
|
|
allow composd apex_art_staging_data_file:file { getattr unlink };
|
|
|
|
# Delete files in the odrefresh target directory
|
|
allow composd apex_art_data_file:file unlink;
|
|
|
|
# Access our APEX data files
|
|
allow composd apex_module_data_file:dir search;
|
|
allow composd apex_compos_data_file:dir create_dir_perms;
|
|
allow composd apex_compos_data_file:file create_file_perms;
|
|
|
|
# Run fd_server in its own domain, and send SIGTERM when finished.
|
|
domain_auto_trans(composd, fd_server_exec, compos_fd_server)
|
|
allow composd compos_fd_server:process signal;
|
|
|
|
# Read ART's properties
|
|
get_prop(composd, dalvik_config_prop)
|
|
get_prop(composd, device_config_runtime_native_boot_prop)
|
|
|
|
# We never create any artifact files directly
|
|
neverallow composd apex_art_data_file:file ~unlink;
|