f3f4985479
auditd : type=1400 audit(0.0:104): avc: denied { write } for comm="Binder:1830_4" name="tasks" dev="tmpfs" ino=16681 scontext=u:r:installd:s0 tcontext=u:object_r:device:s0 tclass=file permissive=0 As described in aosp/1552554, these denials seems to be triggered by timing issues thus being caught by DeviceBootTest. Add these dontaudit lines so these errors don't block normal feature development. Bug: 177187042 Test: SELinuxUncheckedDenialBootTest on S-on-Q device configuration Change-Id: I5e8754aae5a58e26c98c97664eac0fd9febb9d33
48 lines
No EOL
1.6 KiB
Text
48 lines
No EOL
1.6 KiB
Text
typeattribute installd coredomain;
|
|
|
|
init_daemon_domain(installd)
|
|
|
|
# Run migrate_legacy_obb_data.sh in its own sandbox.
|
|
domain_auto_trans(installd, migrate_legacy_obb_data_exec, migrate_legacy_obb_data)
|
|
allow installd shell_exec:file rx_file_perms;
|
|
|
|
# Run dex2oat in its own sandbox.
|
|
domain_auto_trans(installd, dex2oat_exec, dex2oat)
|
|
|
|
# Run dexoptanalyzer in its own sandbox.
|
|
domain_auto_trans(installd, dexoptanalyzer_exec, dexoptanalyzer)
|
|
|
|
# Run viewcompiler in its own sandbox.
|
|
domain_auto_trans(installd, viewcompiler_exec, viewcompiler)
|
|
|
|
# Run profman in its own sandbox.
|
|
domain_auto_trans(installd, profman_exec, profman)
|
|
|
|
# Run idmap in its own sandbox.
|
|
domain_auto_trans(installd, idmap_exec, idmap)
|
|
|
|
# For collecting bugreports.
|
|
allow installd dumpstate:fd use;
|
|
allow installd dumpstate:fifo_file r_file_perms;
|
|
|
|
# Delete /system/bin/bcc generated artifacts
|
|
allow installd app_exec_data_file:file unlink;
|
|
|
|
# Capture userdata snapshots to /data/misc_[ce|de]/rollback and
|
|
# subsequently restore them.
|
|
allow installd rollback_data_file:dir create_dir_perms;
|
|
allow installd rollback_data_file:file create_file_perms;
|
|
|
|
# Allow installd to access the runtime feature flag properties.
|
|
get_prop(installd, device_config_runtime_native_prop)
|
|
get_prop(installd, device_config_runtime_native_boot_prop)
|
|
|
|
# Allow installd to access apk verity feature flag (for legacy case).
|
|
get_prop(installd, apk_verity_prop)
|
|
|
|
# Allow installd to delete files in /data/staging
|
|
allow installd staging_data_file:file unlink;
|
|
allow installd staging_data_file:dir { open read remove_name rmdir search write };
|
|
|
|
# TODO(b/177187042): Remove this when the denials are fixed.
|
|
dontaudit installd device:file write; |