blob: 8dd65720aa3331a60b44c6b14aa6a72bfd0970ac [file] [log] [blame]
satayevafc97912021-03-19 11:08:49 +00001
2# Domain for derive_classpath
3type derive_classpath, domain, coredomain;
4type derive_classpath_exec, system_file_type, exec_type, file_type;
5init_daemon_domain(derive_classpath)
6
Artur Satayev4c6d3082021-03-29 15:39:33 +01007# Read /apex
8allow derive_classpath apex_mnt_dir:dir r_dir_perms;
Jooyung Hanb6211b82023-05-31 17:51:14 +09009allow derive_classpath vendor_apex_metadata_file:dir r_dir_perms;
Artur Satayev4c6d3082021-03-29 15:39:33 +010010
satayevafc97912021-03-19 11:08:49 +000011# Create /data/system/environ/classpath file
12allow derive_classpath environ_system_data_file:dir rw_dir_perms;
13allow derive_classpath environ_system_data_file:file create_file_perms;
14
15# b/183079517 fails on gphone targets otherwise
16allow derive_classpath unlabeled:dir search;
Alex Light8393a052021-04-26 16:46:57 -070017
18# Allow derive_classpath to write the classpath into ota dexopt
19# - Read the ota's apex dir
20allow derive_classpath postinstall_apex_mnt_dir:dir r_dir_perms;
21# - Report the BCP to the ota's dexopt
22allow derive_classpath postinstall_dexopt:dir search;
23allow derive_classpath postinstall_dexopt:fd use;
24allow derive_classpath postinstall_dexopt:file read;
25allow derive_classpath postinstall_dexopt:lnk_file read;
26allow derive_classpath postinstall_dexopt_tmpfs:file rw_file_perms;
Jiakai Zhang4acd0732024-03-20 11:24:54 +000027
28# Allow to be called by artd in Pre-reboot Dexopt.
29allow derive_classpath artd:fd use;
30
31# Allow writing to Pre-reboot Dexopt temp files.
32allow derive_classpath pre_reboot_dexopt_artd_file:file { open read write };