blob: c47f0a5bd9a53612324a81810ab49ceef1e894e4 [file] [log] [blame]
Anton Hanssone8225452019-11-25 13:10:10 +00001
2# Domain for derive_sdk
3type derive_sdk, domain, coredomain;
4type derive_sdk_exec, system_file_type, exec_type, file_type;
5init_daemon_domain(derive_sdk)
6
7# Read /apex
8allow derive_sdk apex_mnt_dir:dir r_dir_perms;
Jooyung Hanb6211b82023-05-31 17:51:14 +09009allow derive_sdk vendor_apex_metadata_file:dir r_dir_perms;
Anton Hanssone8225452019-11-25 13:10:10 +000010
11# Prop rules: writable by derive_sdk, readable by bootclasspath (apps)
Anton Hanssonb8413352020-01-06 17:29:13 +000012set_prop(derive_sdk, module_sdkextensions_prop)
13neverallow { domain -init -derive_sdk } module_sdkextensions_prop:property_service set;
MÃ¥rten Kongstad098e9092022-09-20 14:19:30 +020014
15# Allow derive_sdk to write data back to dumpstate when forked from dumpstate.
16# The shell_data_file permissions are needed when a bugreport is taken:
17# dumpstate will redirect its stdout to a temporary shell_data_file:file, and
18# this makes derive_sdk append to that file.
19allow derive_sdk dumpstate:fd use;
20allow derive_sdk dumpstate:unix_stream_socket { read write };
21allow derive_sdk shell_data_file:file { getattr append read write };