Skip to content
Snippets Groups Projects
Commit 683f78bd authored by Stephen Smalley's avatar Stephen Smalley Committed by Android Git Automerger
Browse files

am 19c50903: Define a type for /data/dalvik-cache/profiles.

* commit '19c50903':
  Define a type for /data/dalvik-cache/profiles.
parents 52ab24ca 19c50903
No related branches found
No related tags found
No related merge requests found
...@@ -120,6 +120,9 @@ allow appdomain usbaccessory_device:chr_file { read write getattr }; ...@@ -120,6 +120,9 @@ allow appdomain usbaccessory_device:chr_file { read write getattr };
# For art. # For art.
allow appdomain dalvikcache_data_file:file execute; allow appdomain dalvikcache_data_file:file execute;
# /data/dalvik-cache/profiles
allow appdomain dalvikcache_profiles_data_file:file write;
# For legacy unlabeled userdata on existing devices. # For legacy unlabeled userdata on existing devices.
# See discussion of Unlabeled files in domain.te for more information. # See discussion of Unlabeled files in domain.te for more information.
allow appdomain unlabeled:file x_file_perms; allow appdomain unlabeled:file x_file_perms;
......
...@@ -100,6 +100,8 @@ allow domain apk_data_file:file r_file_perms; ...@@ -100,6 +100,8 @@ allow domain apk_data_file:file r_file_perms;
# Read /data/dalvik-cache. # Read /data/dalvik-cache.
allow domain dalvikcache_data_file:dir { search getattr }; allow domain dalvikcache_data_file:dir { search getattr };
allow domain dalvikcache_data_file:file r_file_perms; allow domain dalvikcache_data_file:file r_file_perms;
allow domain dalvikcache_profiles_data_file:dir { search getattr };
allow domain dalvikcache_profiles_data_file:file r_file_perms;
# Read already opened /cache files. # Read already opened /cache files.
allow domain cache_file:dir r_dir_perms; allow domain cache_file:dir r_dir_perms;
......
...@@ -52,6 +52,8 @@ type apk_private_data_file, file_type, data_file_type; ...@@ -52,6 +52,8 @@ type apk_private_data_file, file_type, data_file_type;
type apk_private_tmp_file, file_type, data_file_type, mlstrustedobject; type apk_private_tmp_file, file_type, data_file_type, mlstrustedobject;
# /data/dalvik-cache # /data/dalvik-cache
type dalvikcache_data_file, file_type, data_file_type; type dalvikcache_data_file, file_type, data_file_type;
# /data/dalvik-cache/profiles
type dalvikcache_profiles_data_file, file_type, data_file_type;
# /data/local - writable by shell # /data/local - writable by shell
type shell_data_file, file_type, data_file_type; type shell_data_file, file_type, data_file_type;
# /data/gps # /data/gps
......
...@@ -168,6 +168,7 @@ ...@@ -168,6 +168,7 @@
/data/drm(/.*)? u:object_r:drm_data_file:s0 /data/drm(/.*)? u:object_r:drm_data_file:s0
/data/gps(/.*)? u:object_r:gps_data_file:s0 /data/gps(/.*)? u:object_r:gps_data_file:s0
/data/dalvik-cache(/.*)? u:object_r:dalvikcache_data_file:s0 /data/dalvik-cache(/.*)? u:object_r:dalvikcache_data_file:s0
/data/dalvik-cache/profiles(/.*)? u:object_r:dalvikcache_profiles_data_file:s0
/data/anr(/.*)? u:object_r:anr_data_file:s0 /data/anr(/.*)? u:object_r:anr_data_file:s0
/data/app(/.*)? u:object_r:apk_data_file:s0 /data/app(/.*)? u:object_r:apk_data_file:s0
/data/app/vmdl.*\.tmp u:object_r:apk_tmp_file:s0 /data/app/vmdl.*\.tmp u:object_r:apk_tmp_file:s0
......
...@@ -9,6 +9,8 @@ allow installd self:capability { chown dac_override fowner fsetid setgid setuid ...@@ -9,6 +9,8 @@ allow installd self:capability { chown dac_override fowner fsetid setgid setuid
allow installd system_data_file:file create_file_perms; allow installd system_data_file:file create_file_perms;
allow installd system_data_file:lnk_file create; allow installd system_data_file:lnk_file create;
allow installd dalvikcache_data_file:file create_file_perms; allow installd dalvikcache_data_file:file create_file_perms;
allow installd dalvikcache_profiles_data_file:dir create_dir_perms;
allow installd dalvikcache_profiles_data_file:file create_file_perms;
allow installd data_file_type:dir create_dir_perms; allow installd data_file_type:dir create_dir_perms;
allow installd data_file_type:dir { relabelfrom relabelto }; allow installd data_file_type:dir { relabelfrom relabelto };
allow installd data_file_type:{ file_class_set } { getattr unlink }; allow installd data_file_type:{ file_class_set } { getattr unlink };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment