2012-01-04 18:33:27 +01:00
|
|
|
# Input selectors:
|
|
|
|
# isSystemServer (boolean)
|
|
|
|
# user (string)
|
|
|
|
# seinfo (string)
|
|
|
|
# name (string)
|
2014-02-19 16:54:41 +01:00
|
|
|
# path (string)
|
2012-07-27 23:08:21 +02:00
|
|
|
# sebool (string)
|
2012-01-04 18:33:27 +01:00
|
|
|
# isSystemServer=true can only be used once.
|
2012-07-27 23:08:21 +02:00
|
|
|
# An unspecified isSystemServer defaults to false.
|
2012-01-04 18:33:27 +01:00
|
|
|
# An unspecified string selector will match any value.
|
|
|
|
# A user string selector that ends in * will perform a prefix match.
|
2012-09-24 16:16:03 +02:00
|
|
|
# user=_app will match any regular app UID.
|
|
|
|
# user=_isolated will match any isolated service UID.
|
2012-01-04 18:33:27 +01:00
|
|
|
# All specified input selectors in an entry must match (i.e. logical AND).
|
|
|
|
# Matching is case-insensitive.
|
|
|
|
# Precedence rules:
|
|
|
|
# (1) isSystemServer=true before isSystemServer=false.
|
|
|
|
# (2) Specified user= string before unspecified user= string.
|
|
|
|
# (3) Fixed user= string before user= prefix (i.e. ending in *).
|
|
|
|
# (4) Longer user= prefix before shorter user= prefix.
|
|
|
|
# (5) Specified seinfo= string before unspecified seinfo= string.
|
|
|
|
# (6) Specified name= string before unspecified name= string.
|
2014-02-19 16:54:41 +01:00
|
|
|
# (7) Specified path= string before unspecified path= string.
|
|
|
|
# (8) Specified sebool= string before unspecified sebool= string.
|
2012-01-04 18:33:27 +01:00
|
|
|
#
|
|
|
|
# Outputs:
|
|
|
|
# domain (string)
|
|
|
|
# type (string)
|
2012-11-28 16:46:18 +01:00
|
|
|
# levelFrom (string; one of none, all, app, or user)
|
2012-01-04 18:33:27 +01:00
|
|
|
# level (string)
|
|
|
|
# Only entries that specify domain= will be used for app process labeling.
|
|
|
|
# Only entries that specify type= will be used for app directory labeling.
|
2012-11-28 16:46:18 +01:00
|
|
|
# levelFrom=user is only supported for _app or _isolated UIDs.
|
|
|
|
# levelFrom=app or levelFrom=all is only supported for _app UIDs.
|
2012-01-04 18:33:27 +01:00
|
|
|
# level may be used to specify a fixed level for any UID.
|
|
|
|
#
|
2013-09-14 00:59:04 +02:00
|
|
|
isSystemServer=true domain=system_server
|
2014-05-07 19:10:02 +02:00
|
|
|
user=system domain=system_app type=system_app_data_file
|
2012-11-16 15:06:47 +01:00
|
|
|
user=bluetooth domain=bluetooth type=bluetooth_data_file
|
2012-01-04 18:33:27 +01:00
|
|
|
user=nfc domain=nfc type=nfc_data_file
|
|
|
|
user=radio domain=radio type=radio_data_file
|
2014-03-27 16:48:32 +01:00
|
|
|
user=shell domain=shell type=shell_data_file
|
2012-09-26 00:52:54 +02:00
|
|
|
user=_isolated domain=isolated_app
|
Coalesce shared_app, media_app, release_app into untrusted_app.
This change folds the shared_app, media_app, and release_app
domains into untrusted_app, reducing the set of app domains down
to just distinct domains for the fixed UID apps (e.g. system_app, bluetooth,
nfc, radio), a single domain for apps signed by the platform key
(platform_app), and a single domain for all other apps (untrusted_app).
Thus, SELinux only distinguishes when already distinguished by a predefined
Android ID (AID) or by the platform certificate (which get the signature-only
Android permissions and thus may require special OS-level accesses).
It is still possible to introduce specific app domains for specific
apps by adding signer and package stanzas to mac_permissions.xml,
but this can be done on an as-needed basis for specialized apps that
require particular OS-level permissions outside the usual set.
As there is now only a single platform app domains, get rid of the
platformappdomain attribute and platform_app_domain() macro. We used
to add mlstrustedsubject to those domains but drop this since we are not
using MLS in AOSP presently; we can revisit which domains need it if/when
we use MLS.
Since we are dropping the shared, media, and release seinfo entries from
seapp_contexts, drop them from mac_permissions.xml as well. However,
we leave the keys.conf entries in case someone wants to add a signer
entry in the future for specific apps signed by those keys to
mac_permissions.xml.
Change-Id: I877192cca07360c4a3c0ef475f016cc273e1d968
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-04-04 15:09:25 +02:00
|
|
|
user=_app seinfo=platform domain=platform_app type=app_data_file
|
|
|
|
user=_app domain=untrusted_app type=app_data_file
|