f921dd9cad
Also move necessary priv_app permissions into MediaProvider domain and remove MediaProvider specific permissions from priv_app. The new MtpServer permissions fix the following denials: avc: denied { write } for comm=6D747020666673206F70656E name="ep0" dev="functionfs" ino=12326 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:functionfs:s0 tclass=file permissive=1 denial from setting property sys.usb.ffs.mtp.ready, context priv_app Bug: 30976142 Test: Manual, verify permissions are allowed Change-Id: I4e66c5a8b36be21cdb726b5d00c1ec99c54a4aa4
59 lines
1.9 KiB
XML
59 lines
1.9 KiB
XML
<?xml version="1.0" encoding="utf-8"?>
|
|
<policy>
|
|
|
|
<!--
|
|
|
|
* A signature is a hex encoded X.509 certificate or a tag defined in
|
|
keys.conf and is required for each signer tag. The signature can
|
|
either appear as a set of attached cert child tags or as an attribute.
|
|
* A signer tag must contain a seinfo tag XOR multiple package stanzas.
|
|
* Each signer/package tag is allowed to contain one seinfo tag. This tag
|
|
represents additional info that each app can use in setting a SELinux security
|
|
context on the eventual process as well as the apps data directory.
|
|
* seinfo assignments are made according to the following rules:
|
|
- Stanzas with package name refinements will be checked first.
|
|
- Stanzas w/o package name refinements will be checked second.
|
|
- The "default" seinfo label is automatically applied.
|
|
|
|
* valid stanzas can take one of the following forms:
|
|
|
|
// single cert protecting seinfo
|
|
<signer signature="@PLATFORM" >
|
|
<seinfo value="platform" />
|
|
</signer>
|
|
|
|
// multiple certs protecting seinfo (all contained certs must match)
|
|
<signer>
|
|
<cert signature="@PLATFORM1"/>
|
|
<cert signature="@PLATFORM2"/>
|
|
<seinfo value="platform" />
|
|
</signer>
|
|
|
|
// single cert protecting explicitly named app
|
|
<signer signature="@PLATFORM" >
|
|
<package name="com.android.foo">
|
|
<seinfo value="bar" />
|
|
</package>
|
|
</signer>
|
|
|
|
// multiple certs protecting explicitly named app (all certs must match)
|
|
<signer>
|
|
<cert signature="@PLATFORM1"/>
|
|
<cert signature="@PLATFORM2"/>
|
|
<package name="com.android.foo">
|
|
<seinfo value="bar" />
|
|
</package>
|
|
</signer>
|
|
-->
|
|
|
|
<!-- Platform dev key in AOSP -->
|
|
<signer signature="@PLATFORM" >
|
|
<seinfo value="platform" />
|
|
</signer>
|
|
|
|
<!-- Media key in AOSP -->
|
|
<signer signature="@MEDIA" >
|
|
<seinfo value="media" />
|
|
</signer>
|
|
|
|
</policy>
|