blob: 79c776287f5f1766d4543d140cf242871a17bbf0 [file] [log] [blame]
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08001###
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07002### Untrusted_27.
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08003###
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07004### This file defines the rules for untrusted apps running with
Nick Kralevich15d1a122018-10-31 03:40:13 +00005### 25 < targetSdkVersion <= 27.
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07006###
7### This file defines the rules for untrusted apps.
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08008### Apps are labeled based on mac_permissions.xml (maps signer and
9### optionally package name to seinfo value) and seapp_contexts (maps UID
10### and optionally seinfo value to domain for process and type for data
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070011### directory). The untrusted_app_27 domain is the default assignment in
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -080012### seapp_contexts for any app with UID between APP_AID (10000)
13### and AID_ISOLATED_START (99000) if the app has no specific seinfo
14### value as determined from mac_permissions.xml. In current AOSP, this
15### domain is assigned to all non-system apps as well as to any system apps
16### that are not signed by the platform key. To move
17### a system app into a specific domain, add a signer entry for it to
18### mac_permissions.xml and assign it one of the pre-existing seinfo values
19### or define and use a new seinfo value in both mac_permissions.xml and
20### seapp_contexts.
21###
22
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070023typeattribute untrusted_app_27 coredomain;
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -080024
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070025app_domain(untrusted_app_27)
26untrusted_app_domain(untrusted_app_27)
27net_domain(untrusted_app_27)
28bluetooth_domain(untrusted_app_27)