Jeff Vander Stoep | bacb6d7 | 2017-02-13 13:33:27 -0800 | [diff] [blame] | 1 | ### |
| 2 | ### Untrusted_app_25 |
| 3 | ### |
| 4 | ### This file defines the rules for untrusted apps running with |
| 5 | ### targetSdkVersion <= 25. |
| 6 | ### |
| 7 | ### Apps are labeled based on mac_permissions.xml (maps signer and |
| 8 | ### optionally package name to seinfo value) and seapp_contexts (maps UID |
| 9 | ### and optionally seinfo value to domain for process and type for data |
| 10 | ### directory). The untrusted_app domain is the default assignment in |
| 11 | ### seapp_contexts for any app with UID between APP_AID (10000) |
| 12 | ### and AID_ISOLATED_START (99000) if the app has no specific seinfo |
| 13 | ### value as determined from mac_permissions.xml. In current AOSP, this |
| 14 | ### domain is assigned to all non-system apps as well as to any system apps |
| 15 | ### that are not signed by the platform key. To move |
| 16 | ### a system app into a specific domain, add a signer entry for it to |
| 17 | ### mac_permissions.xml and assign it one of the pre-existing seinfo values |
| 18 | ### or define and use a new seinfo value in both mac_permissions.xml and |
| 19 | ### seapp_contexts. |
| 20 | ### |
| 21 | |
| 22 | app_domain(untrusted_app_25) |
| 23 | untrusted_app_domain(untrusted_app_25) |
| 24 | net_domain(untrusted_app_25) |
| 25 | bluetooth_domain(untrusted_app_25) |
| 26 | |
Jeff Vander Stoep | d152425 | 2017-02-21 20:13:15 -0800 | [diff] [blame] | 27 | # Allow the allocation and use of ptys |
| 28 | # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm |
| 29 | create_pty(untrusted_app_25) |
| 30 | |
Jeff Vander Stoep | bacb6d7 | 2017-02-13 13:33:27 -0800 | [diff] [blame] | 31 | # b/34115651 - net.dns* properties read |
| 32 | # This will go away in a future Android release |
| 33 | get_prop(untrusted_app_25, net_dns_prop) |