blob: be155c9739ca37d73b38b93b138332d3f85aac0a [file] [log] [blame]
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08001###
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07002### Untrusted_27.
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08003###
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07004### This file defines the rules for untrusted apps running with
Yabin Cui5dc2c8c2018-11-02 11:12:43 -07005### 25 < targetSdkVersion <= 28.
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -07006###
7### This file defines the rules for untrusted apps.
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -08008### Apps are labeled based on mac_permissions.xml (maps signer and
9### optionally package name to seinfo value) and seapp_contexts (maps UID
10### and optionally seinfo value to domain for process and type for data
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070011### directory). The untrusted_app_27 domain is the default assignment in
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -080012### seapp_contexts for any app with UID between APP_AID (10000)
13### and AID_ISOLATED_START (99000) if the app has no specific seinfo
14### value as determined from mac_permissions.xml. In current AOSP, this
15### domain is assigned to all non-system apps as well as to any system apps
16### that are not signed by the platform key. To move
17### a system app into a specific domain, add a signer entry for it to
18### mac_permissions.xml and assign it one of the pre-existing seinfo values
19### or define and use a new seinfo value in both mac_permissions.xml and
20### seapp_contexts.
21###
22
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070023typeattribute untrusted_app_27 coredomain;
Jeff Vander Stoepbacb6d72017-02-13 13:33:27 -080024
Jeff Vander Stoep3aa7ca52018-04-03 11:22:38 -070025app_domain(untrusted_app_27)
26untrusted_app_domain(untrusted_app_27)
27net_domain(untrusted_app_27)
28bluetooth_domain(untrusted_app_27)
Yabin Cui5dc2c8c2018-11-02 11:12:43 -070029
Nick Kralevich65a89c12018-12-21 10:03:50 -080030# The ability to call exec() on files in the apps home directories
31# for targetApi 26, 27, and 28.
32allow untrusted_app_27 app_data_file:file execute_no_trans;
Alan Stokesc6cbead2019-01-07 14:08:11 +000033userdebug_or_eng(`auditallow untrusted_app_27 app_data_file:file { execute execute_no_trans };')
David Brazdil535c5d22018-11-19 23:02:49 +000034
35# The ability to invoke dex2oat. Historically required by ART, now only
36# allowed for targetApi<=28 for compat reasons.
37allow untrusted_app_27 dex2oat_exec:file rx_file_perms;
Nick Kralevichcfe1bae2018-11-20 10:45:56 -080038userdebug_or_eng(`auditallow untrusted_app_27 dex2oat_exec:file rx_file_perms;')