Skip to content
Snippets Groups Projects
Select Git revision
  • 132e56b9417d0c9cb029d2255d40415e5f1aad74
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

file_contexts

Blame
    • Stephen Smalley's avatar
      baf49bd5
      Label /data/.layout_version with its own type. · baf49bd5
      Stephen Smalley authored
      
      installd creates /data/.layout_version.  Introduce a separate type
      for this file (and any other file created by installd under a directory
      labeled system_data_file) so that we can allow create/write access by
      installd without allowing it to any system data files created by other
      processes.  This prevents installd from overwriting other system data
      files, and ensure that any files it creates will require explicit
      rules in order to access.
      
      Change-Id: Id04e49cd571390d18792949c8b2b13b1ac59c016
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      baf49bd5
      History
      Label /data/.layout_version with its own type.
      Stephen Smalley authored
      
      installd creates /data/.layout_version.  Introduce a separate type
      for this file (and any other file created by installd under a directory
      labeled system_data_file) so that we can allow create/write access by
      installd without allowing it to any system data files created by other
      processes.  This prevents installd from overwriting other system data
      files, and ensure that any files it creates will require explicit
      rules in order to access.
      
      Change-Id: Id04e49cd571390d18792949c8b2b13b1ac59c016
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    runas.te 913 B
    type runas, domain, mlstrustedsubject;
    type runas_exec, exec_type, file_type;
    
    # ndk-gdb invokes adb shell run-as.
    domain_auto_trans(shell, runas_exec, runas)
    allow runas adbd:process sigchld;
    allow runas shell:fd use;
    allow runas shell:fifo_file { read write };
    allow runas devpts:chr_file { read write ioctl };
    
    # run-as reads package information.
    allow runas system_data_file:file r_file_perms;
    
    # run-as checks and changes to the app data dir.
    dontaudit runas self:capability dac_override;
    allow runas app_data_file:dir { getattr search };
    
    # run-as switches to the app UID/GID.
    allow runas self:capability { setuid setgid };
    
    # run-as switches to the app security context.
    # read /seapp_contexts and /data/security/seapp_contexts
    security_access_policy(runas)
    selinux_check_context(runas) # validate context
    allow runas self:process setcurrent;
    allow runas non_system_app_set:process dyntransition; # setcon