Skip to content
Snippets Groups Projects
  • dcashman's avatar
    cc39f637
    Split general policy into public and private components. · cc39f637
    dcashman authored
    Divide policy into public and private components.  This is the first
    step in splitting the policy creation for platform and non-platform
    policies.  The policy in the public directory will be exported for use
    in non-platform policy creation.  Backwards compatibility with it will
    be achieved by converting the exported policy into attribute-based
    policy when included as part of the non-platform policy and a mapping
    file will be maintained to be included with the platform policy that
    maps exported attributes of previous versions to the current platform
    version.
    
    Eventually we would like to create a clear interface between the
    platform and non-platform device components so that the exported policy,
    and the need for attributes is minimal.  For now, almost all types and
    avrules are left in public.
    
    Test: Tested by building policy and running on device.
    
    Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
    cc39f637
    History
    Split general policy into public and private components.
    dcashman authored
    Divide policy into public and private components.  This is the first
    step in splitting the policy creation for platform and non-platform
    policies.  The policy in the public directory will be exported for use
    in non-platform policy creation.  Backwards compatibility with it will
    be achieved by converting the exported policy into attribute-based
    policy when included as part of the non-platform policy and a mapping
    file will be maintained to be included with the platform policy that
    maps exported attributes of previous versions to the current platform
    version.
    
    Eventually we would like to create a clear interface between the
    platform and non-platform device components so that the exported policy,
    and the need for attributes is minimal.  For now, almost all types and
    avrules are left in public.
    
    Test: Tested by building policy and running on device.
    
    Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
runas.te 1006 B
type runas, domain, domain_deprecated, mlstrustedsubject;
type runas_exec, exec_type, file_type;

allow runas adbd:process sigchld;
allow runas shell:fd use;
allow runas shell:fifo_file { read write };
allow runas devpts:chr_file { read write ioctl };
allow runas shell_data_file:file { read write };

# run-as reads package information.
allow runas system_data_file:file r_file_perms;

# run-as checks and changes to the app data dir.
dontaudit runas self:capability dac_override;
allow runas app_data_file:dir { getattr search };

# run-as switches to the app UID/GID.
allow runas self:capability { setuid setgid };

# run-as switches to the app security context.
selinux_check_context(runas) # validate context
allow runas self:process setcurrent;
allow runas non_system_app_set:process dyntransition; # setcon

###
### neverallow rules
###

# run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
neverallow runas self:capability ~{ setuid setgid };
neverallow runas self:capability2 *;