Skip to content
Snippets Groups Projects
Select Git revision
  • b8bb1d4c6a4cd60ece45715c2482a991f8113b97
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

platform_app.te

Blame
    • dcashman's avatar
      3e8dbf01
      Restore app_domain macro and move to private use. · 3e8dbf01
      dcashman authored
      app_domain was split up in commit: 2e00e637 to
      enable compilation by hiding type_transition rules from public policy.  These
      rules need to be hidden from public policy because they describe how objects are
      labeled, of which non-platform should be unaware.  Instead of cutting apart the
      app_domain macro, which non-platform policy may rely on for implementing new app
      types, move all app_domain calls to private policy.
      
      (cherry-pick of commit: 76035ea0)
      
      Bug: 33428593
      Test: bullhead and sailfish both boot. sediff shows no policy change.
      Change-Id: I4beead8ccc9b6e13c6348da98bb575756f539665
      3e8dbf01
      History
      Restore app_domain macro and move to private use.
      dcashman authored
      app_domain was split up in commit: 2e00e637 to
      enable compilation by hiding type_transition rules from public policy.  These
      rules need to be hidden from public policy because they describe how objects are
      labeled, of which non-platform should be unaware.  Instead of cutting apart the
      app_domain macro, which non-platform policy may rely on for implementing new app
      types, move all app_domain calls to private policy.
      
      (cherry-pick of commit: 76035ea0)
      
      Bug: 33428593
      Test: bullhead and sailfish both boot. sediff shows no policy change.
      Change-Id: I4beead8ccc9b6e13c6348da98bb575756f539665
    seapp_contexts 1.97 KiB
    # Input selectors:
    #	isSystemServer (boolean)
    #	user (string)
    #	seinfo (string)
    #	name (string)
    #	path (string)
    #	sebool (string)
    # isSystemServer=true can only be used once.
    # An unspecified isSystemServer defaults to false.
    # An unspecified string selector will match any value.
    # A user string selector that ends in * will perform a prefix match.
    # user=_app will match any regular app UID.
    # user=_isolated will match any isolated service UID.
    # All specified input selectors in an entry must match (i.e. logical AND).
    # Matching is case-insensitive.
    #
    # Precedence rules:
    # 	  (1) isSystemServer=true before isSystemServer=false.
    #	  (2) Specified user= string before unspecified user= string.
    #	  (3) Fixed user= string before user= prefix (i.e. ending in *).
    #	  (4) Longer user= prefix before shorter user= prefix.
    #	  (5) Specified seinfo= string before unspecified seinfo= string.
    #	  (6) Specified name= string before unspecified name= string.
    #	  (7) Specified path= string before unspecified path= string.
    #	  (8) Specified sebool= string before unspecified sebool= string.
    #
    # Outputs:
    #	domain (string)
    #	type (string)
    #	levelFrom (string; one of none, all, app, or user)
    #	level (string)
    # Only entries that specify domain= will be used for app process labeling.
    # Only entries that specify type= will be used for app directory labeling.
    # levelFrom=user is only supported for _app or _isolated UIDs.
    # levelFrom=app or levelFrom=all is only supported for _app UIDs.
    # level may be used to specify a fixed level for any UID.
    #
    isSystemServer=true domain=system_server
    user=system domain=system_app type=system_app_data_file
    user=bluetooth domain=bluetooth type=bluetooth_data_file
    user=nfc domain=nfc type=nfc_data_file
    user=radio domain=radio type=radio_data_file
    user=shared_relro domain=shared_relro
    user=shell domain=shell type=shell_data_file
    user=_isolated domain=isolated_app
    user=_app seinfo=platform domain=platform_app type=app_data_file
    user=_app domain=untrusted_app type=app_data_file