Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
d7e5ef7e
Commit
d7e5ef7e
authored
11 years ago
by
Stephen Smalley
Committed by
Android Git Automerger
11 years ago
Browse files
Options
Downloads
Plain Diff
am
91a4f8d4
: Label app data directories for system UID apps with a different type.
* commit '
91a4f8d4
': Label app data directories for system UID apps with a different type.
parents
46de9898
91a4f8d4
No related branches found
No related tags found
No related merge requests found
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
app.te
+5
-0
5 additions, 0 deletions
app.te
file.te
+2
-0
2 additions, 0 deletions
file.te
installd.te
+4
-2
4 additions, 2 deletions
installd.te
seapp_contexts
+1
-1
1 addition, 1 deletion
seapp_contexts
system_app.te
+3
-4
3 additions, 4 deletions
system_app.te
with
15 additions
and
7 deletions
app.te
+
5
−
0
View file @
d7e5ef7e
...
...
@@ -109,6 +109,11 @@ allow appdomain media_rw_data_file:file { read getattr };
# Read and write /data/data/com.android.providers.telephony files passed over Binder.
allow appdomain radio_data_file:file { read write getattr };
# Read and write system app data files passed over Binder.
# Motivating case was /data/data/com.android.settings/cache/*.jpg for
# cropping or taking user photos.
allow untrusted_app system_app_data_file:file { read write getattr };
# Access SDcard.
allow appdomain sdcard_type:dir create_dir_perms;
allow appdomain sdcard_type:file create_file_perms;
...
...
This diff is collapsed.
Click to expand it.
file.te
+
2
−
0
View file @
d7e5ef7e
...
...
@@ -81,6 +81,8 @@ type zoneinfo_data_file, file_type, data_file_type;
typealias audio_data_file alias audio_firmware_file;
# /data/data subdirectories - app sandboxes
type app_data_file, file_type, data_file_type;
# /data/data subdirectory for system UID apps.
type system_app_data_file, file_type, data_file_type;
# Compatibility with type name used in Android 4.3 and 4.4.
typealias app_data_file alias platform_app_data_file;
typealias app_data_file alias download_file;
...
...
This diff is collapsed.
Click to expand it.
installd.te
+
4
−
2
View file @
d7e5ef7e
...
...
@@ -34,8 +34,10 @@ allow installd shell_data_file:lnk_file { create setattr };
# restorecon /data/data
allow installd unlabeled:dir relabelfrom;
allow installd unlabeled:notdevfile_class_set relabelfrom;
allow installd system_data_file:dir { relabelfrom relabelto };
allow installd system_data_file:notdevfile_class_set { relabelfrom relabelto };
allow installd system_data_file:dir relabelfrom;
allow installd system_data_file:notdevfile_class_set relabelfrom;
allow installd system_app_data_file:dir { relabelfrom relabelto };
allow installd system_app_data_file:notdevfile_class_set { relabelfrom relabelto };
allow installd bluetooth_data_file:dir { relabelfrom relabelto };
allow installd bluetooth_data_file:notdevfile_class_set { relabelfrom relabelto };
allow installd nfc_data_file:dir { relabelfrom relabelto };
...
...
This diff is collapsed.
Click to expand it.
seapp_contexts
+
1
−
1
View file @
d7e5ef7e
...
...
@@ -35,7 +35,7 @@
# level may be used to specify a fixed level for any UID.
#
isSystemServer=true domain=system_server
user=system domain=system_app type=system_data_file
user=system domain=system_app type=system_
app_
data_file
user=bluetooth domain=bluetooth type=bluetooth_data_file
user=nfc domain=nfc type=nfc_data_file
user=radio domain=radio type=radio_data_file
...
...
This diff is collapsed.
Click to expand it.
system_app.te
+
3
−
4
View file @
d7e5ef7e
...
...
@@ -9,10 +9,9 @@ app_domain(system_app)
net_domain(system_app)
binder_service(system_app)
# Read and write system data files.
# May want to split into separate types.
allow system_app system_data_file:dir create_dir_perms;
allow system_app system_data_file:file create_file_perms;
# Read and write /data/data subdirectory.
allow system_app system_app_data_file:dir create_dir_perms;
allow system_app system_app_data_file:file create_file_perms;
# Read wallpaper file.
allow system_app wallpaper_file:file r_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment