Skip to content
Snippets Groups Projects
Select Git revision
  • 85dcafe306ec0f16cc8c54dbffcc2ecd99e33c67
  • master default
  • ci-bump-test
  • abp-queue
  • new-delete-leaks
  • fused-continuation-and-completion-stealing
  • emper-fix-invalid-conv
  • remote-put-get-free-context-cycle
  • linux-version-construct-on-first-use
  • libstdc++-asserts
  • msan
  • libc++
  • completer-strategies
  • cactus_stack_devel_one_commit
  • client-load-change
  • cppcheck
  • flow
  • cast-if-future
  • async_network2
  • thread_safe_log_config
  • burak
  • attic/clang-release-tls-optimization-debug-and-fix
  • attic/continuation-stealing-dev
23 results

Main.cpp

Blame
  • Forked from Lehrstuhl für Informatik 4 (Systemsoftware) / manycore / emper
    Source project has a limited visibility.
    platform_app.te 1.27 KiB
    ###
    ### Apps signed with the platform key.
    ###
    
    type platform_app, domain;
    app_domain(platform_app)
    # Access the network.
    net_domain(platform_app)
    # Access bluetooth.
    bluetooth_domain(platform_app)
    # Read from /data/local/tmp or /data/data/com.android.shell.
    allow platform_app shell_data_file:dir search;
    allow platform_app shell_data_file:file { open getattr read };
    # Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
    # created by system server.
    allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
    allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
    allow platform_app apk_private_data_file:dir search;
    # ASEC
    allow platform_app asec_apk_file:dir create_dir_perms;
    allow platform_app asec_apk_file:file create_file_perms;
    
    # Access to /data/media.
    allow platform_app media_rw_data_file:dir create_dir_perms;
    allow platform_app media_rw_data_file:file create_file_perms;
    
    # Write to /cache.
    allow platform_app cache_file:dir create_dir_perms;
    allow platform_app cache_file:file create_file_perms;
    
    # Audited locally.
    service_manager_local_audit_domain(platform_app)
    auditallow platform_app {
        service_manager_type
        -mediaserver_service
        -radio_service
        -surfaceflinger_service
        -system_server_service
    }:service_manager find;