1 ### 2 ### Untrusted_app_25 3 ### 4 ### This file defines the rules for untrusted apps running with 5 ### targetSdkVersion <= 25. 6 ### 7 ### Apps are labeled based on mac_permissions.xml (maps signer and 8 ### optionally package name to seinfo value) and seapp_contexts (maps UID 9 ### and optionally seinfo value to domain for process and type for data 10 ### directory). The untrusted_app domain is the default assignment in 11 ### seapp_contexts for any app with UID between APP_AID (10000) 12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 13 ### value as determined from mac_permissions.xml. In current AOSP, this 14 ### domain is assigned to all non-system apps as well as to any system apps 15 ### that are not signed by the platform key. To move 16 ### a system app into a specific domain, add a signer entry for it to 17 ### mac_permissions.xml and assign it one of the pre-existing seinfo values 18 ### or define and use a new seinfo value in both mac_permissions.xml and 19 ### seapp_contexts. 20 ### 21 22 typeattribute untrusted_app_25 coredomain; 23 24 app_domain(untrusted_app_25) 25 untrusted_app_domain(untrusted_app_25) 26 net_domain(untrusted_app_25) 27 bluetooth_domain(untrusted_app_25) 28 29 # Allow the allocation and use of ptys 30 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm 31 create_pty(untrusted_app_25) 32 33 # b/34115651 - net.dns* properties read 34 # This will go away in a future Android release 35 get_prop(untrusted_app_25, net_dns_prop) 36 37 # b/35917228 - /proc/misc access 38 # This will go away in a future Android release 39 allow untrusted_app_25 proc_misc:file r_file_perms; 40 41 # Access to /proc/tty/drivers, to allow apps to determine if they 42 # are running in an emulated environment. 43 # b/33214085 b/33814662 b/33791054 b/33211769 44 # https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java 45 # This will go away in a future Android release 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms; 47