blob: eec503a743beee583218ee9a39c3cb97a0628222 [file] [log] [blame]
Alex Klyubinc42d1342017-01-09 14:52:59 -08001###
2### Apps signed with the platform key.
3###
4
Alex Klyubinf5446eb2017-03-23 14:27:32 -07005typeattribute platform_app coredomain;
Alex Klyubinc42d1342017-01-09 14:52:59 -08006
Nick Kralevichb56e6ef2016-12-09 20:14:31 -08007app_domain(platform_app)
Alex Klyubinc42d1342017-01-09 14:52:59 -08008
9# Access the network.
10net_domain(platform_app)
11# Access bluetooth.
12bluetooth_domain(platform_app)
13# Read from /data/local/tmp or /data/data/com.android.shell.
14allow platform_app shell_data_file:dir search;
15allow platform_app shell_data_file:file { open getattr read };
16allow platform_app icon_file:file { open getattr read };
Chad Brubaker4c40d732017-01-25 14:55:56 -080017# Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
Alex Klyubinc42d1342017-01-09 14:52:59 -080018# created by system server.
Chad Brubaker4c40d732017-01-25 14:55:56 -080019allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -080021allow platform_app apk_private_data_file:dir search;
22# ASEC
23allow platform_app asec_apk_file:dir create_dir_perms;
24allow platform_app asec_apk_file:file create_file_perms;
25
26# Access to /data/media.
27allow platform_app media_rw_data_file:dir create_dir_perms;
28allow platform_app media_rw_data_file:file create_file_perms;
29
Jeff Vander Stoep4d3ee1a2018-04-16 07:49:49 -070030# Read access to FDs from the DropboxManagerService.
31allow platform_app dropbox_data_file:file { getattr read };
32
Alex Klyubinc42d1342017-01-09 14:52:59 -080033# Write to /cache.
34allow platform_app cache_file:dir create_dir_perms;
35allow platform_app cache_file:file create_file_perms;
36
37# Direct access to vold-mounted storage under /mnt/media_rw
38# This is a performance optimization that allows platform apps to bypass the FUSE layer
39allow platform_app mnt_media_rw_file:dir r_dir_perms;
Jeff Sharkey000cafc2018-03-30 12:22:54 -060040allow platform_app sdcard_type:dir create_dir_perms;
41allow platform_app sdcard_type:file create_file_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -080042
Jeff Vander Stoepa12aad42017-07-10 20:39:50 -070043# com.android.systemui
44allow platform_app rootfs:dir getattr;
45
Jeff Vander Stoepc15d54e2017-07-25 16:43:49 -070046# com.android.captiveportallogin reads /proc/vmstat
Tri Vo06d7dca2018-01-10 12:51:51 -080047allow platform_app {
48 proc_vmstat
49}:file r_file_perms;
Jeff Vander Stoepc15d54e2017-07-25 16:43:49 -070050
Jeff Vander Stoep7a4af302018-04-10 12:47:48 -070051# /proc/net access.
52# TODO(b/9496886) Audit access for removal.
53r_dir_file(platform_app, proc_net_type)
54userdebug_or_eng(`
55 auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read };
56')
57
Alex Klyubinc42d1342017-01-09 14:52:59 -080058allow platform_app audioserver_service:service_manager find;
59allow platform_app cameraserver_service:service_manager find;
60allow platform_app drmserver_service:service_manager find;
61allow platform_app mediaserver_service:service_manager find;
Ray Essick39185402017-01-24 12:53:45 -080062allow platform_app mediametrics_service:service_manager find;
Alex Klyubinc42d1342017-01-09 14:52:59 -080063allow platform_app mediaextractor_service:service_manager find;
64allow platform_app mediacodec_service:service_manager find;
65allow platform_app mediadrmserver_service:service_manager find;
66allow platform_app persistent_data_block_service:service_manager find;
67allow platform_app radio_service:service_manager find;
Todd Poynorbbc692c2017-07-12 18:12:52 -070068allow platform_app thermal_service:service_manager find;
Neil Fullerca595e12017-01-11 16:27:02 +000069allow platform_app timezone_service:service_manager find;
Alex Klyubinc42d1342017-01-09 14:52:59 -080070allow platform_app app_api_service:service_manager find;
71allow platform_app system_api_service:service_manager find;
72allow platform_app vr_manager_service:service_manager find;
73
74# Access to /data/preloads
75allow platform_app preloads_data_file:file r_file_perms;
76allow platform_app preloads_data_file:dir r_dir_perms;
Fyodor Kupolovb238fe62017-03-14 11:42:03 -070077allow platform_app preloads_media_file:file r_file_perms;
78allow platform_app preloads_media_file:dir r_dir_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -080079
Mark Salyzynd33a9a12016-11-07 15:11:39 -080080read_runtime_log_tags(platform_app)
Nick Kralevich45766d42017-04-26 11:40:48 -070081
Nathan Haroldee268642017-12-14 18:20:30 -080082# allow platform apps to use UDP sockets provided by the system server but not
83# modify them other than to connect
Nathan Harold252b0152018-03-27 06:34:54 -070084allow platform_app system_server:udp_socket {
85 connect getattr read recvfrom sendto write getopt setopt };
Nathan Haroldee268642017-12-14 18:20:30 -080086
Mark Salyzyn3443caf2015-10-24 16:20:18 -070087# allow platform apps to connect to the property service
88set_prop(platform_app, test_boot_reason_prop)
89
Nick Kralevich45766d42017-04-26 11:40:48 -070090###
91### Neverallow rules
92###
93
94# app domains which access /dev/fuse should not run as platform_app
95neverallow platform_app fuse_device:chr_file *;