blob: f5231fbb3f975b8e8bff79956590e7157d99e4d7 [file] [log] [blame]
Jeff Vander Stoepd22987b2015-11-03 09:54:39 -08001# rules removed from the domain attribute
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -08002
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -08003# Search /storage/emulated tmpfs mount.
Jeff Sharkeydd57e692017-05-03 10:52:59 -06004allow { domain_deprecated -installd } tmpfs:dir r_dir_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -08005userdebug_or_eng(`
Nick Kralevichb59c2012017-02-10 12:06:46 -08006auditallow {
7 domain_deprecated
8 -appdomain
Jeff Sharkeydd57e692017-05-03 10:52:59 -06009 -installd
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -070010 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -080011 -sdcardd
12 -surfaceflinger
13 -system_server
14 -vold
15 -zygote
16} tmpfs:dir r_dir_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -080017')
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080018
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080019# Root fs.
20allow domain_deprecated rootfs:dir r_dir_perms;
21allow domain_deprecated rootfs:file r_file_perms;
22allow domain_deprecated rootfs:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -080023userdebug_or_eng(`
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -080024auditallow {
25 domain_deprecated
26 -fsck
27 -healthd
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -080028 -installd
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -070029 -recovery
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -080030 -servicemanager
31 -system_server
32 -ueventd
33 -uncrypt
34 -vold
35 -zygote
36} rootfs:dir { open getattr read ioctl lock }; # search granted in domain
Nick Kralevichb59c2012017-02-10 12:06:46 -080037auditallow {
38 domain_deprecated
39 -healthd
40 -installd
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -070041 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -080042 -servicemanager
43 -system_server
44 -ueventd
45 -uncrypt
46 -vold
47 -zygote
48} rootfs:file r_file_perms;
49auditallow {
50 domain_deprecated
51 -appdomain
52 -healthd
53 -installd
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -070054 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -080055 -servicemanager
56 -system_server
57 -ueventd
58 -uncrypt
59 -vold
60 -zygote
61} rootfs:lnk_file { getattr open ioctl lock }; # read granted in domain
Nick Kralevich596dd092017-02-10 12:58:41 -080062')
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080063
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080064# System file accesses.
65allow domain_deprecated system_file:dir r_dir_perms;
66allow domain_deprecated system_file:file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -080067userdebug_or_eng(`
Nick Kralevich68f23362016-11-07 16:14:28 -080068auditallow {
69 domain_deprecated
70 -appdomain
Nick Kralevich49e35882016-11-25 18:00:38 -080071 -fingerprintd
Nick Kralevich68f23362016-11-07 16:14:28 -080072 -installd
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -080073 -keystore
Nick Kralevich68f23362016-11-07 16:14:28 -080074 -rild
75 -surfaceflinger
76 -system_server
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -080077 -update_engine
78 -vold
Nick Kralevich68f23362016-11-07 16:14:28 -080079 -zygote
80} system_file:dir { open read ioctl lock }; # search getattr in domain
81auditallow {
82 domain_deprecated
83 -appdomain
Nick Kralevich68f23362016-11-07 16:14:28 -080084 -rild
85 -surfaceflinger
86 -system_server
87 -zygote
88} system_file:file { ioctl lock }; # read open getattr in domain
Nick Kralevich596dd092017-02-10 12:58:41 -080089')
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080090
91# Read files already opened under /data.
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080092allow domain_deprecated system_data_file:file { getattr read };
93allow domain_deprecated system_data_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -080094userdebug_or_eng(`
Nick Kralevichb59c2012017-02-10 12:06:46 -080095auditallow {
96 domain_deprecated
97 -appdomain
98 -sdcardd
99 -system_server
100 -tee
101} system_data_file:file { getattr read };
102auditallow {
103 domain_deprecated
104 -appdomain
105 -system_server
106 -tee
107} system_data_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800108')
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -0800109
110# Read apk files under /data/app.
111allow domain_deprecated apk_data_file:dir { getattr search };
112allow domain_deprecated apk_data_file:file r_file_perms;
113allow domain_deprecated apk_data_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800114userdebug_or_eng(`
Nick Kralevichb59c2012017-02-10 12:06:46 -0800115auditallow {
116 domain_deprecated
117 -appdomain
118 -dex2oat
119 -installd
120 -system_server
121} apk_data_file:dir { getattr search };
122auditallow {
123 domain_deprecated
124 -appdomain
125 -dex2oat
126 -installd
127 -system_server
128} apk_data_file:file r_file_perms;
129auditallow {
130 domain_deprecated
131 -appdomain
132 -dex2oat
133 -installd
134 -system_server
135} apk_data_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800136')
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -0800137
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -0800138# Read already opened /cache files.
Nick Kralevichd5464732016-01-16 08:15:52 -0800139allow domain_deprecated cache_file:dir r_dir_perms;
140allow domain_deprecated cache_file:file { getattr read };
Nick Kralevichdc37ea72016-01-07 12:56:54 -0800141allow domain_deprecated cache_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800142userdebug_or_eng(`
Nick Kralevichb59c2012017-02-10 12:06:46 -0800143auditallow {
144 domain_deprecated
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700145 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800146 -system_server
147 -vold
148} cache_file:dir { open read search ioctl lock };
149auditallow {
150 domain_deprecated
151 -appdomain
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700152 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800153 -system_server
154 -vold
155} cache_file:dir getattr;
156auditallow {
157 domain_deprecated
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700158 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800159 -system_server
160 -vold
161} cache_file:file { getattr read };
162auditallow {
163 domain_deprecated
164 -system_server
165 -vold
166} cache_file:lnk_file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800167')
Felipe Leme549ccf72015-12-22 12:37:17 -0800168
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -0800169# Read access to pseudo filesystems.
170r_dir_file(domain_deprecated, proc)
Jeff Vander Stoepa2c40552016-09-13 11:03:36 -0700171r_dir_file(domain_deprecated, sysfs)
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -0800172r_dir_file(domain_deprecated, cgroup)
Nick Kralevich7a35c132016-03-31 14:11:50 -0700173allow domain_deprecated proc_meminfo:file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800174
175userdebug_or_eng(`
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -0800176auditallow {
177 domain_deprecated
178 -fsck
179 -fsck_untrusted
Jeff Vander Stoepa1b45602017-02-10 09:39:37 -0800180 -rild
181 -sdcardd
182 -system_server
183 -update_engine
184 -vold
185} proc:file r_file_perms;
Nick Kralevichb59c2012017-02-10 12:06:46 -0800186auditallow {
187 domain_deprecated
188 -fsck
189 -fsck_untrusted
190 -rild
191 -system_server
192 -vold
193} proc:lnk_file { open ioctl lock }; # getattr read granted in domain
194auditallow {
195 domain_deprecated
Nick Kralevichb59c2012017-02-10 12:06:46 -0800196 -fingerprintd
197 -healthd
198 -netd
199 -rild
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700200 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800201 -system_app
202 -surfaceflinger
203 -system_server
204 -tee
205 -ueventd
206 -vold
Nick Kralevichb59c2012017-02-10 12:06:46 -0800207} sysfs:dir { open getattr read ioctl lock }; # search granted in domain
208auditallow {
209 domain_deprecated
Nick Kralevichb59c2012017-02-10 12:06:46 -0800210 -fingerprintd
211 -healthd
212 -netd
213 -rild
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700214 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800215 -system_app
216 -surfaceflinger
217 -system_server
218 -tee
219 -ueventd
220 -vold
Nick Kralevichb59c2012017-02-10 12:06:46 -0800221} sysfs:file r_file_perms;
222auditallow {
223 domain_deprecated
Nick Kralevichb59c2012017-02-10 12:06:46 -0800224 -fingerprintd
225 -healthd
226 -netd
227 -rild
Jeff Vander Stoep9bbe4202017-06-14 10:11:12 -0700228 -recovery
Nick Kralevichb59c2012017-02-10 12:06:46 -0800229 -system_app
230 -surfaceflinger
231 -system_server
232 -tee
233 -ueventd
234 -vold
Nick Kralevichb59c2012017-02-10 12:06:46 -0800235} sysfs:lnk_file { getattr open ioctl lock }; # read granted in domain
Nick Kralevich2c8ea362016-10-29 08:07:12 -0700236auditallow {
237 domain_deprecated
238 -appdomain
239 -dumpstate
240 -fingerprintd
241 -healthd
Nick Kralevich2c8ea362016-10-29 08:07:12 -0700242 -inputflinger
243 -installd
244 -keystore
245 -netd
246 -rild
247 -surfaceflinger
248 -system_server
249 -zygote
250} cgroup:dir r_dir_perms;
251auditallow {
252 domain_deprecated
253 -appdomain
254 -dumpstate
255 -fingerprintd
256 -healthd
Nick Kralevich2c8ea362016-10-29 08:07:12 -0700257 -inputflinger
258 -installd
259 -keystore
260 -netd
261 -rild
262 -surfaceflinger
263 -system_server
264 -zygote
265} cgroup:{ file lnk_file } r_file_perms;
Nick Kralevichb59c2012017-02-10 12:06:46 -0800266auditallow {
267 domain_deprecated
268 -appdomain
269 -surfaceflinger
270 -system_server
271 -vold
272} proc_meminfo:file r_file_perms;
Nick Kralevich596dd092017-02-10 12:58:41 -0800273')