blob: 22bac861867adfcd9a1a37923479c5d1c28c1077 [file] [log] [blame]
Jeff Vander Stoepd22987b2015-11-03 09:54:39 -08001# rules removed from the domain attribute
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -08002
3# Read access to properties mapping.
4allow domain_deprecated kernel:fd use;
5allow domain_deprecated tmpfs:file { read getattr };
6allow domain_deprecated tmpfs:lnk_file { read getattr };
7
8# Search /storage/emulated tmpfs mount.
9allow domain_deprecated tmpfs:dir r_dir_perms;
10
11# Inherit or receive open files from others.
12allow domain_deprecated system_server:fd use;
13
14# Connect to adbd and use a socket transferred from it.
15# This is used for e.g. adb backup/restore.
16allow domain_deprecated adbd:unix_stream_socket connectto;
17allow domain_deprecated adbd:fd use;
18allow domain_deprecated adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
19
20# Root fs.
21allow domain_deprecated rootfs:dir r_dir_perms;
22allow domain_deprecated rootfs:file r_file_perms;
23allow domain_deprecated rootfs:lnk_file r_file_perms;
24
25# Device accesses.
26allow domain_deprecated device:file read;
27
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080028# System file accesses.
29allow domain_deprecated system_file:dir r_dir_perms;
30allow domain_deprecated system_file:file r_file_perms;
31allow domain_deprecated system_file:lnk_file r_file_perms;
32
33# Read files already opened under /data.
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080034allow domain_deprecated system_data_file:file { getattr read };
35allow domain_deprecated system_data_file:lnk_file r_file_perms;
36
37# Read apk files under /data/app.
38allow domain_deprecated apk_data_file:dir { getattr search };
39allow domain_deprecated apk_data_file:file r_file_perms;
40allow domain_deprecated apk_data_file:lnk_file r_file_perms;
41
42# Read /data/dalvik-cache.
43allow domain_deprecated dalvikcache_data_file:dir { search getattr };
44allow domain_deprecated dalvikcache_data_file:file r_file_perms;
45
46# Read already opened /cache files.
Nick Kralevichd5464732016-01-16 08:15:52 -080047allow domain_deprecated cache_file:dir r_dir_perms;
48allow domain_deprecated cache_file:file { getattr read };
Nick Kralevichdc37ea72016-01-07 12:56:54 -080049allow domain_deprecated cache_file:lnk_file r_file_perms;
Felipe Leme549ccf72015-12-22 12:37:17 -080050
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080051#Allow access to ion memory allocation device
52allow domain_deprecated ion_device:chr_file rw_file_perms;
53
54# Read access to pseudo filesystems.
55r_dir_file(domain_deprecated, proc)
dcashmanb84c86b2016-05-12 15:49:02 -070056r_dir_file({ domain_deprecated -isolated_app }, sysfs)
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080057r_dir_file(domain_deprecated, inotify)
58r_dir_file(domain_deprecated, cgroup)
Nick Kralevich7a35c132016-03-31 14:11:50 -070059allow domain_deprecated proc_meminfo:file r_file_perms;
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080060r_dir_file(domain_deprecated, proc_net)
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080061
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080062# Get SELinux enforcing status.
63allow domain_deprecated selinuxfs:dir r_dir_perms;
64allow domain_deprecated selinuxfs:file r_file_perms;
65
Jeff Vander Stoep6e3506e2015-11-05 15:24:22 -080066# World readable asec image contents
67allow domain_deprecated asec_public_file:file r_file_perms;
68allow domain_deprecated { asec_public_file asec_apk_file }:dir r_dir_perms;