Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 1 | ### |
| 2 | ### Apps that run with the system UID, e.g. com.android.system.ui, |
| 3 | ### com.android.settings. These are not as privileged as the system |
| 4 | ### server. |
| 5 | ### |
| 6 | |
Alan Stokes | 81e4e87 | 2020-02-11 14:43:05 +0000 | [diff] [blame] | 7 | typeattribute system_app coredomain, mlstrustedsubject; |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 8 | |
dcashman | 3e8dbf0 | 2016-12-08 11:23:34 -0800 | [diff] [blame] | 9 | app_domain(system_app) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 10 | net_domain(system_app) |
| 11 | binder_service(system_app) |
| 12 | |
Jeff Vander Stoep | a12aad4 | 2017-07-10 20:39:50 -0700 | [diff] [blame] | 13 | # android.ui and system.ui |
| 14 | allow system_app rootfs:dir getattr; |
| 15 | |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 16 | # Read and write /data/data subdirectory. |
| 17 | allow system_app system_app_data_file:dir create_dir_perms; |
| 18 | allow system_app system_app_data_file:{ file lnk_file } create_file_perms; |
| 19 | |
| 20 | # Read and write to /data/misc/user. |
| 21 | allow system_app misc_user_data_file:dir create_dir_perms; |
| 22 | allow system_app misc_user_data_file:file create_file_perms; |
| 23 | |
Andrew Sapperstein | 544a9b1 | 2019-06-28 15:28:28 +0000 | [diff] [blame] | 24 | # Access to apex files stored on /data (b/136063500) |
| 25 | # Needed so that Settings can access NOTICE files inside apex |
| 26 | # files located in the assets/ directory. |
| 27 | allow system_app apex_data_file:dir search; |
| 28 | allow system_app staging_data_file:file r_file_perms; |
| 29 | |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 30 | # Read wallpaper file. |
| 31 | allow system_app wallpaper_file:file r_file_perms; |
| 32 | |
| 33 | # Read icon file. |
| 34 | allow system_app icon_file:file r_file_perms; |
| 35 | |
| 36 | # Write to properties |
Chris Paulo | ad2f883 | 2022-11-12 21:36:02 +0000 | [diff] [blame] | 37 | set_prop(system_app, adaptive_haptics_prop) |
Florian Mayer | 39f29f7 | 2021-12-21 12:06:31 -0800 | [diff] [blame] | 38 | set_prop(system_app, arm64_memtag_prop) |
Jaekyun Seok | 224921d | 2018-04-09 12:07:32 +0900 | [diff] [blame] | 39 | set_prop(system_app, bluetooth_a2dp_offload_prop) |
Cheney Ni | e55a74b | 2019-03-18 11:07:32 +0800 | [diff] [blame] | 40 | set_prop(system_app, bluetooth_audio_hal_prop) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 41 | set_prop(system_app, bluetooth_prop) |
| 42 | set_prop(system_app, debug_prop) |
| 43 | set_prop(system_app, system_prop) |
Jaekyun Seok | 224921d | 2018-04-09 12:07:32 +0900 | [diff] [blame] | 44 | set_prop(system_app, exported_bluetooth_prop) |
Jaekyun Seok | e497145 | 2017-10-19 16:54:49 +0900 | [diff] [blame] | 45 | set_prop(system_app, exported_system_prop) |
Jaekyun Seok | e497145 | 2017-10-19 16:54:49 +0900 | [diff] [blame] | 46 | set_prop(system_app, exported3_system_prop) |
Super Liu | 078141a | 2021-12-13 09:57:20 +0800 | [diff] [blame] | 47 | set_prop(system_app, gesture_prop) |
Neil Fuller | 8fa264d | 2022-09-28 08:52:46 +0000 | [diff] [blame] | 48 | set_prop(system_app, locale_prop) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 49 | set_prop(system_app, logd_prop) |
| 50 | set_prop(system_app, net_radio_prop) |
Neil Fuller | 8fa264d | 2022-09-28 08:52:46 +0000 | [diff] [blame] | 51 | set_prop(system_app, timezone_prop) |
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 52 | set_prop(system_app, usb_control_prop) |
| 53 | set_prop(system_app, usb_prop) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 54 | set_prop(system_app, log_tag_prop) |
Kyle Zhang | 12c42b5 | 2023-09-28 21:10:17 +0000 | [diff] [blame] | 55 | set_prop(system_app, drm_forcel3_prop) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 56 | userdebug_or_eng(`set_prop(system_app, logpersistd_logging_prop)') |
| 57 | auditallow system_app net_radio_prop:property_service set; |
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 58 | auditallow system_app usb_control_prop:property_service set; |
| 59 | auditallow system_app usb_prop:property_service set; |
Hung-ying Tyan | 565384d | 2019-04-26 16:14:52 +0800 | [diff] [blame] | 60 | # Allow Settings to enable Dynamic System Update |
| 61 | set_prop(system_app, dynamic_system_prop) |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 62 | |
| 63 | # ctl interface |
| 64 | set_prop(system_app, ctl_default_prop) |
| 65 | set_prop(system_app, ctl_bugreport_prop) |
| 66 | |
Howard Chen | 7833aa4 | 2020-03-19 18:58:11 +0800 | [diff] [blame] | 67 | # Allow developer settings to query gsid status |
| 68 | get_prop(system_app, gsid_prop) |
| 69 | |
Pawan Wagh | 60cc0b3 | 2023-08-29 00:09:29 +0000 | [diff] [blame] | 70 | # Allow developer settings to check 16k pages boot option status |
| 71 | get_prop(system_app, enable_16k_pages_prop) |
| 72 | |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 73 | # Create /data/anr/traces.txt. |
| 74 | allow system_app anr_data_file:dir ra_dir_perms; |
| 75 | allow system_app anr_data_file:file create_file_perms; |
| 76 | |
| 77 | # Settings need to access app name and icon from asec |
| 78 | allow system_app asec_apk_file:file r_file_perms; |
| 79 | |
Bookatz | 022ab0e | 2018-02-13 09:33:36 -0800 | [diff] [blame] | 80 | # Allow system apps (like Settings) to interact with statsd |
| 81 | binder_call(system_app, statsd) |
| 82 | |
Joe Onorato | 41f93db | 2016-11-20 23:23:04 -0800 | [diff] [blame] | 83 | # Allow system apps to interact with incidentd |
| 84 | binder_call(system_app, incidentd) |
| 85 | |
Pawan Wagh | c35c8af | 2023-09-20 00:05:07 +0000 | [diff] [blame] | 86 | # Allow system apps (Settings) to call into update_engine |
| 87 | # in order to apply update to switch from 4k kernel to 16K and vice-versa |
| 88 | binder_use(system_app) |
| 89 | allow system_app update_engine_stable_service:service_manager find; |
| 90 | binder_call(system_app, update_engine) |
| 91 | |
Rambo Wang | 8950e7a | 2020-02-12 19:06:04 -0800 | [diff] [blame] | 92 | # Allow system app to interact with Dumpstate HAL |
| 93 | hal_client_domain(system_app, hal_dumpstate) |
| 94 | |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 95 | allow system_app servicemanager:service_manager list; |
| 96 | # TODO: scope this down? Too broad? |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 97 | allow system_app { |
| 98 | service_manager_type |
Martijn Coenen | ac097ac | 2018-08-17 09:35:42 +0200 | [diff] [blame] | 99 | -apex_service |
Luke Huang | 524f25e | 2019-02-25 20:12:15 +0800 | [diff] [blame] | 100 | -dnsresolver_service |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 101 | -dumpstate_service |
| 102 | -installd_service |
Yifan Hong | 18ade86 | 2019-03-14 15:45:03 -0700 | [diff] [blame] | 103 | -lpdump_service |
paulhu | 70b0a77 | 2021-12-09 11:49:23 +0800 | [diff] [blame] | 104 | -mdns_service |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 105 | -netd_service |
Michael Sun | 6445f19 | 2020-11-02 23:54:21 +0000 | [diff] [blame] | 106 | -system_suspend_control_internal_service |
Tri Vo | 131fa73 | 2019-02-07 13:29:39 -0800 | [diff] [blame] | 107 | -system_suspend_control_service |
Carmen Jackson | a60d7f2 | 2021-06-23 16:53:45 -0700 | [diff] [blame] | 108 | -tracingproxy_service |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 109 | -virtual_touchpad_service |
| 110 | -vold_service |
Steven Moreland | a30464c | 2020-01-21 10:18:57 -0800 | [diff] [blame] | 111 | -default_android_service |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 112 | }:service_manager find; |
Jeff Vander Stoep | 2d32d81 | 2017-10-13 13:33:46 -0700 | [diff] [blame] | 113 | # suppress denials for services system_app should not be accessing. |
| 114 | dontaudit system_app { |
Luke Huang | 524f25e | 2019-02-25 20:12:15 +0800 | [diff] [blame] | 115 | dnsresolver_service |
Jeff Vander Stoep | 2d32d81 | 2017-10-13 13:33:46 -0700 | [diff] [blame] | 116 | dumpstate_service |
| 117 | installd_service |
paulhu | 70b0a77 | 2021-12-09 11:49:23 +0800 | [diff] [blame] | 118 | mdns_service |
Jeff Vander Stoep | 2d32d81 | 2017-10-13 13:33:46 -0700 | [diff] [blame] | 119 | netd_service |
| 120 | virtual_touchpad_service |
| 121 | vold_service |
Jeff Vander Stoep | 2d32d81 | 2017-10-13 13:33:46 -0700 | [diff] [blame] | 122 | }:service_manager find; |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 123 | |
Adam Shih | 2543715 | 2020-12-07 16:30:29 +0800 | [diff] [blame] | 124 | # suppress denials caused by debugfs_tracing |
| 125 | dontaudit system_app debugfs_tracing:file rw_file_perms; |
| 126 | |
ThiƩbaud Weksteen | bdc7214 | 2023-11-23 10:40:07 +1100 | [diff] [blame] | 127 | # Ignore access to memory properties for Settings. |
| 128 | dontaudit system_app proc_pagetypeinfo:file r_file_perms; |
ThiƩbaud Weksteen | bcc7cc1 | 2022-05-19 14:38:50 +1000 | [diff] [blame] | 129 | dontaudit system_app sysfs_zram:dir search; |
| 130 | |
Janis Danisevskis | abb93f2 | 2020-07-27 12:53:20 -0700 | [diff] [blame] | 131 | allow system_app keystore:keystore2_key { |
| 132 | delete |
| 133 | get_info |
| 134 | grant |
Janis Danisevskis | abb93f2 | 2020-07-27 12:53:20 -0700 | [diff] [blame] | 135 | rebind |
| 136 | update |
| 137 | use |
| 138 | }; |
| 139 | |
Janis Danisevskis | df31f20 | 2021-02-01 23:04:45 -0800 | [diff] [blame] | 140 | # Allow Settings to manage WI-FI keys. |
| 141 | allow system_app wifi_key:keystore2_key { |
| 142 | delete |
| 143 | get_info |
Janis Danisevskis | df31f20 | 2021-02-01 23:04:45 -0800 | [diff] [blame] | 144 | rebind |
| 145 | update |
| 146 | use |
| 147 | }; |
| 148 | |
Tri Vo | 06d7dca | 2018-01-10 12:51:51 -0800 | [diff] [blame] | 149 | # settings app reads /proc/version |
Jeff Vander Stoep | c975bd9 | 2017-09-27 12:27:03 -0700 | [diff] [blame] | 150 | allow system_app { |
Jeff Vander Stoep | c975bd9 | 2017-09-27 12:27:03 -0700 | [diff] [blame] | 151 | proc_version |
| 152 | }:file r_file_perms; |
Jeff Vander Stoep | c15d54e | 2017-07-25 16:43:49 -0700 | [diff] [blame] | 153 | |
Tri Vo | f55c989 | 2018-10-10 22:48:15 +0000 | [diff] [blame] | 154 | # Settings app writes to /dev/stune/foreground/tasks. |
| 155 | allow system_app cgroup:file w_file_perms; |
Marco Ballesio | aa4ce95 | 2021-02-11 15:18:11 -0800 | [diff] [blame] | 156 | allow system_app cgroup_v2:file w_file_perms; |
Bart Van Assche | be3ff9b | 2022-01-31 21:33:29 +0000 | [diff] [blame] | 157 | allow system_app cgroup_v2:dir w_dir_perms; |
Tri Vo | f55c989 | 2018-10-10 22:48:15 +0000 | [diff] [blame] | 158 | |
Alex Klyubin | b5853c3 | 2017-01-05 17:18:32 -0800 | [diff] [blame] | 159 | control_logd(system_app) |
Mark Salyzyn | d33a9a1 | 2016-11-07 15:11:39 -0800 | [diff] [blame] | 160 | read_runtime_log_tags(system_app) |
Pavel Grafov | 118e496 | 2018-01-18 17:22:28 +0000 | [diff] [blame] | 161 | get_prop(system_app, device_logging_prop) |
Nick Kralevich | 45766d4 | 2017-04-26 11:40:48 -0700 | [diff] [blame] | 162 | |
Nathan Harold | ee26864 | 2017-12-14 18:20:30 -0800 | [diff] [blame] | 163 | # allow system apps to use UDP sockets provided by the system server but not |
| 164 | # modify them other than to connect |
Nathan Harold | 252b015 | 2018-03-27 06:34:54 -0700 | [diff] [blame] | 165 | allow system_app system_server:udp_socket { |
| 166 | connect getattr read recvfrom sendto write getopt setopt }; |
Nathan Harold | ee26864 | 2017-12-14 18:20:30 -0800 | [diff] [blame] | 167 | |
Andy Yu | 43c7ab0 | 2023-12-07 16:59:30 -0800 | [diff] [blame] | 168 | # allow system apps to read game manager related sysrops |
| 169 | get_prop(system_app, game_manager_config_prop) |
| 170 | |
Inseob Kim | c80b024 | 2020-07-16 22:25:47 +0900 | [diff] [blame] | 171 | # Settings app reads ro.oem_unlock_supported |
| 172 | get_prop(system_app, oem_unlock_prop) |
| 173 | |
Avichal Rakesh | a12d310 | 2023-01-23 23:46:42 -0800 | [diff] [blame] | 174 | # Settings app reads ro.usb.uvc.enabled |
| 175 | get_prop(system_app, usb_uvc_enabled_prop) |
| 176 | |
Gabriel Biren | 22dd5d7 | 2024-03-06 00:52:57 +0000 | [diff] [blame] | 177 | # Settings app reads and writes the wifi blob database |
| 178 | allow system_app connectivityblob_data_file:dir rw_dir_perms; |
| 179 | allow system_app connectivityblob_data_file:file create_file_perms; |
| 180 | |
Nick Kralevich | 45766d4 | 2017-04-26 11:40:48 -0700 | [diff] [blame] | 181 | ### |
| 182 | ### Neverallow rules |
| 183 | ### |
| 184 | |
| 185 | # app domains which access /dev/fuse should not run as system_app |
| 186 | neverallow system_app fuse_device:chr_file *; |
Nick Kralevich | 6e893ec | 2019-09-05 09:24:41 -0700 | [diff] [blame] | 187 | |
| 188 | # Apps which run as UID=system should not rely on any attacker controlled |
| 189 | # filesystem locations, such as /data/local/tmp. For /data/local/tmp, we |
| 190 | # allow writes to files passed by file descriptor to support dumpstate and |
| 191 | # bug reports, but not reads. |
| 192 | neverallow system_app shell_data_file:dir { no_w_dir_perms open search read }; |
| 193 | neverallow system_app shell_data_file:file { open read ioctl lock }; |
Chris Paulo | ad2f883 | 2022-11-12 21:36:02 +0000 | [diff] [blame] | 194 | |
| 195 | # system_app should be the only domain writing the adaptive haptics prop |
| 196 | neverallow { domain -init -system_app } adaptive_haptics_prop:property_service set; |
Kyle Zhang | da5a09b | 2024-01-04 01:06:08 +0000 | [diff] [blame] | 197 | # system_app should be the only domain writing the force l3 prop |
| 198 | neverallow { domain -init -system_app } drm_forcel3_prop:property_service set; |