blob: eb1a7c75eada72f3c37a59e588d8a7233f5ff893 [file] [log] [blame]
Alex Klyubinc42d1342017-01-09 14:52:59 -08001###
2### Apps signed with the platform key.
3###
4
Alex Klyubinf5446eb2017-03-23 14:27:32 -07005typeattribute platform_app coredomain;
Alex Klyubinc42d1342017-01-09 14:52:59 -08006
Nick Kralevichb56e6ef2016-12-09 20:14:31 -08007app_domain(platform_app)
Alex Klyubinc42d1342017-01-09 14:52:59 -08008
9# Access the network.
10net_domain(platform_app)
11# Access bluetooth.
12bluetooth_domain(platform_app)
13# Read from /data/local/tmp or /data/data/com.android.shell.
14allow platform_app shell_data_file:dir search;
15allow platform_app shell_data_file:file { open getattr read };
16allow platform_app icon_file:file { open getattr read };
Chad Brubaker4c40d732017-01-25 14:55:56 -080017# Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
Alex Klyubinc42d1342017-01-09 14:52:59 -080018# created by system server.
Chad Brubaker4c40d732017-01-25 14:55:56 -080019allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -080021allow platform_app apk_private_data_file:dir search;
22# ASEC
23allow platform_app asec_apk_file:dir create_dir_perms;
24allow platform_app asec_apk_file:file create_file_perms;
25
26# Access to /data/media.
27allow platform_app media_rw_data_file:dir create_dir_perms;
28allow platform_app media_rw_data_file:file create_file_perms;
29
30# Write to /cache.
31allow platform_app cache_file:dir create_dir_perms;
32allow platform_app cache_file:file create_file_perms;
33
34# Direct access to vold-mounted storage under /mnt/media_rw
35# This is a performance optimization that allows platform apps to bypass the FUSE layer
36allow platform_app mnt_media_rw_file:dir r_dir_perms;
Jeff Sharkey000cafc2018-03-30 12:22:54 -060037allow platform_app sdcard_type:dir create_dir_perms;
38allow platform_app sdcard_type:file create_file_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -080039
Jeff Vander Stoepa12aad42017-07-10 20:39:50 -070040# com.android.systemui
41allow platform_app rootfs:dir getattr;
Beth Thibodeaua279bdb2021-09-14 13:44:49 -040042get_prop(platform_app, radio_cdma_ecm_prop)
Evan Rosky5cfdf2b2022-03-02 22:13:58 +000043userdebug_or_eng(`
44 set_prop(platform_app, persist_wm_debug_prop)
45')
46neverallow { domain -init -dumpstate userdebug_or_eng(`-domain') } persist_wm_debug_prop:property_service set;
Jeff Vander Stoepa12aad42017-07-10 20:39:50 -070047
Alexander Roederer829d9742023-03-23 02:19:22 +000048userdebug_or_eng(`
49 set_prop(platform_app, persist_sysui_builder_extras_prop)
50')
Alexander Roederer584a8622023-05-31 21:25:50 +000051userdebug_or_eng(`
52 set_prop(platform_app, persist_sysui_ranking_update_prop)
53')
Alexander Roederer829d9742023-03-23 02:19:22 +000054
Jeff Vander Stoepc15d54e2017-07-25 16:43:49 -070055# com.android.captiveportallogin reads /proc/vmstat
Tri Vo06d7dca2018-01-10 12:51:51 -080056allow platform_app {
57 proc_vmstat
58}:file r_file_perms;
Jeff Vander Stoepc15d54e2017-07-25 16:43:49 -070059
Jeff Vander Stoep7a4af302018-04-10 12:47:48 -070060# /proc/net access.
61# TODO(b/9496886) Audit access for removal.
62r_dir_file(platform_app, proc_net_type)
63userdebug_or_eng(`
64 auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read };
65')
66
Stefan Andonianff413fd2024-01-24 22:04:52 +000067# Allow sharing traces to betterbug from /data/misc/wmtrace.
68userdebug_or_eng(`
69 allow platform_app trace_data_file:file create_file_perms;
70 allow platform_app trace_data_file:dir rw_dir_perms;
71')
72
Hongwei Wang93720262023-01-20 12:14:31 -080073# Allow writing and removing wmshell protolog in /data/misc/wmtrace.
74userdebug_or_eng(`
75 allow platform_app wm_trace_data_file:dir rw_dir_perms;
Stefan Andonianff413fd2024-01-24 22:04:52 +000076 allow platform_app wm_trace_data_file:file { getattr setattr create unlink rw_file_perms };
77')
78
79
80# To exec the perfetto cmdline client and pass it the trace config on
81# stdint through a pipe. Allow to access traced's privileged consumer socket.
82userdebug_or_eng(`
83 allow platform_app perfetto_exec:file rx_file_perms;
84 unix_socket_connect(platform_app, traced_consumer, traced);
Hongwei Wang93720262023-01-20 12:14:31 -080085')
86
Alex Klyubinc42d1342017-01-09 14:52:59 -080087allow platform_app audioserver_service:service_manager find;
88allow platform_app cameraserver_service:service_manager find;
89allow platform_app drmserver_service:service_manager find;
90allow platform_app mediaserver_service:service_manager find;
Ray Essick39185402017-01-24 12:53:45 -080091allow platform_app mediametrics_service:service_manager find;
Alex Klyubinc42d1342017-01-09 14:52:59 -080092allow platform_app mediaextractor_service:service_manager find;
Alex Klyubinc42d1342017-01-09 14:52:59 -080093allow platform_app mediadrmserver_service:service_manager find;
94allow platform_app persistent_data_block_service:service_manager find;
95allow platform_app radio_service:service_manager find;
Todd Poynorbbc692c2017-07-12 18:12:52 -070096allow platform_app thermal_service:service_manager find;
Alex Klyubinc42d1342017-01-09 14:52:59 -080097allow platform_app app_api_service:service_manager find;
98allow platform_app system_api_service:service_manager find;
99allow platform_app vr_manager_service:service_manager find;
joshmccloskey6f5a7b82019-02-07 14:02:06 -0800100allow platform_app stats_service:service_manager find;
Yiwei Zhang544d6b32019-02-07 15:00:55 -0800101
joshmccloskey6f5a7b82019-02-07 14:02:06 -0800102# Allow platform apps to log via statsd.
Jeffrey Huang215dd2a2019-12-12 10:17:58 -0800103binder_call(platform_app, statsd)
joshmccloskey6f5a7b82019-02-07 14:02:06 -0800104
Chris Wailes3486acb2021-06-07 14:20:47 -0700105# Allow platform applications to find and call artd for testing
106userdebug_or_eng(`
107 allow platform_app artd_service:service_manager find;
108 binder_call(platform_app, artd)
109')
110
Alex Klyubinc42d1342017-01-09 14:52:59 -0800111# Access to /data/preloads
112allow platform_app preloads_data_file:file r_file_perms;
113allow platform_app preloads_data_file:dir r_dir_perms;
Fyodor Kupolovb238fe62017-03-14 11:42:03 -0700114allow platform_app preloads_media_file:file r_file_perms;
115allow platform_app preloads_media_file:dir r_dir_perms;
Alex Klyubinc42d1342017-01-09 14:52:59 -0800116
Mark Salyzynd33a9a12016-11-07 15:11:39 -0800117read_runtime_log_tags(platform_app)
Nick Kralevich45766d42017-04-26 11:40:48 -0700118
Nathan Haroldee268642017-12-14 18:20:30 -0800119# allow platform apps to use UDP sockets provided by the system server but not
120# modify them other than to connect
Nathan Harold252b0152018-03-27 06:34:54 -0700121allow platform_app system_server:udp_socket {
122 connect getattr read recvfrom sendto write getopt setopt };
Nathan Haroldee268642017-12-14 18:20:30 -0800123
Mark Salyzyn3443caf2015-10-24 16:20:18 -0700124# allow platform apps to connect to the property service
125set_prop(platform_app, test_boot_reason_prop)
126
Inseob Kim04f435c2020-07-07 12:46:24 +0900127# allow platform apps to read keyguard.no_require_sim
128get_prop(platform_app, keyguard_config_prop)
129
Weilun Due2a8a142021-02-17 17:54:30 +0000130# allow platform apps to read qemu.hw.mainkeys
131get_prop(platform_app, qemu_hw_prop)
132
Alexei Nicoara957e8f32023-09-11 17:43:45 +0100133# allow platform apps to read sys.boot.reason.last
134get_prop(platform_app, last_boot_reason_prop)
135
felkachang0c402012019-01-30 15:44:24 +0800136# allow platform apps to create symbolic link
137allow platform_app app_data_file:lnk_file create_file_perms;
138
Adam Shih25437152020-12-07 16:30:29 +0800139# suppress denials caused by debugfs_tracing
140dontaudit platform_app debugfs_tracing:file rw_file_perms;
141
Alan Stokesf96cd652021-09-07 12:25:38 +0100142# Allow platform apps to create VMs
143virtualizationservice_use(platform_app)
144
Nick Kralevich45766d42017-04-26 11:40:48 -0700145###
146### Neverallow rules
147###
148
Alexander Roederer829d9742023-03-23 02:19:22 +0000149neverallow { domain -init userdebug_or_eng(`-shell -platform_app') } persist_sysui_builder_extras_prop:property_service set;
150
Nick Kralevich45766d42017-04-26 11:40:48 -0700151# app domains which access /dev/fuse should not run as platform_app
152neverallow platform_app fuse_device:chr_file *;