blob: ed0bbfc7e6182aa311ac4645ed68e783959d672c [file] [log] [blame]
Jeff Vander Stoep1f7ae8e2020-01-20 10:14:48 +01001###
2### Untrusted_29.
3###
4### This file defines the rules for untrusted apps running with
5### targetSdkVersion = 29.
6###
7### See public/untrusted_app.te for more information about which apps are
8### placed in this selinux domain.
9###
10
11typeattribute untrusted_app_29 coredomain;
12
13app_domain(untrusted_app_29)
14untrusted_app_domain(untrusted_app_29)
15net_domain(untrusted_app_29)
16bluetooth_domain(untrusted_app_29)
Bram Bonnéea5460a2021-05-12 14:19:24 +020017
18# allow sending RTM_GETNEIGH{TBL} messages.
19allow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
20auditallow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
Alessandra Lorod0e108f2022-07-14 11:52:21 +000021
Yuyang Huangcfdea5f2023-01-18 16:52:43 +090022# Connect to mdnsd via mdnsd socket.
23unix_socket_connect(untrusted_app_29, mdnsd, mdnsd)
24userdebug_or_eng(`
25 auditallow untrusted_app_29 mdnsd_socket:sock_file write;
26 auditallow untrusted_app_29 mdnsd:unix_stream_socket connectto;
27')
Jeff Vander Stoepf9a774f2023-03-27 12:30:23 +020028
29# Allow calling inotify on APKs for backwards compatibility. This is disallowed
30# for targetSdkVersion>=34 to remove a sidechannel.
31allow untrusted_app_29 apk_data_file:dir { watch watch_reads };
32allow untrusted_app_29 apk_data_file:file { watch watch_reads };
33userdebug_or_eng(`
34 auditallow untrusted_app_29 apk_data_file:dir { watch watch_reads };
35 auditallow untrusted_app_29 apk_data_file:file { watch watch_reads };
36')