Skip to content
Snippets Groups Projects
Select Git revision
  • 91d398d802b4fbd33c2b88da9f56ecee8bdc363c
  • test default
2 results

platform_app.te

Blame
  • user avatar
    Dan Cashman authored
    Bug: 37916906
    Test: Builds 'n' boots.
    Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668
    Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
    91d398d8
    History
    platform_app.te 2.88 KiB
    ###
    ### Apps signed with the platform key.
    ###
    
    typeattribute platform_app coredomain;
    
    app_domain(platform_app)
    
    # Access the network.
    net_domain(platform_app)
    # Access bluetooth.
    bluetooth_domain(platform_app)
    # Read from /data/local/tmp or /data/data/com.android.shell.
    allow platform_app shell_data_file:dir search;
    allow platform_app shell_data_file:file { open getattr read };
    allow platform_app icon_file:file { open getattr read };
    # Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
    # created by system server.
    allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
    allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
    allow platform_app apk_private_data_file:dir search;
    # ASEC
    allow platform_app asec_apk_file:dir create_dir_perms;
    allow platform_app asec_apk_file:file create_file_perms;
    
    # Access to /data/media.
    allow platform_app media_rw_data_file:dir create_dir_perms;
    allow platform_app media_rw_data_file:file create_file_perms;
    
    # Write to /cache.
    allow platform_app cache_file:dir create_dir_perms;
    allow platform_app cache_file:file create_file_perms;
    
    # Direct access to vold-mounted storage under /mnt/media_rw
    # This is a performance optimization that allows platform apps to bypass the FUSE layer
    allow platform_app mnt_media_rw_file:dir r_dir_perms;
    allow platform_app vfat:dir create_dir_perms;
    allow platform_app vfat:file create_file_perms;
    
    # com.android.systemui
    allow platform_app rootfs:dir getattr;
    
    # com.android.captiveportallogin reads /proc/vmstat
    allow platform_app proc:file r_file_perms;
    
    allow platform_app audioserver_service:service_manager find;
    allow platform_app cameraserver_service:service_manager find;
    allow platform_app drmserver_service:service_manager find;
    allow platform_app mediaserver_service:service_manager find;
    allow platform_app mediametrics_service:service_manager find;
    allow platform_app mediaextractor_service:service_manager find;
    allow platform_app mediacodec_service:service_manager find;
    allow platform_app mediadrmserver_service:service_manager find;
    allow platform_app persistent_data_block_service:service_manager find;
    allow platform_app radio_service:service_manager find;
    allow platform_app surfaceflinger_service:service_manager find;
    allow platform_app timezone_service:service_manager find;
    allow platform_app app_api_service:service_manager find;
    allow platform_app system_api_service:service_manager find;
    allow platform_app vr_manager_service:service_manager find;
    
    # Access to /data/preloads
    allow platform_app preloads_data_file:file r_file_perms;
    allow platform_app preloads_data_file:dir r_dir_perms;
    allow platform_app preloads_media_file:file r_file_perms;
    allow platform_app preloads_media_file:dir r_dir_perms;
    
    read_runtime_log_tags(platform_app)
    
    ###
    ### Neverallow rules
    ###
    
    # app domains which access /dev/fuse should not run as platform_app
    neverallow platform_app fuse_device:chr_file *;