Skip to content
Snippets Groups Projects
Select Git revision
  • ac4b6478c13a11d24555f0f1d10cd8c098b7586d
  • test default
2 results

platform_app.te

Blame
  • user avatar
    Jeff Vander Stoep authored and Jeffrey Vander Stoep committed
    DropboxManager may pass FDs to any app with the READ_LOGS
    permission which is available to all apps as a development
    permission.
    
    Test: atest CtsIncidentHostTestCases
    Fixes: 111856304
    Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
    6026a4ad
    History
    platform_app.te 3.43 KiB
    ###
    ### Apps signed with the platform key.
    ###
    
    typeattribute platform_app coredomain;
    
    app_domain(platform_app)
    
    # Access the network.
    net_domain(platform_app)
    # Access bluetooth.
    bluetooth_domain(platform_app)
    # Read from /data/local/tmp or /data/data/com.android.shell.
    allow platform_app shell_data_file:dir search;
    allow platform_app shell_data_file:file { open getattr read };
    allow platform_app icon_file:file { open getattr read };
    # Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
    # created by system server.
    allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
    allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
    allow platform_app apk_private_data_file:dir search;
    # ASEC
    allow platform_app asec_apk_file:dir create_dir_perms;
    allow platform_app asec_apk_file:file create_file_perms;
    
    # Access to /data/media.
    allow platform_app media_rw_data_file:dir create_dir_perms;
    allow platform_app media_rw_data_file:file create_file_perms;
    
    # Write to /cache.
    allow platform_app cache_file:dir create_dir_perms;
    allow platform_app cache_file:file create_file_perms;
    
    # Direct access to vold-mounted storage under /mnt/media_rw
    # This is a performance optimization that allows platform apps to bypass the FUSE layer
    allow platform_app mnt_media_rw_file:dir r_dir_perms;
    allow platform_app sdcard_type:dir create_dir_perms;
    allow platform_app sdcard_type:file create_file_perms;
    
    # com.android.systemui
    allow platform_app rootfs:dir getattr;
    
    # com.android.captiveportallogin reads /proc/vmstat
    allow platform_app {
      proc_vmstat
    }:file r_file_perms;
    
    # /proc/net access.
    # TODO(b/9496886) Audit access for removal.
    r_dir_file(platform_app, proc_net_type)
    userdebug_or_eng(`
      auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read };
    ')
    
    allow platform_app audioserver_service:service_manager find;
    allow platform_app cameraserver_service:service_manager find;
    allow platform_app drmserver_service:service_manager find;
    allow platform_app mediaserver_service:service_manager find;
    allow platform_app mediametrics_service:service_manager find;
    allow platform_app mediaextractor_service:service_manager find;
    allow platform_app mediacodec_service:service_manager find;
    allow platform_app mediadrmserver_service:service_manager find;
    allow platform_app persistent_data_block_service:service_manager find;
    allow platform_app radio_service:service_manager find;
    allow platform_app thermal_service:service_manager find;
    allow platform_app timezone_service:service_manager find;
    allow platform_app app_api_service:service_manager find;
    allow platform_app system_api_service:service_manager find;
    allow platform_app vr_manager_service:service_manager find;
    
    # Access to /data/preloads
    allow platform_app preloads_data_file:file r_file_perms;
    allow platform_app preloads_data_file:dir r_dir_perms;
    allow platform_app preloads_media_file:file r_file_perms;
    allow platform_app preloads_media_file:dir r_dir_perms;
    
    read_runtime_log_tags(platform_app)
    
    # allow platform apps to use UDP sockets provided by the system server but not
    # modify them other than to connect
    allow platform_app system_server:udp_socket {
            connect getattr read recvfrom sendto write getopt setopt };
    
    # allow platform apps to connect to the property service
    set_prop(platform_app, test_boot_reason_prop)
    
    ###
    ### Neverallow rules
    ###
    
    # app domains which access /dev/fuse should not run as platform_app
    neverallow platform_app fuse_device:chr_file *;