xref: /aosp_15_r20/system/sepolicy/prebuilts/api/202404/private/platform_app.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1###
2### Apps signed with the platform key.
3###
4
5typeattribute platform_app coredomain;
6
7app_domain(platform_app)
8
9# Access the network.
10net_domain(platform_app)
11# Access bluetooth.
12bluetooth_domain(platform_app)
13# Read from /data/local/tmp or /data/data/com.android.shell.
14allow platform_app shell_data_file:dir search;
15allow platform_app shell_data_file:file { open getattr read };
16allow platform_app icon_file:file { open getattr read };
17# Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
18# created by system server.
19allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
21allow platform_app apk_private_data_file:dir search;
22# ASEC
23allow platform_app asec_apk_file:dir create_dir_perms;
24allow platform_app asec_apk_file:file create_file_perms;
25
26# Access to /data/media.
27allow platform_app media_rw_data_file:dir create_dir_perms;
28allow platform_app media_rw_data_file:file create_file_perms;
29
30# Write to /cache.
31allow platform_app cache_file:dir create_dir_perms;
32allow platform_app cache_file:file create_file_perms;
33
34# Direct access to vold-mounted storage under /mnt/media_rw
35# This is a performance optimization that allows platform apps to bypass the FUSE layer
36allow platform_app mnt_media_rw_file:dir r_dir_perms;
37allow platform_app sdcard_type:dir create_dir_perms;
38allow platform_app sdcard_type:file create_file_perms;
39
40# com.android.systemui
41allow platform_app rootfs:dir getattr;
42get_prop(platform_app, radio_cdma_ecm_prop)
43userdebug_or_eng(`
44  set_prop(platform_app, persist_wm_debug_prop)
45')
46neverallow { domain -init -dumpstate userdebug_or_eng(`-domain') } persist_wm_debug_prop:property_service set;
47
48userdebug_or_eng(`
49  set_prop(platform_app, persist_sysui_builder_extras_prop)
50')
51userdebug_or_eng(`
52  set_prop(platform_app, persist_sysui_ranking_update_prop)
53')
54
55# com.android.captiveportallogin reads /proc/vmstat
56allow platform_app {
57  proc_vmstat
58}:file r_file_perms;
59
60# /proc/net access.
61# TODO(b/9496886) Audit access for removal.
62r_dir_file(platform_app, proc_net_type)
63userdebug_or_eng(`
64  auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read };
65')
66
67# Allow writing and removing wmshell protolog in /data/misc/wmtrace.
68userdebug_or_eng(`
69  allow platform_app wm_trace_data_file:dir rw_dir_perms;
70  allow platform_app wm_trace_data_file:file { getattr setattr create unlink w_file_perms };
71')
72
73allow platform_app audioserver_service:service_manager find;
74allow platform_app cameraserver_service:service_manager find;
75allow platform_app drmserver_service:service_manager find;
76allow platform_app mediaserver_service:service_manager find;
77allow platform_app mediametrics_service:service_manager find;
78allow platform_app mediaextractor_service:service_manager find;
79allow platform_app mediadrmserver_service:service_manager find;
80allow platform_app persistent_data_block_service:service_manager find;
81allow platform_app radio_service:service_manager find;
82allow platform_app thermal_service:service_manager find;
83allow platform_app app_api_service:service_manager find;
84allow platform_app system_api_service:service_manager find;
85allow platform_app vr_manager_service:service_manager find;
86allow platform_app stats_service:service_manager find;
87
88# Allow platform apps to log via statsd.
89binder_call(platform_app, statsd)
90
91# Allow platform applications to find and call artd for testing
92userdebug_or_eng(`
93  allow platform_app artd_service:service_manager find;
94  binder_call(platform_app, artd)
95')
96
97# Access to /data/preloads
98allow platform_app preloads_data_file:file r_file_perms;
99allow platform_app preloads_data_file:dir r_dir_perms;
100allow platform_app preloads_media_file:file r_file_perms;
101allow platform_app preloads_media_file:dir r_dir_perms;
102
103read_runtime_log_tags(platform_app)
104
105# allow platform apps to use UDP sockets provided by the system server but not
106# modify them other than to connect
107allow platform_app system_server:udp_socket {
108        connect getattr read recvfrom sendto write getopt setopt };
109
110# allow platform apps to connect to the property service
111set_prop(platform_app, test_boot_reason_prop)
112
113# allow platform apps to read keyguard.no_require_sim
114get_prop(platform_app, keyguard_config_prop)
115
116# allow platform apps to read qemu.hw.mainkeys
117get_prop(platform_app, qemu_hw_prop)
118
119# allow platform apps to read sys.boot.reason.last
120get_prop(platform_app, last_boot_reason_prop)
121
122# allow platform apps to create symbolic link
123allow platform_app app_data_file:lnk_file create_file_perms;
124
125# suppress denials caused by debugfs_tracing
126dontaudit platform_app debugfs_tracing:file rw_file_perms;
127
128# Allow platform apps to create VMs
129virtualizationservice_use(platform_app)
130
131###
132### Neverallow rules
133###
134
135neverallow { domain -init userdebug_or_eng(`-shell -platform_app') } persist_sysui_builder_extras_prop:property_service set;
136
137# app domains which access /dev/fuse should not run as platform_app
138neverallow platform_app fuse_device:chr_file *;
139