xref: /aosp_15_r20/system/sepolicy/prebuilts/api/31.0/private/rs.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1*e4a36f41SAndroid Build Coastguard Worker# Any files which would have been created as app_data_file and
2*e4a36f41SAndroid Build Coastguard Worker# privapp_data_file will be created as app_exec_data_file instead.
3*e4a36f41SAndroid Build Coastguard Workerallow rs { app_data_file privapp_data_file }:dir ra_dir_perms;
4*e4a36f41SAndroid Build Coastguard Workerallow rs app_exec_data_file:file create_file_perms;
5*e4a36f41SAndroid Build Coastguard Workertype_transition rs app_data_file:file app_exec_data_file;
6*e4a36f41SAndroid Build Coastguard Workertype_transition rs privapp_data_file:file app_exec_data_file;
7*e4a36f41SAndroid Build Coastguard Worker
8*e4a36f41SAndroid Build Coastguard Worker# Follow /data/user/0 symlink
9*e4a36f41SAndroid Build Coastguard Workerallow rs system_data_file:lnk_file read;
10*e4a36f41SAndroid Build Coastguard Worker
11*e4a36f41SAndroid Build Coastguard Worker# Read files from the app home directory.
12*e4a36f41SAndroid Build Coastguard Workerallow rs { app_data_file privapp_data_file }:file r_file_perms;
13*e4a36f41SAndroid Build Coastguard Workerallow rs { app_data_file privapp_data_file }:dir r_dir_perms;
14*e4a36f41SAndroid Build Coastguard Worker
15*e4a36f41SAndroid Build Coastguard Worker# Cleanup app_exec_data_file files in the app home directory.
16*e4a36f41SAndroid Build Coastguard Workerallow rs { app_data_file privapp_data_file }:dir remove_name;
17*e4a36f41SAndroid Build Coastguard Worker
18*e4a36f41SAndroid Build Coastguard Worker# Use vendor resources
19*e4a36f41SAndroid Build Coastguard Workerallow rs vendor_file:dir r_dir_perms;
20*e4a36f41SAndroid Build Coastguard Workerr_dir_file(rs, vendor_overlay_file)
21*e4a36f41SAndroid Build Coastguard Workerr_dir_file(rs, vendor_app_file)
22*e4a36f41SAndroid Build Coastguard Worker
23*e4a36f41SAndroid Build Coastguard Worker# Read contents of app apks
24*e4a36f41SAndroid Build Coastguard Workerr_dir_file(rs, apk_data_file)
25*e4a36f41SAndroid Build Coastguard Worker
26*e4a36f41SAndroid Build Coastguard Workerallow rs gpu_device:chr_file rw_file_perms;
27*e4a36f41SAndroid Build Coastguard Workerallow rs ion_device:chr_file r_file_perms;
28*e4a36f41SAndroid Build Coastguard Workerallow rs same_process_hal_file:file { r_file_perms execute };
29*e4a36f41SAndroid Build Coastguard Worker
30*e4a36f41SAndroid Build Coastguard Worker# File descriptors passed from app to renderscript
31*e4a36f41SAndroid Build Coastguard Workerallow rs { untrusted_app_all ephemeral_app priv_app }:fd use;
32*e4a36f41SAndroid Build Coastguard Worker
33*e4a36f41SAndroid Build Coastguard Worker# rs can access app data, so ensure it can only be entered via an app domain and cannot have
34*e4a36f41SAndroid Build Coastguard Worker# CAP_DAC_OVERRIDE.
35*e4a36f41SAndroid Build Coastguard Workerneverallow rs rs:capability_class_set *;
36*e4a36f41SAndroid Build Coastguard Workerneverallow { domain -appdomain } rs:process { dyntransition transition };
37*e4a36f41SAndroid Build Coastguard Workerneverallow rs { domain -crash_dump }:process { dyntransition transition };
38*e4a36f41SAndroid Build Coastguard Workerneverallow rs app_data_file:file_class_set ~r_file_perms;
39*e4a36f41SAndroid Build Coastguard Worker# rs should never use network sockets
40*e4a36f41SAndroid Build Coastguard Workerneverallow rs *:network_socket_class_set *;
41