1### 2### Apps signed with the platform key. 3### 4 5typeattribute platform_app coredomain; 6 7app_domain(platform_app) 8 9# Access the network. 10net_domain(platform_app) 11# Access bluetooth. 12bluetooth_domain(platform_app) 13# Read from /data/local/tmp or /data/data/com.android.shell. 14allow platform_app shell_data_file:dir search; 15allow platform_app shell_data_file:file { open getattr read }; 16allow platform_app icon_file:file { open getattr read }; 17# Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files 18# created by system server. 19allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms; 20allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms; 21allow platform_app apk_private_data_file:dir search; 22# ASEC 23allow platform_app asec_apk_file:dir create_dir_perms; 24allow platform_app asec_apk_file:file create_file_perms; 25 26# Access to /data/media. 27allow platform_app media_rw_data_file:dir create_dir_perms; 28allow platform_app media_rw_data_file:file create_file_perms; 29 30# Write to /cache. 31allow platform_app cache_file:dir create_dir_perms; 32allow platform_app cache_file:file create_file_perms; 33 34# Direct access to vold-mounted storage under /mnt/media_rw 35# This is a performance optimization that allows platform apps to bypass the FUSE layer 36allow platform_app mnt_media_rw_file:dir r_dir_perms; 37allow platform_app sdcard_type:dir create_dir_perms; 38allow platform_app sdcard_type:file create_file_perms; 39 40# com.android.systemui 41allow platform_app rootfs:dir getattr; 42get_prop(platform_app, radio_cdma_ecm_prop) 43userdebug_or_eng(` 44 set_prop(platform_app, persist_wm_debug_prop) 45') 46neverallow { domain -init -dumpstate userdebug_or_eng(`-domain') } persist_wm_debug_prop:property_service set; 47 48userdebug_or_eng(` 49 set_prop(platform_app, persist_sysui_builder_extras_prop) 50') 51userdebug_or_eng(` 52 set_prop(platform_app, persist_sysui_ranking_update_prop) 53') 54set_prop(platform_app, debug_tracing_desktop_mode_visible_tasks_prop) 55 56# com.android.captiveportallogin reads /proc/vmstat 57allow platform_app { 58 proc_vmstat 59}:file r_file_perms; 60 61# /proc/net access. 62# TODO(b/9496886) Audit access for removal. 63r_dir_file(platform_app, proc_net_type) 64userdebug_or_eng(` 65 auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read }; 66') 67 68# Allow sharing traces to betterbug from /data/misc/wmtrace. 69userdebug_or_eng(` 70 allow platform_app trace_data_file:file create_file_perms; 71 allow platform_app trace_data_file:dir rw_dir_perms; 72') 73 74# Allow writing and removing wmshell protolog in /data/misc/wmtrace. 75userdebug_or_eng(` 76 allow platform_app wm_trace_data_file:dir rw_dir_perms; 77 allow platform_app wm_trace_data_file:file { getattr setattr create unlink rw_file_perms }; 78') 79 80 81# To exec the perfetto cmdline client and pass it the trace config on 82# stdint through a pipe. Allow to access traced's privileged consumer socket. 83userdebug_or_eng(` 84 allow platform_app perfetto_exec:file rx_file_perms; 85 unix_socket_connect(platform_app, traced_consumer, traced); 86') 87 88allow platform_app audioserver_service:service_manager find; 89allow platform_app cameraserver_service:service_manager find; 90allow platform_app drmserver_service:service_manager find; 91allow platform_app mediaserver_service:service_manager find; 92allow platform_app mediametrics_service:service_manager find; 93allow platform_app mediaextractor_service:service_manager find; 94allow platform_app mediadrmserver_service:service_manager find; 95allow platform_app persistent_data_block_service:service_manager find; 96allow platform_app radio_service:service_manager find; 97allow platform_app thermal_service:service_manager find; 98allow platform_app app_api_service:service_manager find; 99allow platform_app system_api_service:service_manager find; 100allow platform_app vr_manager_service:service_manager find; 101allow platform_app stats_service:service_manager find; 102allow platform_app tradeinmode_service:service_manager find; 103 104# Allow platform apps to log via statsd. 105binder_call(platform_app, statsd) 106 107# Allow platform applications to find and call artd for testing 108userdebug_or_eng(` 109 allow platform_app artd_service:service_manager find; 110 binder_call(platform_app, artd) 111') 112 113# Access to /data/preloads 114allow platform_app preloads_data_file:file r_file_perms; 115allow platform_app preloads_data_file:dir r_dir_perms; 116allow platform_app preloads_media_file:file r_file_perms; 117allow platform_app preloads_media_file:dir r_dir_perms; 118 119read_runtime_log_tags(platform_app) 120 121# allow platform apps to use UDP sockets provided by the system server but not 122# modify them other than to connect 123allow platform_app system_server:udp_socket { 124 connect getattr read recvfrom sendto write getopt setopt }; 125 126# allow platform apps to connect to the property service 127set_prop(platform_app, test_boot_reason_prop) 128 129# allow platform apps to read keyguard.no_require_sim 130get_prop(platform_app, keyguard_config_prop) 131 132# allow platform apps to read qemu.hw.mainkeys 133get_prop(platform_app, qemu_hw_prop) 134 135# allow platform apps to read sys.boot.reason.last 136get_prop(platform_app, last_boot_reason_prop) 137 138# allow platform apps to create symbolic link 139allow platform_app app_data_file:lnk_file create_file_perms; 140 141# suppress denials caused by debugfs_tracing 142dontaudit platform_app debugfs_tracing:file rw_file_perms; 143 144# Allow platform apps to create VMs 145virtualizationservice_use(platform_app) 146 147### 148### Neverallow rules 149### 150 151neverallow { domain -init userdebug_or_eng(`-shell -platform_app') } persist_sysui_builder_extras_prop:property_service set; 152 153# app domains which access /dev/fuse should not run as platform_app 154neverallow platform_app fuse_device:chr_file *; 155