Skip to content
Snippets Groups Projects
Select Git revision
  • fc9e8e251df482dfe0576a4fc5f04bfca95f1c26
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

platform_app.te

Blame
  • user avatar
    Felipe Leme authored
    This permission was created mostly for dumpstate (so it can include
    recovery files on bugreports when an OTA fails), but it was applied to
    uncrypt and recovery as well (since it had a wider access before).
    
    Grant access to cache_recovery_file where we previously granted access
    to cache_file. Add auditallow rules to determine if this is really
    needed.
    
    BUG: 25351711
    Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
    549ccf77
    History
    platform_app.te 1.96 KiB
    ###
    ### Apps signed with the platform key.
    ###
    
    type platform_app, domain, domain_deprecated;
    app_domain(platform_app)
    # Access the network.
    net_domain(platform_app)
    # Access bluetooth.
    bluetooth_domain(platform_app)
    # Read from /data/local/tmp or /data/data/com.android.shell.
    allow platform_app shell_data_file:dir search;
    allow platform_app shell_data_file:file { open getattr read };
    # Populate /data/app/vmdl*.tmp, /data/app-private/vmdl*.tmp files
    # created by system server.
    allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
    allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
    allow platform_app apk_private_data_file:dir search;
    # ASEC
    allow platform_app asec_apk_file:dir create_dir_perms;
    allow platform_app asec_apk_file:file create_file_perms;
    
    # Access to /data/media.
    allow platform_app media_rw_data_file:dir create_dir_perms;
    allow platform_app media_rw_data_file:file create_file_perms;
    
    # Write to /cache.
    allow platform_app { cache_file cache_recovery_file }:dir create_dir_perms;
    allow platform_app { cache_file cache_recovery_file }:file create_file_perms;
    
    # Likely not needed
    auditallow platform_app cache_recovery_file:dir create_dir_perms;
    auditallow platform_app cache_recovery_file:file create_file_perms;
    
    # Direct access to vold-mounted storage under /mnt/media_rw
    # This is a performance optimization that allows platform apps to bypass the FUSE layer
    allow platform_app mnt_media_rw_file:dir r_dir_perms;
    allow platform_app vfat:dir create_dir_perms;
    allow platform_app vfat:file create_file_perms;
    
    allow platform_app drmserver_service:service_manager find;
    allow platform_app mediaserver_service:service_manager find;
    allow platform_app persistent_data_block_service:service_manager find;
    allow platform_app radio_service:service_manager find;
    allow platform_app surfaceflinger_service:service_manager find;
    allow platform_app app_api_service:service_manager find;
    allow platform_app system_api_service:service_manager find;