2017-02-13 22:33:27 +01:00
|
|
|
###
|
|
|
|
### Untrusted_app_all.
|
|
|
|
###
|
2017-03-29 23:53:09 +02:00
|
|
|
### This file defines the rules shared by all untrusted app domains except
|
2018-08-06 21:36:20 +02:00
|
|
|
### ephemeral_app for instant apps.
|
2017-02-13 22:33:27 +01:00
|
|
|
### Apps are labeled based on mac_permissions.xml (maps signer and
|
|
|
|
### optionally package name to seinfo value) and seapp_contexts (maps UID
|
|
|
|
### and optionally seinfo value to domain for process and type for data
|
|
|
|
### directory). The untrusted_app_all attribute is assigned to all default
|
|
|
|
### seapp_contexts for any app with UID between APP_AID (10000)
|
|
|
|
### and AID_ISOLATED_START (99000) if the app has no specific seinfo
|
|
|
|
### value as determined from mac_permissions.xml. In current AOSP, this
|
|
|
|
### attribute is assigned to all non-system apps as well as to any system apps
|
|
|
|
### that are not signed by the platform key. To move
|
|
|
|
### a system app into a specific domain, add a signer entry for it to
|
|
|
|
### mac_permissions.xml and assign it one of the pre-existing seinfo values
|
|
|
|
### or define and use a new seinfo value in both mac_permissions.xml and
|
|
|
|
### seapp_contexts.
|
|
|
|
###
|
2017-04-26 21:32:51 +02:00
|
|
|
### Note that rules that should apply to all untrusted apps must be in app.te or also
|
2018-08-06 21:36:20 +02:00
|
|
|
### added to ephemeral_app.te.
|
2017-02-13 22:33:27 +01:00
|
|
|
|
|
|
|
# Some apps ship with shared libraries and binaries that they write out
|
|
|
|
# to their sandbox directory and then execute.
|
2018-12-12 18:06:05 +01:00
|
|
|
allow untrusted_app_all privapp_data_file:file { r_file_perms execute };
|
2018-12-12 18:06:39 +01:00
|
|
|
allow untrusted_app_all app_data_file:file r_file_perms;
|
2018-12-12 18:06:05 +01:00
|
|
|
|
|
|
|
# Allow loading and deleting renderscript created shared libraries
|
|
|
|
# within an application home directory.
|
|
|
|
allow untrusted_app_all rs_data_file:file { r_file_perms execute unlink };
|
2017-02-13 22:33:27 +01:00
|
|
|
|
|
|
|
# ASEC
|
|
|
|
allow untrusted_app_all asec_apk_file:file r_file_perms;
|
|
|
|
allow untrusted_app_all asec_apk_file:dir r_dir_perms;
|
|
|
|
# Execute libs in asec containers.
|
2018-08-08 00:14:34 +02:00
|
|
|
allow untrusted_app_all asec_public_file:file { execute };
|
2017-02-13 22:33:27 +01:00
|
|
|
|
|
|
|
# Used by Finsky / Android "Verify Apps" functionality when
|
|
|
|
# running "adb install foo.apk".
|
|
|
|
# TODO: Long term, we don't want apps probing into shell data files.
|
|
|
|
# Figure out a way to remove these rules.
|
|
|
|
allow untrusted_app_all shell_data_file:file r_file_perms;
|
|
|
|
allow untrusted_app_all shell_data_file:dir r_dir_perms;
|
|
|
|
|
2018-01-23 21:32:55 +01:00
|
|
|
# Allow traceur to pass file descriptors through a content provider to untrusted apps
|
|
|
|
# for the purpose of sharing files through e.g. gmail
|
|
|
|
allow untrusted_app_all trace_data_file:file { getattr read };
|
|
|
|
|
|
|
|
# untrusted apps should not be able to open trace data files, they should depend
|
|
|
|
# upon traceur to pass a file descriptor
|
|
|
|
neverallow untrusted_app_all trace_data_file:dir *;
|
|
|
|
neverallow untrusted_app_all trace_data_file:file { no_w_file_perms open };
|
|
|
|
|
2017-09-26 21:58:29 +02:00
|
|
|
# Allow to read staged apks.
|
|
|
|
allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
|
|
|
|
|
2017-02-13 22:33:27 +01:00
|
|
|
# Read and write system app data files passed over Binder.
|
|
|
|
# Motivating case was /data/data/com.android.settings/cache/*.jpg for
|
|
|
|
# cropping or taking user photos.
|
|
|
|
allow untrusted_app_all system_app_data_file:file { read write getattr };
|
|
|
|
|
|
|
|
#
|
|
|
|
# Rules migrated from old app domains coalesced into untrusted_app.
|
|
|
|
# This includes what used to be media_app, shared_app, and release_app.
|
|
|
|
#
|
|
|
|
|
|
|
|
# Access to /data/media.
|
|
|
|
allow untrusted_app_all media_rw_data_file:dir create_dir_perms;
|
|
|
|
allow untrusted_app_all media_rw_data_file:file create_file_perms;
|
|
|
|
|
|
|
|
# Traverse into /mnt/media_rw for bypassing FUSE daemon
|
|
|
|
# TODO: narrow this to just MediaProvider
|
|
|
|
allow untrusted_app_all mnt_media_rw_file:dir search;
|
|
|
|
|
|
|
|
# allow cts to query all services
|
|
|
|
allow untrusted_app_all servicemanager:service_manager list;
|
|
|
|
|
|
|
|
allow untrusted_app_all audioserver_service:service_manager find;
|
|
|
|
allow untrusted_app_all cameraserver_service:service_manager find;
|
|
|
|
allow untrusted_app_all drmserver_service:service_manager find;
|
|
|
|
allow untrusted_app_all mediaserver_service:service_manager find;
|
|
|
|
allow untrusted_app_all mediaextractor_service:service_manager find;
|
|
|
|
allow untrusted_app_all mediacodec_service:service_manager find;
|
|
|
|
allow untrusted_app_all mediametrics_service:service_manager find;
|
|
|
|
allow untrusted_app_all mediadrmserver_service:service_manager find;
|
|
|
|
allow untrusted_app_all nfc_service:service_manager find;
|
|
|
|
allow untrusted_app_all radio_service:service_manager find;
|
|
|
|
allow untrusted_app_all app_api_service:service_manager find;
|
|
|
|
allow untrusted_app_all vr_manager_service:service_manager find;
|
|
|
|
|
|
|
|
# Allow GMS core to access perfprofd output, which is stored
|
|
|
|
# in /data/misc/perfprofd/. GMS core will need to list all
|
|
|
|
# data stored in that directory to process them one by one.
|
|
|
|
userdebug_or_eng(`
|
|
|
|
allow untrusted_app_all perfprofd_data_file:file r_file_perms;
|
|
|
|
allow untrusted_app_all perfprofd_data_file:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
# gdbserver for ndk-gdb ptrace attaches to app process.
|
|
|
|
allow untrusted_app_all self:process ptrace;
|
|
|
|
|
|
|
|
# Cts: HwRngTest
|
|
|
|
allow untrusted_app_all sysfs_hwrandom:dir search;
|
|
|
|
allow untrusted_app_all sysfs_hwrandom:file r_file_perms;
|
|
|
|
|
2017-03-14 19:42:03 +01:00
|
|
|
# Allow apps to view preloaded media content
|
|
|
|
allow untrusted_app_all preloads_media_file:dir r_dir_perms;
|
|
|
|
allow untrusted_app_all preloads_media_file:file r_file_perms;
|
|
|
|
allow untrusted_app_all preloads_data_file:dir search;
|
2017-04-28 22:17:26 +02:00
|
|
|
|
|
|
|
# Allow untrusted apps read / execute access to /vendor/app for there can
|
|
|
|
# be pre-installed vendor apps that package a library within themselves.
|
|
|
|
# TODO (b/37784178) Consider creating a special type for /vendor/app installed
|
|
|
|
# apps.
|
|
|
|
allow untrusted_app_all vendor_app_file:dir { open getattr read search };
|
2018-10-26 22:11:52 +02:00
|
|
|
allow untrusted_app_all vendor_app_file:file { r_file_perms execute };
|
2017-04-28 22:17:26 +02:00
|
|
|
allow untrusted_app_all vendor_app_file:lnk_file { open getattr read };
|
2017-12-21 03:51:15 +01:00
|
|
|
|
|
|
|
# Write app-specific trace data to the Perfetto traced damon. This requires
|
|
|
|
# connecting to its producer socket and obtaining a (per-process) tmpfs fd.
|
|
|
|
allow untrusted_app_all traced:fd use;
|
|
|
|
allow untrusted_app_all traced_tmpfs:file { read write getattr map };
|
|
|
|
unix_socket_connect(untrusted_app_all, traced_producer, traced)
|
2017-12-15 03:20:30 +01:00
|
|
|
|
|
|
|
# allow untrusted apps to use UDP sockets provided by the system server but not
|
|
|
|
# modify them other than to connect
|
2018-03-27 15:34:54 +02:00
|
|
|
allow untrusted_app_all system_server:udp_socket {
|
|
|
|
connect getattr read recvfrom sendto write getopt setopt };
|
2018-03-27 01:37:42 +02:00
|
|
|
|
2018-12-12 18:06:05 +01:00
|
|
|
# Allow the renderscript compiler to be run.
|
|
|
|
domain_auto_trans(untrusted_app_all, rs_exec, rs)
|
|
|
|
|
2018-03-27 01:37:42 +02:00
|
|
|
# This is allowed for targetSdkVersion <= 25 but disallowed on newer versions.
|
|
|
|
dontaudit untrusted_app_all net_dns_prop:file read;
|
|
|
|
|
|
|
|
# These have been disallowed since Android O.
|
|
|
|
# For P, we assume that apps are safely handling the denial.
|
|
|
|
dontaudit untrusted_app_all proc_stat:file read;
|
|
|
|
dontaudit untrusted_app_all proc_vmstat:file read;
|
|
|
|
dontaudit untrusted_app_all proc_uptime:file read;
|
2018-04-03 20:22:38 +02:00
|
|
|
|
|
|
|
# Allow the allocation and use of ptys
|
|
|
|
# Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
|
|
|
|
create_pty(untrusted_app_all)
|
Start the process of locking down proc/net
Files in /proc/net leak information. This change is the first step in
determining which files apps may use, whitelisting benign access, and
otherwise removing access while providing safe alternative APIs.
To that end, this change:
* Introduces the proc_net_type attribute which will assigned to any
new SELinux types in /proc/net to avoid removing access to privileged
processes. These processes may be evaluated later, but are lower
priority than apps.
* Labels /proc/net/{tcp,tcp6,udp,udp6} as proc_net_vpn due to existing
use by VPN apps. This may be replaced by an alternative API.
* Audits all other proc/net access for apps.
* Audits proc/net access for other processes which are currently
granted broad read access to /proc/net but should not be including
storaged, zygote, clatd, logd, preopt2cachename and vold.
Bug: 9496886
Bug: 68016944
Test: Boot Taimen-userdebug. On both wifi and cellular: stream youtube
navigate maps, send text message, make voice call, make video call.
Verify no avc "granted" messages in the logs.
Test: A few VPN apps including "VPN Monster", "Turbo VPN", and
"Freighter". Verify no logspam with the current setup.
Test: atest CtsNativeNetTestCases
Test: atest netd_integration_test
Test: atest QtaguidPermissionTest
Test: atest FileSystemPermissionTest
Change-Id: I7e49f796a25cf68bc698c6c9206e24af3ae11457
Merged-In: I7e49f796a25cf68bc698c6c9206e24af3ae11457
(cherry picked from commit 087318957f26e921d62f2e234fc14bff3c59030e)
2018-04-10 21:47:48 +02:00
|
|
|
|
2018-06-01 21:12:11 +02:00
|
|
|
# Attempts to write to system_data_file is generally a sign
|
|
|
|
# that apps are attempting to access encrypted storage before
|
|
|
|
# the ACTION_USER_UNLOCKED intent is delivered. Suppress this
|
|
|
|
# denial to prevent third party apps from spamming the logs.
|
|
|
|
dontaudit untrusted_app_all system_data_file:dir write;
|
2018-11-29 19:37:18 +01:00
|
|
|
|
|
|
|
# Allow access to kcov via its ioctl interface for coverage
|
|
|
|
# guided kernel fuzzing.
|
|
|
|
userdebug_or_eng(`
|
|
|
|
allow untrusted_app_all debugfs_kcov:file rw_file_perms;
|
|
|
|
allowxperm untrusted_app_all debugfs_kcov:file ioctl { KCOV_INIT_TRACE KCOV_ENABLE KCOV_DISABLE };
|
|
|
|
')
|