blob: baf5f56717d621d0ea1de0b30b5110fc42945535 [file] [log] [blame]
# This file contains autogenerated policy based on
# denials seen in the wild.
#
# As a general rule, you should not add policy to
# this file. You SHOULD treat this policy very
# skeptically- while it does preserve compatibility,
# it is also extremely overbroad.
#
# Over time this list should trend to size 0. Your
# assistance in bringing it to 0 is highly appreciated.
#============= adbd ==============
allow adbd app_data_file:dir { write add_name };
allow adbd app_data_file:file { write create open setattr };
allow adbd kernel:process setsched;
allow adbd proc:file write;
allow adbd self:capability setpcap;
#============= debuggerd ==============
allow debuggerd system:unix_stream_socket connectto;
allow debuggerd system_data_file:sock_file write;
#============= dhcp ==============
allow dhcp system_data_file:file open;
allow dhcp unlabeled:file create;
#============= drmserver ==============
allow drmserver init:unix_stream_socket { read write };
#============= init ==============
allow init node:rawip_socket node_bind;
#============= init_shell ==============
allow init_shell init:fifo_file write;
allow init_shell init:netlink_route_socket { read write };
allow init_shell init:netlink_socket { read write };
allow init_shell init:unix_stream_socket { read write };
allow init_shell self:netlink_route_socket { write getattr setopt bind create nlmsg_read };
#============= installd ==============
allow installd download_file:dir { read search open getattr };
#============= keystore ==============
allow keystore init:unix_stream_socket { read write };
#============= media_app ==============
allow media_app system_data_file:file append;
#============= mediaserver ==============
allow mediaserver device:chr_file { read write ioctl open };
allow mediaserver init:unix_dgram_socket sendto;
allow mediaserver init:unix_stream_socket { read write };
allow mediaserver system_data_file:file { write open };
allow mediaserver system_data_file:sock_file write;
#============= nfc ==============
allow nfc device:chr_file { read write open };
allow nfc init:unix_stream_socket { read write };
#allow nfc system_data_file:dir { write remove_name add_name };
#allow nfc system_data_file:file { write create unlink append };
allow nfc unlabeled:file { read write open };
#============= ping ==============
allow ping adbd:process sigchld;
#============= platform_app ==============
allow platform_app device:chr_file { read write ioctl };
allow platform_app init:binder { transfer call };
allow platform_app init:unix_stream_socket { read write };
#allow platform_app system_data_file:file append;
allow platform_app unlabeled:file { read getattr open };
#============= radio ==============
allow radio init:binder call;
allow radio init:unix_stream_socket { read write };
allow radio system_data_file:file append;
#============= release_app ==============
allow release_app system_data_file:file append;
allow release_app unlabeled:lnk_file read;
#============= sdcardd ==============
allow sdcardd unlabeled:dir { read open };
#============= shared_app ==============
allow shared_app device:chr_file { read write };
allow shared_app init:binder call;
allow shared_app init:unix_stream_socket { read write };
allow shared_app init_tmpfs:file read;
#allow shared_app system_data_file:file append;
allow shared_app unlabeled:file { write lock getattr open read };
#============= shell ==============
allow shell apk_private_data_file:dir getattr;
allow shell asec_image_file:dir getattr;
allow shell backup_data_file:dir getattr;
allow shell device:sock_file write;
allow shell drm_data_file:dir getattr;
allow shell nfc_data_file:dir getattr;
allow shell rootfs:file getattr;
allow shell sdcard_internal:dir { create rmdir };
#allow shell self:capability { fowner fsetid dac_override };
#allow shell self:capability2 syslog;
#allow shell system_data_file:dir { write remove_name add_name };
#allow shell system_data_file:file { write create setattr };
allow shell unlabeled:dir getattr;
allow shell vold:unix_stream_socket connectto;
allow shell vold_socket:sock_file write;
#============= surfaceflinger ==============
allow surfaceflinger adbd:binder call;
allow surfaceflinger device:chr_file { read write ioctl open };
allow surfaceflinger init:dir search;
allow surfaceflinger init:file { read open };
allow surfaceflinger init:unix_stream_socket { read write };
allow surfaceflinger platform_app:binder call;
allow surfaceflinger shell_data_file:dir search;
allow surfaceflinger sysfs:file write;
allow surfaceflinger system_app:dir search;
allow surfaceflinger system_app:file { read open };
#============= system ==============
allow system device:chr_file ioctl;
allow system init:binder { transfer call };
allow system init:unix_stream_socket { read write setopt };
allow system proc:file write;
allow system security_file:lnk_file read;
allow system unlabeled:dir { read remove_name write open add_name };
allow system unlabeled:file { rename getattr read create open ioctl append };
#============= system_app ==============
allow system_app init:unix_stream_socket { read write setopt };
allow system_app unlabeled:file { read getattr open };
#============= untrusted_app ==============
allow untrusted_app device:chr_file { read write };
allow untrusted_app init:binder { transfer call };
allow untrusted_app init:dir { getattr search };
allow untrusted_app init:file { read getattr open };
allow untrusted_app init:unix_stream_socket { read write connectto };
allow untrusted_app kernel:dir { getattr search };
allow untrusted_app kernel:file { read getattr open };
allow untrusted_app servicemanager:dir { getattr search };
allow untrusted_app servicemanager:file { read getattr open };
allow untrusted_app shell_data_file:dir search;
allow untrusted_app shell_data_file:file { read getattr open };
#allow untrusted_app system_data_file:file append;
allow untrusted_app ueventd:dir { search getattr };
allow untrusted_app ueventd:file { read getattr open };
allow untrusted_app unlabeled:dir setattr;
allow untrusted_app zygote:dir search;
#============= vold ==============
allow vold unlabeled:dir { read getattr open };
#============= wpa ==============
allow wpa init:unix_dgram_socket { read write sendto };
allow wpa wifi_data_file:sock_file write;
#============= zygote ==============
allow zygote security_file:lnk_file read;