blob: 5d0eca72723e485c2657a1646acc0f823f62aab5 [file] [log] [blame]
Stephen Smalley8840fa72013-09-11 11:37:46 -04001#
2# Apps that run with the system UID, e.g. com.android.system.ui,
3# com.android.settings. These are not as privileged as the system
4# server.
5#
6type system_app, domain;
Nick Kralevich623975f2014-01-11 01:31:03 -08007permissive_or_unconfined(system_app)
Stephen Smalley8840fa72013-09-11 11:37:46 -04008app_domain(system_app)
Stephen Smalley85708ec2014-02-24 10:48:03 -05009net_domain(system_app)
Nick Kralevich2e7a3012014-01-10 23:05:25 -080010binder_service(system_app)
Stephen Smalley56370992013-10-23 13:12:55 -040011
Stephen Smalley91a4f8d2014-05-07 13:10:02 -040012# Read and write /data/data subdirectory.
13allow system_app system_app_data_file:dir create_dir_perms;
14allow system_app system_app_data_file:file create_file_perms;
Stephen Smalley56370992013-10-23 13:12:55 -040015
16# Read wallpaper file.
17allow system_app wallpaper_file:file r_file_perms;
18
19# Write to dalvikcache.
20allow system_app dalvikcache_data_file:file { write setattr };
21
Nick Kralevichdd1ec6d2013-11-01 10:45:03 -070022# Write to properties
Nick Kralevich3e780002013-12-10 16:40:49 -080023unix_socket_connect(system_app, property, init)
24allow system_app debug_prop:property_service set;
25allow system_app radio_prop:property_service set;
Nick Kralevichdd1ec6d2013-11-01 10:45:03 -070026allow system_app system_prop:property_service set;
Stephen Smalley1c0c0102014-03-06 14:47:22 -050027allow system_app ctl_bugreport_prop:property_service set;
28
29# Create /data/anr/traces.txt.
30allow system_app anr_data_file:dir ra_dir_perms;
31allow system_app anr_data_file:file create_file_perms;
Mark Salyzync52d7382014-05-09 17:47:19 -070032
33control_logd(system_app)