blob: 3084e936378c9de14c92798ddf684d5e8cb88cde [file] [log] [blame]
Stephen Smalley8840fa72013-09-11 11:37:46 -04001#
2# Apps that run with the system UID, e.g. com.android.system.ui,
3# com.android.settings. These are not as privileged as the system
4# server.
5#
6type system_app, domain;
Stephen Smalley56370992013-10-23 13:12:55 -04007permissive system_app;
Stephen Smalley8840fa72013-09-11 11:37:46 -04008app_domain(system_app)
Stephen Smalley56370992013-10-23 13:12:55 -04009
10# Perform binder IPC to any app domain.
11binder_call(system_app, appdomain)
12
13# Read and write system data files.
14# May want to split into separate types.
15allow system_app system_data_file:dir create_dir_perms;
16allow system_app system_data_file:file create_file_perms;
17
18# Read wallpaper file.
19allow system_app wallpaper_file:file r_file_perms;
20
21# Write to dalvikcache.
22allow system_app dalvikcache_data_file:file { write setattr };
23
24# Talk to keystore.
25unix_socket_connect(system_app, keystore, keystore)
26
27# Read SELinux enforcing status.
28selinux_getenforce(system_app)
29
30# Settings app reads sdcard for storage stats
31allow system_app sdcard_type:dir r_dir_perms;
32
33# Allow settings app to read from asec
34allow system_app asec_apk_file:dir search;
35allow system_app asec_apk_file:file r_file_perms;
Nick Kralevichdd1ec6d2013-11-01 10:45:03 -070036
37# Write to properties
38allow system_app system_prop:property_service set;