000b69499a
binderservicedomain services often expose their methods to untrusted
clients and rely on permission checks for access control. Allow these
services to query the permission service for access decisions.
(cherry-pick of commit: 32d207e042
)
Bug: 25282923
Change-Id: I39bbef479de3a0df63e0cbca956f3546e13bbb9b
21 lines
904 B
Text
21 lines
904 B
Text
# Rules common to all binder service domains
|
|
|
|
# Allow dumpstate to collect information from binder services
|
|
allow binderservicedomain dumpstate:fd use;
|
|
allow binderservicedomain dumpstate:unix_stream_socket { read write getopt getattr };
|
|
allow binderservicedomain shell_data_file:file { getattr write };
|
|
|
|
# Allow dumpsys to work from adb shell or the serial console
|
|
allow binderservicedomain devpts:chr_file rw_file_perms;
|
|
allow binderservicedomain console_device:chr_file rw_file_perms;
|
|
|
|
# Receive and write to a pipe received over Binder from an app.
|
|
allow binderservicedomain appdomain:fd use;
|
|
allow binderservicedomain appdomain:fifo_file write;
|
|
|
|
# allow all services to run permission checks
|
|
allow binderservicedomain permission_service:service_manager find;
|
|
|
|
allow binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
|
|
|
|
use_keystore(binderservicedomain)
|