platform_system_sepolicy/prebuilts/api/30.0/private/permissioncontroller_app.te
Svet Ganov 8c3b2b9643 Updading selinux policy for R
* Update se policy prebuilts

Test: build + boot

bug:150281259

Change-Id: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
2020-05-01 10:42:40 -07:00

38 lines
1.8 KiB
Text

###
### A domain for further sandboxing the GooglePermissionController app.
###
type permissioncontroller_app, domain, coredomain;
app_domain(permissioncontroller_app)
# Allow interaction with gpuservice
binder_call(permissioncontroller_app, gpuservice)
allow permissioncontroller_app gpu_service:service_manager find;
# Allow interaction with role_service
allow permissioncontroller_app role_service:service_manager find;
# Allow interaction with usagestats_service
allow permissioncontroller_app usagestats_service:service_manager find;
# Allow interaction with activity_service
allow permissioncontroller_app activity_service:service_manager find;
allow permissioncontroller_app activity_task_service:service_manager find;
allow permissioncontroller_app audio_service:service_manager find;
allow permissioncontroller_app autofill_service:service_manager find;
allow permissioncontroller_app content_capture_service:service_manager find;
allow permissioncontroller_app device_policy_service:service_manager find;
allow permissioncontroller_app incidentcompanion_service:service_manager find;
allow permissioncontroller_app IProxyService_service:service_manager find;
allow permissioncontroller_app location_service:service_manager find;
allow permissioncontroller_app media_session_service:service_manager find;
allow permissioncontroller_app surfaceflinger_service:service_manager find;
allow permissioncontroller_app telecom_service:service_manager find;
allow permissioncontroller_app trust_service:service_manager find;
# Allow the app to request and collect incident reports.
# (Also requires DUMP and PACKAGE_USAGE_STATS permissions)
allow permissioncontroller_app incident_service:service_manager find;
binder_call(permissioncontroller_app, incidentd)
allow permissioncontroller_app incidentd:fifo_file { read write };