a6d6f677a2
Test: Observe denial go away Bug: 153997991 Change-Id: I9a11e226867a5d68f2490f5143963cc66bd09538
39 lines
1.9 KiB
Text
39 lines
1.9 KiB
Text
###
|
|
### A domain for further sandboxing the GooglePermissionController app.
|
|
###
|
|
type permissioncontroller_app, domain, coredomain;
|
|
|
|
app_domain(permissioncontroller_app)
|
|
|
|
# Allow interaction with gpuservice
|
|
binder_call(permissioncontroller_app, gpuservice)
|
|
allow permissioncontroller_app gpu_service:service_manager find;
|
|
|
|
# Allow interaction with role_service
|
|
allow permissioncontroller_app role_service:service_manager find;
|
|
|
|
# Allow interaction with usagestats_service
|
|
allow permissioncontroller_app usagestats_service:service_manager find;
|
|
|
|
# Allow interaction with activity_service
|
|
allow permissioncontroller_app activity_service:service_manager find;
|
|
|
|
allow permissioncontroller_app activity_task_service:service_manager find;
|
|
allow permissioncontroller_app audio_service:service_manager find;
|
|
allow permissioncontroller_app autofill_service:service_manager find;
|
|
allow permissioncontroller_app content_capture_service:service_manager find;
|
|
allow permissioncontroller_app device_policy_service:service_manager find;
|
|
allow permissioncontroller_app incidentcompanion_service:service_manager find;
|
|
allow permissioncontroller_app IProxyService_service:service_manager find;
|
|
allow permissioncontroller_app location_service:service_manager find;
|
|
allow permissioncontroller_app media_session_service:service_manager find;
|
|
allow permissioncontroller_app radio_service:service_manager find;
|
|
allow permissioncontroller_app surfaceflinger_service:service_manager find;
|
|
allow permissioncontroller_app telecom_service:service_manager find;
|
|
allow permissioncontroller_app trust_service:service_manager find;
|
|
|
|
# Allow the app to request and collect incident reports.
|
|
# (Also requires DUMP and PACKAGE_USAGE_STATS permissions)
|
|
allow permissioncontroller_app incident_service:service_manager find;
|
|
binder_call(permissioncontroller_app, incidentd)
|
|
allow permissioncontroller_app incidentd:fifo_file { read write };
|