ed96f5c518
The list permission protects the ability to list arbitrary namespaces. This is not a namespace specific permission but a Keystore specific permission. Listing the entries of a given namsepace is covered by the get_info permission already. Test: N/A Merged-In: If6e79fd863a79acf8d8ab10c6362a4eeaa88a5b8 Change-Id: If6e79fd863a79acf8d8ab10c6362a4eeaa88a5b8
24 lines
1.1 KiB
Text
24 lines
1.1 KiB
Text
# Rules common to all binder service domains
|
|
|
|
# Allow dumpstate and incidentd to collect information from binder services
|
|
allow binderservicedomain { dumpstate incidentd }:fd use;
|
|
allow binderservicedomain { dumpstate incidentd }:unix_stream_socket { read write getopt getattr };
|
|
allow binderservicedomain { dumpstate incidentd }:fifo_file { getattr write };
|
|
allow binderservicedomain shell_data_file:file { getattr write };
|
|
|
|
# Allow dumpsys to work from adb shell or the serial console
|
|
allow binderservicedomain devpts:chr_file rw_file_perms;
|
|
allow binderservicedomain console_device:chr_file rw_file_perms;
|
|
|
|
# Receive and write to a pipe received over Binder from an app.
|
|
allow binderservicedomain appdomain:fd use;
|
|
allow binderservicedomain appdomain:fifo_file write;
|
|
|
|
# allow all services to run permission checks
|
|
allow binderservicedomain permission_service:service_manager find;
|
|
|
|
allow binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
|
|
allow binderservicedomain keystore:keystore2 { get_state };
|
|
allow binderservicedomain keystore:keystore2_key { delete get_info rebind use };
|
|
|
|
use_keystore(binderservicedomain)
|