blob: 9b09ce31cf7e4f12af79a6626c65a5da20eaf737 [file] [log] [blame]
Ashwini Oruganti9bc81122019-10-21 15:28:00 -07001###
2### A domain for further sandboxing the GooglePermissionController app.
3###
4type permissioncontroller_app, domain;
5
6# Allow everything.
7# TODO(b/142672293): remove when no selinux denials are triggered for this
8# domain
9# STOPSHIP(b/142672293): monitor http://go/sedenials for any denials around
10# `permissioncontroller_app` and remove this line once we are confident about
11# this having the right set of permissions.
12userdebug_or_eng(`permissive permissioncontroller_app;')
13
14app_domain(permissioncontroller_app)
15
16# Allow interaction with gpuservice
17binder_call(permissioncontroller_app, gpuservice)
18allow permissioncontroller_app gpu_service:service_manager find;
19
20# Allow interaction with role_service
21allow permissioncontroller_app role_service:service_manager find;
22
23# Allow interaction with usagestats_service
24allow permissioncontroller_app usagestats_service:service_manager find;
25
26# Allow interaction with activity_service
27allow permissioncontroller_app activity_service:service_manager find;
Ashwini Orugantic557ca62019-11-04 16:03:54 -080028
29allow permissioncontroller_app activity_task_service:service_manager find;
30allow permissioncontroller_app audio_service:service_manager find;
31allow permissioncontroller_app autofill_service:service_manager find;
32allow permissioncontroller_app device_policy_service:service_manager find;
33allow permissioncontroller_app location_service:service_manager find;
34allow permissioncontroller_app surfaceflinger_service:service_manager find;
35allow permissioncontroller_app trust_service:service_manager find;