blob: b8ae9f4ac16b52be2185a0a60c8057c5b75949bc [file] [log] [blame]
ThiƩbaud Weksteen5e9b88f2023-08-28 12:22:17 +10001# Rules common to some specific binder service domains.
2# Deprecated. Consider granting the exact permissions required by your service.
Nick Kralevich09e6abd2013-12-13 22:19:45 -08003
Joe Onorato41f93db2016-11-20 23:23:04 -08004# Allow dumpstate and incidentd to collect information from binder services
5allow binderservicedomain { dumpstate incidentd }:fd use;
6allow binderservicedomain { dumpstate incidentd }:unix_stream_socket { read write getopt getattr };
7allow binderservicedomain { dumpstate incidentd }:fifo_file { getattr write };
Nick Kralevich2e7a3012014-01-10 23:05:25 -08008allow binderservicedomain shell_data_file:file { getattr write };
Nick Kralevich51538902013-12-19 18:18:32 -08009
Nick Kralevich67d1f1e2014-06-20 18:25:52 -070010# Allow dumpsys to work from adb shell or the serial console
Nick Kralevich51538902013-12-19 18:18:32 -080011allow binderservicedomain devpts:chr_file rw_file_perms;
Nick Kralevich67d1f1e2014-06-20 18:25:52 -070012allow binderservicedomain console_device:chr_file rw_file_perms;
Stephen Smalley644279b2014-03-21 10:24:04 -040013
14# Receive and write to a pipe received over Binder from an app.
15allow binderservicedomain appdomain:fd use;
16allow binderservicedomain appdomain:fifo_file write;
Riley Spahnf90c41f2014-06-05 15:52:02 -070017
dcashman32d207e2015-10-29 10:32:14 -070018# allow all services to run permission checks
19allow binderservicedomain permission_service:service_manager find;
20
Janis Danisevskis144c8222020-09-24 08:55:28 -070021allow binderservicedomain keystore:keystore2_key { delete get_info rebind use };
Riley Spahn1196d2a2014-06-17 14:58:52 -070022
23use_keystore(binderservicedomain)
Rob Seymourecbadbb2022-07-28 16:23:42 +000024# binderservicedomain is using apex_info via libvintf
25use_apex_info(binderservicedomain)