blob: 09ba0796fd76cda9f6b83a44bad612236e616e16 [file] [log] [blame]
Yifan Hong18ade862019-03-14 15:45:03 -07001type lpdumpd, domain, coredomain;
2type lpdumpd_exec, system_file_type, exec_type, file_type;
3
4init_daemon_domain(lpdumpd)
5
6# Allow lpdumpd to register itself as a service.
7binder_use(lpdumpd)
8add_service(lpdumpd, lpdump_service)
9
10# Allow lpdumpd to find the super partition block device.
11allow lpdumpd block_device:dir r_dir_perms;
12
Yifan Hongab85caa2019-03-22 13:55:13 -070013# Allow lpdumpd to read super partition metadata.
14allow lpdumpd super_block_device_type:blk_file r_file_perms;
Yifan Hong18ade862019-03-14 15:45:03 -070015
16# Allow lpdumpd to read fstab.
17allow lpdumpd sysfs_dt_firmware_android:dir r_dir_perms;
18allow lpdumpd sysfs_dt_firmware_android:file r_file_perms;
Yi-Yo Chiang58549412021-03-22 13:46:12 +080019read_fstab(lpdumpd)
Yifan Hong18ade862019-03-14 15:45:03 -070020
David Andersone6ad1f22023-07-14 09:07:18 -070021# Allow to get A/B slot suffix from device tree or kernel cmdline.
22r_dir_file(lpdumpd, sysfs_dt_firmware_android);
23allow lpdumpd proc_cmdline:file r_file_perms;
24
25# Allow reading Virtual A/B status information.
26get_prop(lpdumpd, virtual_ab_prop)
27allow lpdumpd metadata_file:dir search;
28allow lpdumpd ota_metadata_file:dir { r_dir_perms lock };
29allow lpdumpd ota_metadata_file:file r_file_perms;
30
Yifan Hong18ade862019-03-14 15:45:03 -070031### Neverallow rules
32
33# Disallow other domains to get lpdump_service and call lpdumpd.
34neverallow {
35 domain
36 -dumpstate
37 -lpdumpd
38 -shell
39} lpdump_service:service_manager find;
40
41neverallow {
42 domain
43 -dumpstate
44 -lpdumpd
45 -shell
Jon Spivack4b9114a2019-11-26 17:34:29 -080046 -servicemanager
Yifan Hong18ade862019-03-14 15:45:03 -070047} lpdumpd:binder call;