aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordcashman <dcashman@google.com>2015-10-29 10:32:14 -0700
committerdcashman <dcashman@google.com>2015-10-29 10:32:14 -0700
commit32d207e042c280a1d230e180dc6d49aba3b0248c (patch)
treea8254311c9e3e837336911a12d0b523dff2cbd9b
parent5eac92174c8a036e088337c1c44f1ea84ab59b0f (diff)
downloadandroid_external_sepolicy-32d207e042c280a1d230e180dc6d49aba3b0248c.tar.gz
android_external_sepolicy-32d207e042c280a1d230e180dc6d49aba3b0248c.tar.bz2
android_external_sepolicy-32d207e042c280a1d230e180dc6d49aba3b0248c.zip
Enable permission checking by binderservicedomain.
binderservicedomain services often expose their methods to untrusted clients and rely on permission checks for access control. Allow these services to query the permission service for access decisions. Bug: 25282923 Change-Id: I39bbef479de3a0df63e0cbca956f3546e13bbb9b
-rw-r--r--binderservicedomain.te3
1 files changed, 3 insertions, 0 deletions
diff --git a/binderservicedomain.te b/binderservicedomain.te
index 0bfd33a..36993eb 100644
--- a/binderservicedomain.te
+++ b/binderservicedomain.te
@@ -13,6 +13,9 @@ allow binderservicedomain console_device:chr_file rw_file_perms;
allow binderservicedomain appdomain:fd use;
allow binderservicedomain appdomain:fifo_file write;
+# allow all services to run permission checks
+allow binderservicedomain permission_service:service_manager find;
+
allow binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
use_keystore(binderservicedomain)