aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordcashman <dcashman@google.com>2015-09-08 18:22:12 -0700
committerdcashman <dcashman@google.com>2015-09-10 13:41:36 -0700
commit0b764ae98a7fe452690616b7d722a63bb7cd5fa8 (patch)
tree1251c63d58ea209140970be724bb7db7d11ec8f7
parent1c38b8a225db3fa3f12e4892985c48e369550235 (diff)
downloadandroid_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.tar.gz
android_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.tar.bz2
android_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.zip
Allow untrusted_app to list services.
CTS relies on the ability to see all services on the system to make sure the dump permission is properly enforced on all services. Allow this. Bug: 23476772 Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
-rw-r--r--untrusted_app.te3
1 files changed, 3 insertions, 0 deletions
diff --git a/untrusted_app.te b/untrusted_app.te
index 693a13c..2aa1495 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -80,6 +80,9 @@ allow untrusted_app mnt_media_rw_file:dir search;
allow untrusted_app cache_file:dir create_dir_perms;
allow untrusted_app cache_file:file create_file_perms;
+# allow cts to query all services
+allow untrusted_app servicemanager:service_manager list;
+
allow untrusted_app drmserver_service:service_manager find;
allow untrusted_app mediaserver_service:service_manager find;
allow untrusted_app nfc_service:service_manager find;