diff options
author | dcashman <dcashman@google.com> | 2015-09-08 18:22:12 -0700 |
---|---|---|
committer | dcashman <dcashman@google.com> | 2015-09-10 13:41:36 -0700 |
commit | 0b764ae98a7fe452690616b7d722a63bb7cd5fa8 (patch) | |
tree | 1251c63d58ea209140970be724bb7db7d11ec8f7 /untrusted_app.te | |
parent | 1c38b8a225db3fa3f12e4892985c48e369550235 (diff) | |
download | android_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.tar.gz android_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.tar.bz2 android_external_sepolicy-0b764ae98a7fe452690616b7d722a63bb7cd5fa8.zip |
Allow untrusted_app to list services.
CTS relies on the ability to see all services on the system to make sure
the dump permission is properly enforced on all services. Allow this.
Bug: 23476772
Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
Diffstat (limited to 'untrusted_app.te')
-rw-r--r-- | untrusted_app.te | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/untrusted_app.te b/untrusted_app.te index 693a13c..2aa1495 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -80,6 +80,9 @@ allow untrusted_app mnt_media_rw_file:dir search; allow untrusted_app cache_file:dir create_dir_perms; allow untrusted_app cache_file:file create_file_perms; +# allow cts to query all services +allow untrusted_app servicemanager:service_manager list; + allow untrusted_app drmserver_service:service_manager find; allow untrusted_app mediaserver_service:service_manager find; allow untrusted_app nfc_service:service_manager find; |