Skip to content
Snippets Groups Projects
Commit 64a01931 authored by yro's avatar yro Committed by android-build-merger
Browse files

Update priv_app selinux policy to allow gmscore to be able to communicate with...

Update priv_app selinux policy to allow gmscore to be able to communicate with statsd am: 31b11d8e
am: 2722dd43

Change-Id: I7b480b4f6c1beca41c15f8ebd8e502bd1178196b
parents 45b0aa33 2722dd43
No related branches found
No related tags found
No related merge requests found
...@@ -21,22 +21,23 @@ allow priv_app self:process ptrace; ...@@ -21,22 +21,23 @@ allow priv_app self:process ptrace;
# to their sandbox directory and then dlopen(). # to their sandbox directory and then dlopen().
allow priv_app app_data_file:file execute; allow priv_app app_data_file:file execute;
allow priv_app app_api_service:service_manager find;
allow priv_app audioserver_service:service_manager find; allow priv_app audioserver_service:service_manager find;
allow priv_app cameraserver_service:service_manager find; allow priv_app cameraserver_service:service_manager find;
allow priv_app drmserver_service:service_manager find; allow priv_app drmserver_service:service_manager find;
allow priv_app mediacodec_service:service_manager find; allow priv_app mediacodec_service:service_manager find;
allow priv_app mediametrics_service:service_manager find;
allow priv_app mediadrmserver_service:service_manager find; allow priv_app mediadrmserver_service:service_manager find;
allow priv_app mediaextractor_service:service_manager find; allow priv_app mediaextractor_service:service_manager find;
allow priv_app mediametrics_service:service_manager find;
allow priv_app mediaserver_service:service_manager find; allow priv_app mediaserver_service:service_manager find;
allow priv_app network_watchlist_service:service_manager find; allow priv_app network_watchlist_service:service_manager find;
allow priv_app nfc_service:service_manager find; allow priv_app nfc_service:service_manager find;
allow priv_app oem_lock_service:service_manager find; allow priv_app oem_lock_service:service_manager find;
allow priv_app radio_service:service_manager find;
allow priv_app app_api_service:service_manager find;
allow priv_app system_api_service:service_manager find;
allow priv_app persistent_data_block_service:service_manager find; allow priv_app persistent_data_block_service:service_manager find;
allow priv_app radio_service:service_manager find;
allow priv_app recovery_service:service_manager find; allow priv_app recovery_service:service_manager find;
allow priv_app stats_service:service_manager find;
allow priv_app system_api_service:service_manager find;
# Write to /cache. # Write to /cache.
allow priv_app { cache_file cache_recovery_file }:dir create_dir_perms; allow priv_app { cache_file cache_recovery_file }:dir create_dir_perms;
...@@ -95,6 +96,9 @@ allow priv_app update_engine_service:service_manager find; ...@@ -95,6 +96,9 @@ allow priv_app update_engine_service:service_manager find;
binder_call(priv_app, storaged) binder_call(priv_app, storaged)
allow priv_app storaged_service:service_manager find; allow priv_app storaged_service:service_manager find;
# Allow GMS core to communicate with statsd.
binder_call(priv_app, statsd)
# Allow Phone to read/write cached ringtones (opened by system). # Allow Phone to read/write cached ringtones (opened by system).
allow priv_app ringtone_file:file { getattr read write }; allow priv_app ringtone_file:file { getattr read write };
......
...@@ -55,6 +55,7 @@ binder_call(statsd, stats) ...@@ -55,6 +55,7 @@ binder_call(statsd, stats)
neverallow { neverallow {
domain domain
-dumpstate -dumpstate
-priv_app
-shell -shell
-stats -stats
-statsd -statsd
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment