blob: ca540c68fc8d054076fe1f15c2ed82b80aaa4d51 [file] [log] [blame]
Andres Moralese2079862015-04-03 16:46:33 -07001type gatekeeperd, domain;
2type gatekeeperd_exec, exec_type, file_type;
3
4# gatekeeperd
5init_daemon_domain(gatekeeperd)
Alex Klyubinab5cf662015-04-28 16:51:26 -07006binder_service(gatekeeperd)
Andres Moralese2079862015-04-03 16:46:33 -07007binder_use(gatekeeperd)
Andres Moralese2079862015-04-03 16:46:33 -07008allow gatekeeperd tee_device:chr_file rw_file_perms;
9
Andres Morales13abb172015-04-08 19:52:19 -070010# need to find KeyStore and add self
Andres Moralese2079862015-04-03 16:46:33 -070011allow gatekeeperd gatekeeper_service:service_manager { add find };
12
Andres Morales13abb172015-04-08 19:52:19 -070013# Need to add auth tokens to KeyStore
Andres Moralesdd156fc2015-04-13 12:21:08 -070014use_keystore(gatekeeperd)
Andres Moralese2079862015-04-03 16:46:33 -070015allow gatekeeperd keystore:keystore_key { add_auth };
16
Andres Morales13abb172015-04-08 19:52:19 -070017# For permissions checking
18allow gatekeeperd system_server:binder call;
19allow gatekeeperd permission_service:service_manager find;
Andres Morales54a4aab2015-08-04 17:42:22 -070020# For parent user ID lookup
21allow gatekeeperd user_service:service_manager find;
Andres Morales13abb172015-04-08 19:52:19 -070022
Andres Moralesb348f8f2015-04-16 13:40:57 -070023# for SID file access
Nick Kralevich367757d2015-04-17 17:56:31 -070024allow gatekeeperd gatekeeper_data_file:dir rw_dir_perms;
25allow gatekeeperd gatekeeper_data_file:file create_file_perms;
Andres Moralesb348f8f2015-04-16 13:40:57 -070026
Andres Moralese2079862015-04-03 16:46:33 -070027neverallow { domain -gatekeeperd } gatekeeper_service:service_manager add;