diff --git a/gatekeeperd.te b/gatekeeperd.te index 39d9d210c21727b0b38f4a472f05914b64276e54..4d62ce4f7eb711742032f54753060e3c0c351444 100644 --- a/gatekeeperd.te +++ b/gatekeeperd.te @@ -3,6 +3,7 @@ type gatekeeperd_exec, exec_type, file_type; # gatekeeperd init_daemon_domain(gatekeeperd) +binder_service(gatekeeperd) binder_use(gatekeeperd) allow gatekeeperd tee_device:chr_file rw_file_perms; diff --git a/service.te b/service.te index da01071b5e5d63f2a9b1716ee0f8ecce12ad2bb6..3dfa296cfcafbb6fa06d067d57c5535472cd9dde 100644 --- a/service.te +++ b/service.te @@ -1,10 +1,10 @@ type bluetooth_service, service_manager_type; type default_android_service, service_manager_type; type drmserver_service, service_manager_type; +type gatekeeper_service, app_api_service, service_manager_type; type healthd_service, service_manager_type; type inputflinger_service, service_manager_type; type keystore_service, service_manager_type; -type gatekeeper_service, service_manager_type; type mediaserver_service, service_manager_type; type nfc_service, service_manager_type; type radio_service, service_manager_type; diff --git a/untrusted_app.te b/untrusted_app.te index 1b7aaeefd0d8289b3c8db118428f5511c7164a48..5ad8c79bd1395571f4ce22fba8b158e8f7681ea2 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -93,10 +93,6 @@ allow untrusted_app persistent_data_block_service:service_manager find; allow untrusted_app { apk_tmp_file apk_private_tmp_file }:dir r_dir_perms; allow untrusted_app { apk_tmp_file apk_private_tmp_file }:file r_file_perms; -# Apps using KeyStore API will request the SID from GateKeeper -allow untrusted_app gatekeeper_service:service_manager find; -binder_call(untrusted_app, gatekeeperd) - ### ### neverallow rules ###