Skip to content
Snippets Groups Projects
Select Git revision
  • 24d7142bd15d538461da5df9e0adb40bc394723b
  • master default protected
2 results

util.h

Blame
  • gatekeeperd.te 1.29 KiB
    type gatekeeperd, domain;
    type gatekeeperd_exec, exec_type, file_type;
    
    # gatekeeperd
    binder_service(gatekeeperd)
    binder_use(gatekeeperd)
    
    ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
    ### These rules should eventually be granted only when needed.
    allow gatekeeperd tee_device:chr_file rw_file_perms;
    allow gatekeeperd ion_device:chr_file r_file_perms;
    # Load HAL implementation
    allow gatekeeperd system_file:dir r_dir_perms;
    ###
    
    ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
    ### These rules should eventually be granted only when needed.
    hwbinder_use(gatekeeperd)
    ###
    
    # need to find KeyStore and add self
    add_service(gatekeeperd, gatekeeper_service)
    
    # Need to add auth tokens to KeyStore
    use_keystore(gatekeeperd)
    allow gatekeeperd keystore:keystore_key { add_auth };
    
    # For permissions checking
    allow gatekeeperd system_server:binder call;
    allow gatekeeperd permission_service:service_manager find;
    
    # For parent user ID lookup
    allow gatekeeperd user_service:service_manager find;
    
    # for SID file access
    allow gatekeeperd gatekeeper_data_file:dir rw_dir_perms;
    allow gatekeeperd gatekeeper_data_file:file create_file_perms;
    
    # For hardware properties retrieval
    allow gatekeeperd hardware_properties_service:service_manager find;
    
    r_dir_file(gatekeeperd, cgroup)