2017-03-23 22:27:32 +01:00
|
|
|
typeattribute hwservicemanager coredomain;
|
|
|
|
|
2016-07-22 22:13:11 +02:00
|
|
|
init_daemon_domain(hwservicemanager)
|
2017-04-14 04:05:27 +02:00
|
|
|
|
|
|
|
add_hwservice(hwservicemanager, hidl_manager_hwservice)
|
|
|
|
add_hwservice(hwservicemanager, hidl_token_hwservice)
|
2017-10-06 03:49:23 +02:00
|
|
|
|
Finer grained permissions for ctl. properties
Currently, permissions for ctl. property apply to each action verb, so
if a domain has permissions for controlling service 'foo', then it can
start, stop, and restart foo.
This change implements finer grainer permissions such that permission
can be given to strictly start a given service, but not stop or
restart it. This new permission scheme is mandatory for the new
control functions, sigstop_on, sigstop_off, interface_start,
interface_stop, interface_restart.
Bug: 78511553
Test: see appropriate successes and failures based on permissions
Merged-In: Ibe0cc0d6028fb0ed7d6bcba626721e0d84cc20fa
Change-Id: Ibe0cc0d6028fb0ed7d6bcba626721e0d84cc20fa
(cherry picked from commit 2208f96e9e6264553fcc8a58b86f4f21a092468c)
2018-05-04 02:00:16 +02:00
|
|
|
set_prop(hwservicemanager, ctl_interface_start_prop)
|
2020-03-04 09:20:35 +01:00
|
|
|
set_prop(hwservicemanager, hwservicemanager_prop)
|
2022-07-14 04:31:03 +02:00
|
|
|
|
|
|
|
# hwservicemanager is using bootstrap bionic
|
|
|
|
use_bootstrap_libs(hwservicemanager)
|
2022-07-28 18:23:42 +02:00
|
|
|
|
|
|
|
# hwservicemanager is using apex_info via libvintf
|
|
|
|
use_apex_info(hwservicemanager)
|
2024-03-27 09:18:41 +01:00
|
|
|
|
|
|
|
# Note that we do not use the binder_* macros here.
|
|
|
|
# hwservicemanager provides name service (aka context manager)
|
|
|
|
# for hwbinder.
|
|
|
|
# Additionally, it initiates binder IPC calls to
|
|
|
|
# clients who request service notifications. The permission
|
|
|
|
# to do this is granted in the hwbinder_use macro.
|
|
|
|
allow hwservicemanager self:binder set_context_mgr;
|
|
|
|
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
|
|
allow hwservicemanager system_file:dir r_dir_perms;
|
|
|
|
|
|
|
|
# Read hwservice_contexts
|
|
|
|
allow hwservicemanager hwservice_contexts_file:file r_file_perms;
|
|
|
|
|
|
|
|
# Check SELinux permissions.
|
|
|
|
selinux_check_access(hwservicemanager)
|