2016-05-24 15:15:23 +02:00
|
|
|
# hwservicemanager - the Binder context manager for HAL services
|
|
|
|
type hwservicemanager, domain, mlstrustedsubject;
|
2018-09-27 19:21:37 +02:00
|
|
|
type hwservicemanager_exec, system_file_type, exec_type, file_type;
|
2016-05-24 15:15:23 +02:00
|
|
|
|
|
|
|
# Note that we do not use the binder_* macros here.
|
2016-12-15 19:46:22 +01:00
|
|
|
# hwservicemanager provides name service (aka context manager)
|
|
|
|
# for hwbinder.
|
|
|
|
# Additionally, it initiates binder IPC calls to
|
|
|
|
# clients who request service notifications. The permission
|
|
|
|
# to do this is granted in the hwbinder_use macro.
|
2016-05-24 15:15:23 +02:00
|
|
|
allow hwservicemanager self:binder set_context_mgr;
|
|
|
|
|
2016-09-20 00:23:41 +02:00
|
|
|
set_prop(hwservicemanager, hwservicemanager_prop)
|
|
|
|
|
2016-11-26 03:00:38 +01:00
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
|
|
allow hwservicemanager system_file:dir r_dir_perms;
|
|
|
|
|
2017-04-08 01:14:43 +02:00
|
|
|
# Read hwservice_contexts
|
|
|
|
allow hwservicemanager hwservice_contexts_file:file r_file_perms;
|
|
|
|
|
|
|
|
# Check SELinux permissions.
|
|
|
|
selinux_check_access(hwservicemanager)
|