391854000a
reflect the change from "mediaanalytics" to "mediametrics" Also incorporates a broader access to the service -- e.g. anyone. This reflects that a number of metrics submissions come from application space and not only from our controlled, trusted media related processes. The metrics service (in another commit) checks on the source of any incoming metrics data and limits what is allowed from unprivileged clients. Bug: 34615027 Test: clean build, service running and accessible Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
40 lines
1.2 KiB
Text
40 lines
1.2 KiB
Text
# nfc subsystem
|
|
type nfc, domain;
|
|
|
|
net_domain(nfc)
|
|
binder_service(nfc)
|
|
|
|
# hwbinder access
|
|
hwbinder_use(nfc)
|
|
|
|
# Set NFC properties
|
|
set_prop(nfc, nfc_prop)
|
|
|
|
# NFC device access.
|
|
allow nfc nfc_device:chr_file rw_file_perms;
|
|
|
|
# Data file accesses.
|
|
allow nfc nfc_data_file:dir create_dir_perms;
|
|
allow nfc nfc_data_file:notdevfile_class_set create_file_perms;
|
|
|
|
# SoundPool loading and playback
|
|
allow nfc audioserver_service:service_manager find;
|
|
allow nfc drmserver_service:service_manager find;
|
|
allow nfc mediacodec_service:service_manager find;
|
|
allow nfc mediametrics_service:service_manager find;
|
|
allow nfc mediaextractor_service:service_manager find;
|
|
allow nfc mediaserver_service:service_manager find;
|
|
|
|
allow nfc nfc_service:service_manager { add find };
|
|
allow nfc radio_service:service_manager find;
|
|
allow nfc surfaceflinger_service:service_manager find;
|
|
allow nfc app_api_service:service_manager find;
|
|
allow nfc system_api_service:service_manager find;
|
|
|
|
# already open bugreport file descriptors may be shared with
|
|
# the nfc process, from a file in
|
|
# /data/data/com.android.shell/files/bugreports/bugreport-*.
|
|
allow nfc shell_data_file:file read;
|
|
|
|
# allow NFC process to call into the NFC HAL
|
|
binder_call(nfc, hal_nfc)
|