e91cbcba4e
Test: no neverallows triggered Bug: 36494354 Change-Id: I52e21a9be5400027d4e96a8befdd4faaffb06a93
23 lines
939 B
Text
23 lines
939 B
Text
# hwservicemanager - the Binder context manager for HAL services
|
|
type hwservicemanager, domain, mlstrustedsubject;
|
|
type hwservicemanager_exec, exec_type, file_type;
|
|
|
|
# serving android.hidl.manager@1.0 and android.hidl.token@1.0
|
|
typeattribute hwservicemanager halserverdomain;
|
|
|
|
# Note that we do not use the binder_* macros here.
|
|
# hwservicemanager provides name service (aka context manager)
|
|
# for hwbinder.
|
|
# Additionally, it initiates binder IPC calls to
|
|
# clients who request service notifications. The permission
|
|
# to do this is granted in the hwbinder_use macro.
|
|
allow hwservicemanager self:binder set_context_mgr;
|
|
|
|
set_prop(hwservicemanager, hwservicemanager_prop)
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
allow hwservicemanager system_file:dir r_dir_perms;
|
|
|
|
# TODO once hwservicemanager checks whether HALs are
|
|
# allowed to register a certain service, add policy here
|
|
# for allowing to check SELinux permissions.
|