336d0fed4e
I took current AOSP policy as base, then removed sepolicy so that the set of type and attributes was a subset of types and attributes in Q sepolicy, with exception of those that have not yet been cleand up in current AOSP: mediaswcodec_server netd_socket mediaextractor_update_service thermalserviced thermalserviced_exec Bug: 133196056 Test: n/a Change-Id: I863429d61d3fad0272c1d3f1e429cd997513a74a Merged-In: I3e091652fa8d1757b1f71f7559186d5b32f000d5
22 lines
852 B
Text
22 lines
852 B
Text
# hwservicemanager - the Binder context manager for HAL services
|
|
type hwservicemanager, domain, mlstrustedsubject;
|
|
type hwservicemanager_exec, system_file_type, exec_type, file_type;
|
|
|
|
# Note that we do not use the binder_* macros here.
|
|
# hwservicemanager provides name service (aka context manager)
|
|
# for hwbinder.
|
|
# Additionally, it initiates binder IPC calls to
|
|
# clients who request service notifications. The permission
|
|
# to do this is granted in the hwbinder_use macro.
|
|
allow hwservicemanager self:binder set_context_mgr;
|
|
|
|
set_prop(hwservicemanager, hwservicemanager_prop)
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
allow hwservicemanager system_file:dir r_dir_perms;
|
|
|
|
# Read hwservice_contexts
|
|
allow hwservicemanager hwservice_contexts_file:file r_file_perms;
|
|
|
|
# Check SELinux permissions.
|
|
selinux_check_access(hwservicemanager)
|