5ee61a7628
microdroid's domains have been able to read/write any properties. That's just for convenience while bringing up microdroid. This cleans up such global permission and grants minimal access. Bug: 194447534 Test: atest MicrodroidHostTestCases ComposHostTestCases Test: run microdroid demo app Change-Id: I09ce1174d4af9c228b788a522a6ab845cafd4505
27 lines
928 B
Text
27 lines
928 B
Text
typeattribute hwservicemanager coredomain;
|
|
|
|
init_daemon_domain(hwservicemanager)
|
|
|
|
allow hwservicemanager vendor_configs_file:file { open getattr };
|
|
|
|
# Note that we do not use the binder_* macros here.
|
|
# hwservicemanager provides name service (aka context manager)
|
|
# for hwbinder.
|
|
# Additionally, it initiates binder IPC calls to
|
|
# clients who request service notifications. The permission
|
|
# to do this is granted in the hwbinder_use macro.
|
|
allow hwservicemanager self:binder set_context_mgr;
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
allow hwservicemanager system_file:dir r_dir_perms;
|
|
|
|
# Read hwservice_contexts
|
|
allow hwservicemanager hwservice_contexts_file:file r_file_perms;
|
|
|
|
# Check SELinux permissions.
|
|
selinux_check_access(hwservicemanager)
|
|
|
|
add_hwservice(hwservicemanager, hidl_manager_hwservice)
|
|
add_hwservice(hwservicemanager, hidl_token_hwservice)
|
|
|
|
set_prop(hwservicemanager, hwservicemanager_prop)
|