Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 1 | # HwBinder IPC from client to server, and callbacks |
| 2 | binder_call(hal_cas_client, hal_cas_server) |
| 3 | binder_call(hal_cas_server, hal_cas_client) |
| 4 | |
Steven Moreland | 9234e00 | 2018-06-06 09:30:18 -0700 | [diff] [blame] | 5 | hal_attribute_hwservice(hal_cas, hal_cas_hwservice) |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 6 | allow hal_cas_server hidl_memory_hwservice:hwservice_manager find; |
| 7 | |
| 8 | # Permit reading device's serial number from system properties |
Jeff Vander Stoep | 6a28b68 | 2017-11-20 21:43:25 -0800 | [diff] [blame] | 9 | get_prop(hal_cas_server, serialno_prop) |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 10 | |
| 11 | # Read files already opened under /data |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 12 | allow hal_cas system_data_file:file { getattr read }; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 13 | |
| 14 | # Read access to pseudo filesystems |
| 15 | r_dir_file(hal_cas, cgroup) |
| 16 | allow hal_cas cgroup:dir { search write }; |
| 17 | allow hal_cas cgroup:file w_file_perms; |
| 18 | |
Marco Ballesio | aa4ce95 | 2021-02-11 15:18:11 -0800 | [diff] [blame^] | 19 | r_dir_file(hal_cas, cgroup_v2) |
| 20 | allow hal_cas cgroup_v2:dir { search write }; |
| 21 | allow hal_cas cgroup_v2:file w_file_perms; |
| 22 | |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 23 | # Allow access to ion memory allocation device |
| 24 | allow hal_cas ion_device:chr_file rw_file_perms; |
| 25 | allow hal_cas hal_graphics_allocator:fd use; |
| 26 | |
| 27 | allow hal_cas tee_device:chr_file rw_file_perms; |
| 28 | |
| 29 | ### |
| 30 | ### neverallow rules |
| 31 | ### |
| 32 | |
| 33 | # hal_cas should never execute any executable without a |
| 34 | # domain transition |
Jeff Vander Stoep | 6a28b68 | 2017-11-20 21:43:25 -0800 | [diff] [blame] | 35 | neverallow hal_cas_server { file_type fs_type }:file execute_no_trans; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 36 | |
| 37 | # do not allow privileged socket ioctl commands |
Jeff Vander Stoep | 6a28b68 | 2017-11-20 21:43:25 -0800 | [diff] [blame] | 38 | neverallowxperm hal_cas_server domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; |