blob: 5605c4d7c70e7acc56ff832353bd9dabe95181d3 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute hwservicemanager coredomain;
2
dcashmancc39f632016-07-22 13:13:11 -07003init_daemon_domain(hwservicemanager)
Alex Klyubin53656c12017-04-13 19:05:27 -07004
5add_hwservice(hwservicemanager, hidl_manager_hwservice)
6add_hwservice(hwservicemanager, hidl_token_hwservice)
Steven Moreland13c39462017-10-05 18:49:23 -07007
Tom Cherry7b8be352018-05-03 17:00:16 -07008set_prop(hwservicemanager, ctl_interface_start_prop)
Inseob Kim55e5c9b2020-03-04 17:20:35 +09009set_prop(hwservicemanager, hwservicemanager_prop)
Jooyung Han133ca4e2022-07-14 11:31:03 +090010
11# hwservicemanager is using bootstrap bionic
12use_bootstrap_libs(hwservicemanager)
Rob Seymourecbadbb2022-07-28 16:23:42 +000013
14# hwservicemanager is using apex_info via libvintf
15use_apex_info(hwservicemanager)
Inseob Kim75806ef2024-03-27 17:18:41 +090016
17# Note that we do not use the binder_* macros here.
18# hwservicemanager provides name service (aka context manager)
19# for hwbinder.
20# Additionally, it initiates binder IPC calls to
21# clients who request service notifications. The permission
22# to do this is granted in the hwbinder_use macro.
23allow hwservicemanager self:binder set_context_mgr;
24
25# Scan through /system/lib64/hw looking for installed HALs
26allow hwservicemanager system_file:dir r_dir_perms;
27
28# Read hwservice_contexts
29allow hwservicemanager hwservice_contexts_file:file r_file_perms;
30
31# Check SELinux permissions.
32selinux_check_access(hwservicemanager)