blob: 2ad0502165941df20d75fd9bd7b27f47137d1071 [file] [log] [blame]
Martijn Coenene7d8f4c2017-03-21 16:01:52 -07001# vndservicemanager - the Binder context manager for vendor processes
Sandeep Patil2ee66e72017-04-10 13:03:28 -07002type vndservicemanager_exec, exec_type, vendor_file_type, file_type;
Martijn Coenene7d8f4c2017-03-21 16:01:52 -07003
4init_daemon_domain(vndservicemanager);
5
6allow vndservicemanager self:binder set_context_mgr;
7
8# transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
Tom Cherrya0998302018-02-09 11:31:56 -08009allow vndservicemanager { domain -coredomain -init -vendor_init }:binder transfer;
Martijn Coenene7d8f4c2017-03-21 16:01:52 -070010
11allow vndservicemanager vndbinder_device:chr_file rw_file_perms;
12
Martijn Coenen6676c232017-03-31 17:29:53 -070013# Read vndservice_contexts
14allow vndservicemanager vndservice_contexts_file:file r_file_perms;
15
Steven Moreland52a96cc2020-03-05 09:41:37 -080016add_service(vndservicemanager, service_manager_vndservice)
17
Jon Spivackb58c4c22019-08-19 16:05:13 -070018# Start lazy services
19set_prop(vndservicemanager, ctl_interface_start_prop)
20
Martijn Coenene7d8f4c2017-03-21 16:01:52 -070021# Check SELinux permissions.
22selinux_check_access(vndservicemanager)
Steven Moreland5c3f3152022-06-08 22:34:15 +000023
24# Log to kmesg
25allow vndservicemanager kmsg_device:chr_file rw_file_perms;