Service context for servicemanager.

Create a service context for manager itself and allow servicemanager to
register itself. This is so that tools like dumpsys can reference
servicemanager the same way they would reference other services.

That things can still get ahold of the servicemanager directly via
libbinder APIs since it is a context manager.

Bug: 136027762
Test: dumpsys -l
Change-Id: If3d7aa5d5284c82840ed1877b969572ce0561d2e
This commit is contained in:
Steven Moreland 2019-10-16 16:30:26 -07:00
parent aaebc33e40
commit 48fbbbeae2
4 changed files with 5 additions and 0 deletions

View File

@ -20,6 +20,7 @@
mock_ota_prop
ota_metadata_file
art_apex_dir
service_manager_service
system_group_file
system_passwd_file
vendor_apex_file

View File

@ -167,6 +167,7 @@ sensorservice u:object_r:sensorservice_service:s0
sensor_privacy u:object_r:sensor_privacy_service:s0
serial u:object_r:serial_service:s0
servicediscovery u:object_r:servicediscovery_service:s0
manager u:object_r:service_manager_service:s0
settings u:object_r:settings_service:s0
shortcut u:object_r:shortcut_service:s0
simphonebook_msim u:object_r:radio_service:s0

View File

@ -25,6 +25,7 @@ type netd_service, service_manager_type;
type nfc_service, service_manager_type;
type radio_service, service_manager_type;
type secure_element_service, service_manager_type;
type service_manager_service, service_manager_type;
type storaged_service, service_manager_type;
type surfaceflinger_service, app_api_service, ephemeral_app_api_service, service_manager_type;
type system_app_service, service_manager_type;

View File

@ -21,5 +21,7 @@ allow servicemanager service_contexts_file:file r_file_perms;
# nonplat_service_contexts only accessible on non full-treble devices
not_full_treble(`allow servicemanager nonplat_service_contexts_file:file r_file_perms;')
add_service(servicemanager, service_manager_service)
# Check SELinux permissions.
selinux_check_access(servicemanager)