Skip to content
Snippets Groups Projects
Commit 49ce4394 authored by Alex Klyubin's avatar Alex Klyubin Committed by android-build-merger
Browse files

Vendor domains must not use Binder am: f5446eb1

am: 2fe065d7

Change-Id: Ieefcec5619fc2b941a675b473661dc561864ffc9
parents da6c88c9 2fe065d7
Branches
No related tags found
No related merge requests found
Showing
with 37 additions and 27 deletions
# type_transition must be private policy the domain_trans rules could stay typeattribute drmserver coredomain;
# public, but conceptually should go with this
init_daemon_domain(drmserver) init_daemon_domain(drmserver)
type_transition drmserver apk_data_file:sock_file drmserver_socket; type_transition drmserver apk_data_file:sock_file drmserver_socket;
# type_transition must be private policy the domain_trans rules could stay typeattribute dumpstate coredomain;
# public, but conceptually should go with this
init_daemon_domain(dumpstate) init_daemon_domain(dumpstate)
# Execute and transition to the vdc domain # Execute and transition to the vdc domain
......
...@@ -11,6 +11,8 @@ ...@@ -11,6 +11,8 @@
### ###
### PackageManager flags an app as ephemeral at install time. ### PackageManager flags an app as ephemeral at install time.
typeattribute ephemeral_app coredomain;
net_domain(ephemeral_app) net_domain(ephemeral_app)
app_domain(ephemeral_app) app_domain(ephemeral_app)
......
# type_transition must be private policy the domain_trans rules could stay typeattribute fingerprintd coredomain;
# public, but conceptually should go with this
init_daemon_domain(fingerprintd) init_daemon_domain(fingerprintd)
# type_transition must be private policy the domain_trans rules could stay typeattribute fsck coredomain;
# public, but conceptually should go with this
init_daemon_domain(fsck) init_daemon_domain(fsck)
typeattribute fsck_untrusted coredomain;
# type_transition must be private policy the domain_trans rules could stay typeattribute gatekeeperd coredomain;
# public, but conceptually should go with this
init_daemon_domain(gatekeeperd) init_daemon_domain(gatekeeperd)
type hal_allocator_default, domain; type hal_allocator_default, domain, coredomain;
hal_server_domain(hal_allocator_default, hal_allocator) hal_server_domain(hal_allocator_default, hal_allocator)
type hal_allocator_default_exec, exec_type, file_type; type hal_allocator_default_exec, exec_type, file_type;
......
# type_transition must be private policy the domain_trans rules could stay typeattribute healthd coredomain;
# public, but conceptually should go with this
init_daemon_domain(healthd) init_daemon_domain(healthd)
# Allow callback to storaged batteryproperties listener # Allow callback to storaged batteryproperties listener
......
# type_transition must be private policy the domain_trans rules could stay typeattribute hwservicemanager coredomain;
# public, but conceptually should go with this
init_daemon_domain(hwservicemanager) init_daemon_domain(hwservicemanager)
typeattribute idmap coredomain;
typeattribute incident coredomain;
type incident_exec, exec_type, file_type; type incident_exec, exec_type, file_type;
# switch to incident domain for incident command # switch to incident domain for incident command
......
typeattribute incidentd coredomain;
init_daemon_domain(incidentd) init_daemon_domain(incidentd)
type incidentd_exec, exec_type, file_type; type incidentd_exec, exec_type, file_type;
binder_use(incidentd) binder_use(incidentd)
......
# type_transition must be private policy the domain_trans rules could stay typeattribute init coredomain;
# public, but conceptually should go with this
tmpfs_domain(init) tmpfs_domain(init)
# Transitions to seclabel processes in init.rc # Transitions to seclabel processes in init.rc
......
# type_transition must be private policy the domain_trans rules could stay typeattribute inputflinger coredomain;
# public, but conceptually should go with this
init_daemon_domain(inputflinger) init_daemon_domain(inputflinger)
# type_transition must be private policy the domain_trans rules could stay typeattribute install_recovery coredomain;
# public, but conceptually should go with this
init_daemon_domain(install_recovery) init_daemon_domain(install_recovery)
# type_transition must be private policy the domain_trans rules could stay typeattribute installd coredomain;
# public, but conceptually should go with this
init_daemon_domain(installd) init_daemon_domain(installd)
# Run dex2oat in its own sandbox. # Run dex2oat in its own sandbox.
......
...@@ -6,6 +6,8 @@ ...@@ -6,6 +6,8 @@
### and AID_ISOLATED_END (99999). ### and AID_ISOLATED_END (99999).
### ###
typeattribute isolated_app coredomain;
app_domain(isolated_app) app_domain(isolated_app)
# Access already open app data files received over Binder or local socket IPC. # Access already open app data files received over Binder or local socket IPC.
......
# type_transition must be private policy the domain_trans rules could stay typeattribute kernel coredomain;
# public, but conceptually should go with this
domain_auto_trans(kernel, init_exec, init) domain_auto_trans(kernel, init_exec, init)
# type_transition must be private policy the domain_trans rules could stay typeattribute keystore coredomain;
# public, but conceptually should go with this
init_daemon_domain(keystore) init_daemon_domain(keystore)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment