Skip to content
Snippets Groups Projects
Commit 49ce4394 authored by Alex Klyubin's avatar Alex Klyubin Committed by android-build-merger
Browse files

Vendor domains must not use Binder am: f5446eb1

am: 2fe065d7

Change-Id: Ieefcec5619fc2b941a675b473661dc561864ffc9
parents da6c88c9 2fe065d7
Branches
No related tags found
No related merge requests found
Showing with 36 additions and 28 deletions
# type_transition must be private policy the domain_trans rules could stay typeattribute lmkd coredomain;
# public, but conceptually should go with this
init_daemon_domain(lmkd) init_daemon_domain(lmkd)
# type_transition must be private policy the domain_trans rules could stay typeattribute logd coredomain;
# public, but conceptually should go with this
init_daemon_domain(logd) init_daemon_domain(logd)
# logd is not allowed to write anywhere other than /data/misc/logd, and then # logd is not allowed to write anywhere other than /data/misc/logd, and then
......
typeattribute logpersist coredomain;
# android debug log storage in logpersist domains (eng and userdebug only) # android debug log storage in logpersist domains (eng and userdebug only)
userdebug_or_eng(` userdebug_or_eng(`
......
# mdns daemon # mdns daemon
typeattribute mdnsd coredomain;
typeattribute mdnsd mlstrustedsubject; typeattribute mdnsd mlstrustedsubject;
type mdnsd_exec, exec_type, file_type; type mdnsd_exec, exec_type, file_type;
......
# type_transition must be private policy the domain_trans rules could stay typeattribute mediacodec coredomain;
# public, but conceptually should go with this
init_daemon_domain(mediacodec) init_daemon_domain(mediacodec)
# type_transition must be private policy the domain_trans rules could stay typeattribute mediadrmserver coredomain;
# public, but conceptually should go with this
init_daemon_domain(mediadrmserver) init_daemon_domain(mediadrmserver)
# type_transition must be private policy the domain_trans rules could stay typeattribute mediaextractor coredomain;
# public, but conceptually should go with this
init_daemon_domain(mediaextractor) init_daemon_domain(mediaextractor)
# type_transition must be private policy the domain_trans rules could stay typeattribute mediametrics coredomain;
# public, but conceptually should go with this
init_daemon_domain(mediametrics) init_daemon_domain(mediametrics)
# type_transition must be private policy the domain_trans rules could stay typeattribute mediaserver coredomain;
# public, but conceptually should go with this
init_daemon_domain(mediaserver) init_daemon_domain(mediaserver)
typeattribute modprobe coredomain;
# type_transition must be private policy the domain_trans rules could stay typeattribute mtp coredomain;
# public, but conceptually should go with this
init_daemon_domain(mtp) init_daemon_domain(mtp)
# type_transition must be private policy the domain_trans rules could stay typeattribute netd coredomain;
# public, but conceptually should go with this
init_daemon_domain(netd) init_daemon_domain(netd)
# Allow netd to spawn dnsmasq in it's own domain # Allow netd to spawn dnsmasq in it's own domain
......
# nfc subsystem # nfc subsystem
typeattribute nfc coredomain;
app_domain(nfc) app_domain(nfc)
net_domain(nfc) net_domain(nfc)
......
# type_transition must be private policy the domain_trans rules could stay typeattribute otapreopt_chroot coredomain;
# public, but conceptually should go with this
# Allow to transition to postinstall_ota, to run otapreopt in its own sandbox. # Allow to transition to postinstall_ota, to run otapreopt in its own sandbox.
domain_auto_trans(otapreopt_chroot, postinstall_file, postinstall_dexopt) domain_auto_trans(otapreopt_chroot, postinstall_file, postinstall_dexopt)
# type_transition must be private policy the domain_trans rules could stay typeattribute otapreopt_slot coredomain;
# public, but conceptually should go with this
# Technically not a daemon but we do want the transition from init domain to # Technically not a daemon but we do want the transition from init domain to
# cppreopts to occur. # cppreopts to occur.
init_daemon_domain(otapreopt_slot) init_daemon_domain(otapreopt_slot)
typeattribute performanced coredomain;
init_daemon_domain(performanced) init_daemon_domain(performanced)
...@@ -2,6 +2,7 @@ ...@@ -2,6 +2,7 @@
### Apps signed with the platform key. ### Apps signed with the platform key.
### ###
typeattribute platform_app coredomain;
typeattribute platform_app domain_deprecated; typeattribute platform_app domain_deprecated;
app_domain(platform_app) app_domain(platform_app)
......
# type_transition must be private policy the domain_trans rules could stay typeattribute postinstall coredomain;
# public, but conceptually should go with this
domain_auto_trans(postinstall, otapreopt_chroot_exec, otapreopt_chroot) domain_auto_trans(postinstall, otapreopt_chroot_exec, otapreopt_chroot)
# type_transition must be private policy the domain_trans rules could stay typeattribute postinstall_dexopt coredomain;
# public, but conceptually should go with this
# Run dex2oat/patchoat in its own sandbox. # Run dex2oat/patchoat in its own sandbox.
# We have to manually transition, as we don't have an entrypoint. # We have to manually transition, as we don't have an entrypoint.
domain_auto_trans(postinstall_dexopt, postinstall_file, dex2oat) domain_auto_trans(postinstall_dexopt, postinstall_file, dex2oat)
# type_transition must be private policy the domain_trans rules could stay typeattribute ppp coredomain;
# public, but conceptually should go with this
domain_auto_trans(mtp, ppp_exec, ppp) domain_auto_trans(mtp, ppp_exec, ppp)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment