This website requires JavaScript.
Explore
Help
Sign In
PWN-Hunter
/
android_system_sepolicy
Watch
1
Star
0
Fork
0
You've already forked android_system_sepolicy
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
49e3bbdb1d
android_system_sepolicy
/
private
/
idmap.te
4 lines
59 B
Plaintext
Raw
Normal View
History
Unescape
Escape
Vendor domains must not use Binder On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor apps) are not permitted to use Binder. This commit thus: * groups non-vendor domains using the new "coredomain" attribute, * adds neverallow rules restricting Binder use to coredomain and appdomain only, and * temporarily exempts the domains which are currently violating this rule from this restriction. These domains are grouped using the new "binder_in_vendor_violators" attribute. The attribute is needed because the types corresponding to violators are not exposed to the public policy where the neverallow rules are. Test: mmm system/sepolicy Test: Device boots, no new denials Test: In Chrome, navigate to ip6.me, play a YouTube video Test: YouTube: play a video Test: Netflix: play a movie Test: Google Camera: take a photo, take an HDR+ photo, record video with sound, record slow motion video with sound. Confirm videos play back fine and with sound. Bug: 35870313 Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
2017-03-23 14:27:32 -07:00
typeattribute idmap coredomain;
Add idmap2 and idmap2d Bug: 78815803 Test: builds, boots Test: manual: adb shell idmap2 create ... Test: manual: adb shell ps | grep -e idmap2d Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
2018-06-14 23:08:19 -07:00
init_daemon_domain(idmap)
Reference in New Issue
Copy Permalink