Skip to content
Snippets Groups Projects
Commit f7895a5e authored by Jeff Sharkey's avatar Jeff Sharkey Committed by Android (Google) Code Review
Browse files

Merge "Move vdc commands over to Binder."

parents bb03d751 06b1fd66
No related branches found
No related tags found
Loading
...@@ -8,16 +8,20 @@ ...@@ -8,16 +8,20 @@
type vdc, domain; type vdc, domain;
type vdc_exec, exec_type, file_type; type vdc_exec, exec_type, file_type;
# TODO: remove as part of 13758960
unix_socket_connect(vdc, vold, vold) unix_socket_connect(vdc, vold, vold)
# vdc sends information back to dumpstate when "adb bugreport" is used # vdc sends information back to dumpstate when "adb bugreport" is used
# TODO: remove as part of 13758960
allow vdc dumpstate:fd use; allow vdc dumpstate:fd use;
allow vdc dumpstate:unix_stream_socket { read write getattr }; allow vdc dumpstate:unix_stream_socket { read write getattr };
# vdc information is written to shell owned bugreport files # vdc information is written to shell owned bugreport files
# TODO: remove as part of 13758960
allow vdc shell_data_file:file { write getattr }; allow vdc shell_data_file:file { write getattr };
# Why? # Why?
# TODO: remove as part of 13758960
allow vdc dumpstate:unix_dgram_socket { read write }; allow vdc dumpstate:unix_dgram_socket { read write };
# vdc can be invoked with logwrapper, so let it write to pty # vdc can be invoked with logwrapper, so let it write to pty
...@@ -25,3 +29,8 @@ allow vdc devpts:chr_file rw_file_perms; ...@@ -25,3 +29,8 @@ allow vdc devpts:chr_file rw_file_perms;
# vdc writes directly to kmsg during the boot process # vdc writes directly to kmsg during the boot process
allow vdc kmsg_device:chr_file w_file_perms; allow vdc kmsg_device:chr_file w_file_perms;
# vdc talks to vold over Binder
binder_use(vdc)
binder_call(vdc, vold)
allow vdc vold_service:service_manager find;
...@@ -198,8 +198,8 @@ neverallow { domain -vold -init } vold_data_file:dir *; ...@@ -198,8 +198,8 @@ neverallow { domain -vold -init } vold_data_file:dir *;
neverallow { domain -vold -init -kernel } vold_data_file:notdevfile_class_set *; neverallow { domain -vold -init -kernel } vold_data_file:notdevfile_class_set *;
neverallow { domain -vold -init } restorecon_prop:property_service set; neverallow { domain -vold -init } restorecon_prop:property_service set;
# Only system_server can interact with vold over binder # Only system_server and vdc can interact with vold over binder
neverallow { domain -system_server -vold } vold_service:service_manager find; neverallow { domain -system_server -vdc -vold } vold_service:service_manager find;
neverallow vold { neverallow vold {
domain domain
-hal_keymaster -hal_keymaster
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment