mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
6b6e6bc3f463cf5a3a761672a5d5bcd0407ca2c3
These vendor domains use communicate with core domains over sockets, which is not permitted. This commit thus temporarily associates these domains with socket_between_core_and_vendor_violators attribute which permits this banned behavior to continue for now. This is a temporary workaround. The fix is to fix these domains to not communicate with core domains over sockets. NOTE: Some of the domains on the list are there for a benign reason: passthrough HALs. Core domains which host passthrough HAL implementations may initiate socket connections to vendor domains and this is completely permitted. I could've whitelisted all HAL client domains in the neverallow rules (using halclientdomain attribute) but this increases the risk of not noticing banned communications from these domains. Thus, as a workaround until we stop using passthrough HALs (b/34274385), I added the affected vendor domains to the list of exemptions. Test: mmm system/sepolicy Bug: 36577153 Change-Id: I4b1c0dd92b000cd802dfc2eed003ac8e4d7c6000
Description
No description provided
Languages
C++
54.8%
Makefile
33.2%
C
5.5%
Shell
4.6%
Python
1.3%
Other
0.6%