Commit graph

6 commits

Author SHA1 Message Date
Andrew Walbran
ae84b86799 virtualizationservice will clear its own temporary directory.
This means that toolbox doesn't need permission to delete it.

Bug: 192917795
Bug: 193365943
Test: flashed on a VIM3L and booted
Change-Id: Ic0182c1c4eb84eb94f4db27d00effcd906ebed09
2021-07-14 16:56:51 +00:00
Andrew Walbran
dc5f1a90db Allow more permissions for removing VirtualizationService data directory.
Bug: 192506182
Bug: 184131523
Test: mm
Change-Id: I40c94f124d55508d038346d7dd3234cad428819a
2021-07-01 10:12:03 +00:00
Andrew Walbran
0b70b863cf Allow gettattr on VirtualizationService data directory too.
Bug: 191834767
Bug: 184131523
Test: mm
Change-Id: I9318a67a31b4ddb5a421211775bf0b2958880f2f
2021-06-24 14:26:07 +00:00
Andrew Walbran
eb21b41c90 Allow init to clear VirtualizationService data directory.
Bug: 184131523
Bug: 189725484
Test: mm
Change-Id: Ie4f38266e32c64b52f55da2c6d3fc9e4c1a4c572
2021-06-02 14:05:28 +00:00
Alex Klyubin
f5446eb148 Vendor domains must not use Binder
On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
apps) are not permitted to use Binder. This commit thus:
* groups non-vendor domains using the new "coredomain" attribute,
* adds neverallow rules restricting Binder use to coredomain and
  appdomain only, and
* temporarily exempts the domains which are currently violating this
  rule from this restriction. These domains are grouped using the new
  "binder_in_vendor_violators" attribute. The attribute is needed
  because the types corresponding to violators are not exposed to the
  public policy where the neverallow rules are.

Test: mmm system/sepolicy
Test: Device boots, no new denials
Test: In Chrome, navigate to ip6.me, play a YouTube video
Test: YouTube: play a video
Test: Netflix: play a movie
Test: Google Camera: take a photo, take an HDR+ photo, record video with
      sound, record slow motion video with sound. Confirm videos play
      back fine and with sound.
Bug: 35870313
Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
2017-03-24 07:54:00 -07:00
dcashman
cc39f63773 Split general policy into public and private components.
Divide policy into public and private components.  This is the first
step in splitting the policy creation for platform and non-platform
policies.  The policy in the public directory will be exported for use
in non-platform policy creation.  Backwards compatibility with it will
be achieved by converting the exported policy into attribute-based
policy when included as part of the non-platform policy and a mapping
file will be maintained to be included with the platform policy that
maps exported attributes of previous versions to the current platform
version.

Eventually we would like to create a clear interface between the
platform and non-platform device components so that the exported policy,
and the need for attributes is minimal.  For now, almost all types and
avrules are left in public.

Test: Tested by building policy and running on device.

Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
2016-10-06 13:09:06 -07:00