Skip to content
Snippets Groups Projects
  • Alex Klyubin's avatar
    Vendor domains must not use Binder · f5446eb1
    Alex Klyubin authored
    On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
    apps) are not permitted to use Binder. This commit thus:
    * groups non-vendor domains using the new "coredomain" attribute,
    * adds neverallow rules restricting Binder use to coredomain and
      appdomain only, and
    * temporarily exempts the domains which are currently violating this
      rule from this restriction. These domains are grouped using the new
      "binder_in_vendor_violators" attribute. The attribute is needed
      because the types corresponding to violators are not exposed to the
      public policy where the neverallow rules are.
    
    Test: mmm system/sepolicy
    Test: Device boots, no new denials
    Test: In Chrome, navigate to ip6.me, play a YouTube video
    Test: YouTube: play a video
    Test: Netflix: play a movie
    Test: Google Camera: take a photo, take an HDR+ photo, record video with
          sound, record slow motion video with sound. Confirm videos play
          back fine and with sound.
    Bug: 35870313
    Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
    f5446eb1
atrace.te 713 B
# Domain for atrace process spawned by boottrace service.

type atrace_exec, exec_type, file_type;

userdebug_or_eng(`
  type atrace, domain, coredomain, domain_deprecated;

  init_daemon_domain(atrace)

  # boottrace services uses /data/misc/boottrace/categories
  allow atrace boottrace_data_file:dir search;
  allow atrace boottrace_data_file:file r_file_perms;

  # atrace reads the files in /sys/kernel/debug/tracing/
  allow atrace debugfs_tracing:file r_file_perms;

  # atrace sets debug.atrace.* properties
  set_prop(atrace, debug_prop)

  # atrace pokes all the binder-enabled processes at startup.
  binder_use(atrace)
  allow atrace healthd:binder call;
  allow atrace surfaceflinger:binder call;
')