blob: 99a3c8d4fdba34020bae3ab291b81df0ef3e2129 [file] [log] [blame]
timmylidf68b9b2024-10-07 09:40:24 +00001# Google Mediacodec
Ernie Hsu3b4a36a2024-07-17 10:04:25 +00002type mediacodec_google, domain;
3type mediacodec_google_exec, exec_type, vendor_file_type, file_type;
4
5init_daemon_domain(mediacodec_google)
6
Ernie Hsubbe999c2024-07-18 10:41:41 +00007hal_server_domain(mediacodec_google, hal_codec2)
8
9hal_client_domain(mediacodec_google, hal_graphics_allocator)
10
Ernie Hsu13883d92024-08-27 04:11:51 +000011add_service(mediacodec_google, eco_service)
timmylidf68b9b2024-10-07 09:40:24 +000012binder_call(mediacodec_google, hal_camera_default)
Ernie Hsu13883d92024-08-27 04:11:51 +000013
Ernie Hsubbe999c2024-07-18 10:41:41 +000014allow mediacodec_google dmabuf_system_heap_device:chr_file r_file_perms;
Ernie Hsua01bc1d2024-08-27 03:32:27 +000015allow mediacodec_google video_device:chr_file { read write open ioctl map };
Ernie Hsubbe999c2024-07-18 10:41:41 +000016
17# mediacodec_google should never execute any executable without a domain transition
18neverallow mediacodec_google { file_type fs_type }:file execute_no_trans;
19
20# Media processing code is inherently risky and thus should have limited
21# permissions and be isolated from the rest of the system and network.
22# Lengthier explanation here:
23# https://android-developers.googleblog.com/2016/05/hardening-media-stack.html
24neverallow mediacodec_google domain:{ udp_socket rawip_socket } *;
25neverallow mediacodec_google { domain userdebug_or_eng(`-su') }:tcp_socket *;
Ernie Hsu13883d92024-08-27 04:11:51 +000026
Ernie Hsud35b61f2024-08-28 09:16:37 +000027# Allow HAL to send trace packets to Perfetto
28userdebug_or_eng(`perfetto_producer(mediacodec_google)')
29
Ernie Hsu13883d92024-08-27 04:11:51 +000030userdebug_or_eng(`
31 allow mediacodec_google vendor_media_data_file:dir rw_dir_perms;
32 allow mediacodec_google vendor_media_data_file:file create_file_perms;
33')