Steven Moreland | 7baf725 | 2018-05-25 16:23:37 -0700 | [diff] [blame] | 1 | type mediacodec, domain, mlstrustedsubject; |
| 2 | type mediacodec_exec, exec_type, vendor_file_type, file_type; |
| 3 | |
| 4 | init_daemon_domain(mediacodec) |
| 5 | |
| 6 | not_full_treble(` |
| 7 | # on legacy devices, continue to allow /dev/binder traffic |
| 8 | binder_use(mediacodec) |
| 9 | binder_service(mediacodec) |
| 10 | add_service(mediacodec, mediacodec_service) |
| 11 | allow mediacodec mediametrics_service:service_manager find; |
| 12 | allow mediacodec surfaceflinger_service:service_manager find; |
| 13 | ') |
| 14 | |
Chong Zhang | bdbfff1 | 2018-09-20 12:07:44 -0700 | [diff] [blame] | 15 | # can route /dev/binder traffic to /dev/vndbinder |
| 16 | vndbinder_use(mediacodec) |
| 17 | |
Pawin Vongmasa | 609c243 | 2019-04-30 05:09:28 -0700 | [diff] [blame^] | 18 | hal_server_domain(mediacodec, hal_codec2) |
Steven Moreland | 7baf725 | 2018-05-25 16:23:37 -0700 | [diff] [blame] | 19 | hal_server_domain(mediacodec, hal_omx) |
| 20 | |
Pawin Vongmasa | 609c243 | 2019-04-30 05:09:28 -0700 | [diff] [blame^] | 21 | # mediacodec may use an input surface from a different Codec2 or OMX service |
| 22 | hal_client_domain(mediacodec, hal_codec2) |
| 23 | hal_client_domain(mediacodec, hal_omx) |
| 24 | |
Steven Moreland | 7baf725 | 2018-05-25 16:23:37 -0700 | [diff] [blame] | 25 | hal_client_domain(mediacodec, hal_allocator) |
Steven Moreland | 7baf725 | 2018-05-25 16:23:37 -0700 | [diff] [blame] | 26 | hal_client_domain(mediacodec, hal_graphics_allocator) |
Chong Zhang | bdbfff1 | 2018-09-20 12:07:44 -0700 | [diff] [blame] | 27 | |
| 28 | allow mediacodec gpu_device:chr_file rw_file_perms; |
Pawin Vongmasa | 609c243 | 2019-04-30 05:09:28 -0700 | [diff] [blame^] | 29 | allow mediacodec ion_device:chr_file rw_file_perms; |
Chong Zhang | bdbfff1 | 2018-09-20 12:07:44 -0700 | [diff] [blame] | 30 | allow mediacodec video_device:chr_file rw_file_perms; |
| 31 | allow mediacodec video_device:dir search; |
| 32 | |
Pawin Vongmasa | 609c243 | 2019-04-30 05:09:28 -0700 | [diff] [blame^] | 33 | crash_dump_fallback(mediacodec) |
| 34 | |
| 35 | # mediacodec should never execute any executable without a domain transition |
| 36 | neverallow mediacodec { file_type fs_type }:file execute_no_trans; |
| 37 | |
| 38 | # Media processing code is inherently risky and thus should have limited |
| 39 | # permissions and be isolated from the rest of the system and network. |
| 40 | # Lengthier explanation here: |
| 41 | # https://android-developers.googleblog.com/2016/05/hardening-media-stack.html |
| 42 | neverallow mediacodec domain:{ tcp_socket udp_socket rawip_socket } *; |
| 43 | |