blob: f8986de0c81c69aedb1430e968cba8425776212e [file] [log] [blame]
Marco Nelissenc3ba2e52016-02-02 16:10:37 -08001# mediacodec - audio and video codecs live here
2type mediacodec, domain;
3type mediacodec_exec, exec_type, file_type;
4
5typeattribute mediacodec mlstrustedsubject;
6
Marco Nelissenc3ba2e52016-02-02 16:10:37 -08007binder_use(mediacodec)
8binder_call(mediacodec, binderservicedomain)
9binder_call(mediacodec, appdomain)
10binder_service(mediacodec)
11
William Roberts606d2fd2017-01-19 13:23:52 -080012add_service(mediacodec, mediacodec_service)
Ray Essick39185402017-01-24 12:53:45 -080013allow mediacodec mediametrics_service:service_manager find;
Marco Nelissen6c53b232016-02-27 21:25:03 -080014allow mediacodec surfaceflinger_service:service_manager find;
Marco Nelissenc3ba2e52016-02-02 16:10:37 -080015allow mediacodec gpu_device:chr_file rw_file_perms;
16allow mediacodec video_device:chr_file rw_file_perms;
Robb Glasserb7a76e92016-02-11 10:33:57 -080017allow mediacodec video_device:dir search;
Marco Nelissenebf79f82016-02-24 10:03:25 -080018allow mediacodec ion_device:chr_file rw_file_perms;
Chia-I Wudd958e52016-10-12 06:38:00 -070019allow mediacodec hal_graphics_allocator:fd use;
Marco Nelissenc3ba2e52016-02-02 16:10:37 -080020
Pawin Vongmasa5559d212017-01-24 02:45:16 -080021# hidl access
22hwbinder_use(mediacodec)
23hwallocator_use(mediacodec)
24allow mediacodec system_file:dir { open read };
25
Marco Nelissenc3ba2e52016-02-02 16:10:37 -080026###
27### neverallow rules
28###
29
30# mediacodec should never execute any executable without a
31# domain transition
32neverallow mediacodec { file_type fs_type }:file execute_no_trans;
33
Nick Kralevich38c12822017-02-16 12:34:51 -080034# The goal of the mediaserver split is to place media processing code into
35# restrictive sandboxes with limited responsibilities and thus limited
36# permissions. Example: Audioserver is only responsible for controlling audio
37# hardware and processing audio content. Cameraserver does the same for camera
38# hardware/content. Etc.
39#
40# Media processing code is inherently risky and thus should have limited
41# permissions and be isolated from the rest of the system and network.
42# Lengthier explanation here:
43# https://android-developers.googleblog.com/2016/05/hardening-media-stack.html
Jeff Vander Stoep21f77f62016-04-22 15:34:40 -070044neverallow mediacodec domain:{ tcp_socket udp_socket rawip_socket } *;