Tri Vo | bc8dc3a | 2019-05-26 13:17:08 -0700 | [diff] [blame^] | 1 | # mediaserver - multimedia daemon |
| 2 | type mediaserver, domain; |
| 3 | type mediaserver_exec, system_file_type, exec_type, file_type; |
| 4 | type mediaserver_tmpfs, file_type; |
| 5 | |
| 6 | typeattribute mediaserver mlstrustedsubject; |
| 7 | |
| 8 | net_domain(mediaserver) |
| 9 | |
| 10 | r_dir_file(mediaserver, sdcard_type) |
| 11 | r_dir_file(mediaserver, cgroup) |
| 12 | |
| 13 | # stat /proc/self |
| 14 | allow mediaserver proc:lnk_file getattr; |
| 15 | |
| 16 | # open /vendor/lib/mediadrm |
| 17 | allow mediaserver system_file:dir r_dir_perms; |
| 18 | |
| 19 | userdebug_or_eng(` |
| 20 | # ptrace to processes in the same domain for memory leak detection |
| 21 | allow mediaserver self:process ptrace; |
| 22 | ') |
| 23 | |
| 24 | binder_use(mediaserver) |
| 25 | binder_call(mediaserver, binderservicedomain) |
| 26 | binder_call(mediaserver, appdomain) |
| 27 | binder_service(mediaserver) |
| 28 | |
| 29 | allow mediaserver media_data_file:dir create_dir_perms; |
| 30 | allow mediaserver media_data_file:file create_file_perms; |
| 31 | allow mediaserver { app_data_file privapp_data_file }:file { append getattr ioctl lock map read write }; |
| 32 | allow mediaserver sdcard_type:file write; |
| 33 | allow mediaserver gpu_device:chr_file rw_file_perms; |
| 34 | allow mediaserver video_device:dir r_dir_perms; |
| 35 | allow mediaserver video_device:chr_file rw_file_perms; |
| 36 | |
| 37 | set_prop(mediaserver, audio_prop) |
| 38 | |
| 39 | # Read resources from open apk files passed over Binder. |
| 40 | allow mediaserver apk_data_file:file { read getattr }; |
| 41 | allow mediaserver asec_apk_file:file { read getattr }; |
| 42 | allow mediaserver ringtone_file:file { read getattr }; |
| 43 | |
| 44 | # Read /data/data/com.android.providers.telephony files passed over Binder. |
| 45 | allow mediaserver radio_data_file:file { read getattr }; |
| 46 | |
| 47 | # Use pipes passed over Binder from app domains. |
| 48 | allow mediaserver appdomain:fifo_file { getattr read write }; |
| 49 | |
| 50 | allow mediaserver rpmsg_device:chr_file rw_file_perms; |
| 51 | |
| 52 | # Inter System processes communicate over named pipe (FIFO) |
| 53 | allow mediaserver system_server:fifo_file r_file_perms; |
| 54 | |
| 55 | r_dir_file(mediaserver, media_rw_data_file) |
| 56 | |
| 57 | # Grant access to read files on appfuse. |
| 58 | allow mediaserver app_fuse_file:file { read getattr }; |
| 59 | |
| 60 | # Needed on some devices for playing DRM protected content, |
| 61 | # but seems expected and appropriate for all devices. |
| 62 | unix_socket_connect(mediaserver, drmserver, drmserver) |
| 63 | |
| 64 | # Needed on some devices for playing audio on paired BT device, |
| 65 | # but seems appropriate for all devices. |
| 66 | unix_socket_connect(mediaserver, bluetooth, bluetooth) |
| 67 | |
| 68 | add_service(mediaserver, mediaserver_service) |
| 69 | allow mediaserver activity_service:service_manager find; |
| 70 | allow mediaserver appops_service:service_manager find; |
| 71 | allow mediaserver audio_service:service_manager find; |
| 72 | allow mediaserver audioserver_service:service_manager find; |
| 73 | allow mediaserver cameraserver_service:service_manager find; |
| 74 | allow mediaserver batterystats_service:service_manager find; |
| 75 | allow mediaserver drmserver_service:service_manager find; |
| 76 | allow mediaserver mediaextractor_service:service_manager find; |
| 77 | allow mediaserver mediacodec_service:service_manager find; |
| 78 | allow mediaserver mediametrics_service:service_manager find; |
| 79 | allow mediaserver media_session_service:service_manager find; |
| 80 | allow mediaserver permission_service:service_manager find; |
| 81 | allow mediaserver power_service:service_manager find; |
| 82 | allow mediaserver processinfo_service:service_manager find; |
| 83 | allow mediaserver scheduling_policy_service:service_manager find; |
| 84 | allow mediaserver surfaceflinger_service:service_manager find; |
| 85 | |
| 86 | # for ModDrm/MediaPlayer |
| 87 | allow mediaserver mediadrmserver_service:service_manager find; |
| 88 | |
| 89 | # For interfacing with OMX HAL |
| 90 | allow mediaserver hidl_token_hwservice:hwservice_manager find; |
| 91 | |
| 92 | # /oem access |
| 93 | allow mediaserver oemfs:dir search; |
| 94 | allow mediaserver oemfs:file r_file_perms; |
| 95 | |
| 96 | # /vendor apk access |
| 97 | allow mediaserver vendor_app_file:file { read map getattr }; |
| 98 | |
| 99 | use_drmservice(mediaserver) |
| 100 | allow mediaserver drmserver:drmservice { |
| 101 | consumeRights |
| 102 | setPlaybackStatus |
| 103 | openDecryptSession |
| 104 | closeDecryptSession |
| 105 | initializeDecryptUnit |
| 106 | decrypt |
| 107 | finalizeDecryptUnit |
| 108 | pread |
| 109 | }; |
| 110 | |
| 111 | # only allow unprivileged socket ioctl commands |
| 112 | allowxperm mediaserver self:{ rawip_socket tcp_socket udp_socket } |
| 113 | ioctl { unpriv_sock_ioctls unpriv_tty_ioctls }; |
| 114 | |
| 115 | # Access to /data/media. |
| 116 | # This should be removed if sdcardfs is modified to alter the secontext for its |
| 117 | # accesses to the underlying FS. |
| 118 | allow mediaserver media_rw_data_file:dir create_dir_perms; |
| 119 | allow mediaserver media_rw_data_file:file create_file_perms; |
| 120 | |
| 121 | # Access to media in /data/preloads |
| 122 | allow mediaserver preloads_media_file:file { getattr read ioctl }; |
| 123 | |
| 124 | allow mediaserver ion_device:chr_file r_file_perms; |
| 125 | allow mediaserver hal_graphics_allocator:fd use; |
| 126 | allow mediaserver hal_graphics_composer:fd use; |
| 127 | allow mediaserver hal_camera:fd use; |
| 128 | |
| 129 | allow mediaserver system_server:fd use; |
| 130 | |
| 131 | # b/120491318 allow mediaserver to access void:fd |
| 132 | allow mediaserver vold:fd use; |
| 133 | |
| 134 | hal_client_domain(mediaserver, hal_allocator) |
| 135 | |
| 136 | ### |
| 137 | ### neverallow rules |
| 138 | ### |
| 139 | |
| 140 | # mediaserver should never execute any executable without a |
| 141 | # domain transition |
| 142 | neverallow mediaserver { file_type fs_type }:file execute_no_trans; |
| 143 | |
| 144 | # do not allow privileged socket ioctl commands |
| 145 | neverallowxperm mediaserver domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; |