Alex Klyubin | 9b718c4 | 2017-02-17 14:51:02 -0800 | [diff] [blame] | 1 | # HwBinder IPC from client to server, and callbacks |
Robert Shih | 4968374 | 2022-01-19 23:34:37 -0800 | [diff] [blame] | 2 | binder_use(hal_drm_server) |
Alex Klyubin | 9b718c4 | 2017-02-17 14:51:02 -0800 | [diff] [blame] | 3 | binder_call(hal_drm_client, hal_drm_server) |
| 4 | binder_call(hal_drm_server, hal_drm_client) |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 5 | |
Steven Moreland | 9234e00 | 2018-06-06 09:30:18 -0700 | [diff] [blame] | 6 | hal_attribute_hwservice(hal_drm, hal_drm_hwservice) |
Robert Shih | 4968374 | 2022-01-19 23:34:37 -0800 | [diff] [blame] | 7 | hal_attribute_service(hal_drm, hal_drm_service) |
Alex Klyubin | 53656c1 | 2017-04-13 19:05:27 -0700 | [diff] [blame] | 8 | |
| 9 | allow hal_drm hidl_memory_hwservice:hwservice_manager find; |
| 10 | |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 11 | # Required by Widevine DRM (b/22990512) |
| 12 | allow hal_drm self:process execmem; |
| 13 | |
| 14 | # Permit reading device's serial number from system properties |
Robert Shih | 1bd70df | 2023-06-06 08:33:14 +0000 | [diff] [blame] | 15 | get_prop(hal_drm_server, serialno_prop) |
Kyle Zhang | 12c42b5 | 2023-09-28 21:10:17 +0000 | [diff] [blame] | 16 | # Permit reading force L3 system property |
| 17 | get_prop(hal_drm_server, drm_forcel3_prop) |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 18 | |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 19 | # Read files already opened under /data |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 20 | allow hal_drm system_data_file:file { getattr read }; |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 21 | |
| 22 | # Read access to pseudo filesystems |
| 23 | r_dir_file(hal_drm, cgroup) |
| 24 | allow hal_drm cgroup:dir { search write }; |
| 25 | allow hal_drm cgroup:file w_file_perms; |
| 26 | |
Marco Ballesio | aa4ce95 | 2021-02-11 15:18:11 -0800 | [diff] [blame] | 27 | r_dir_file(hal_drm, cgroup_v2) |
| 28 | allow hal_drm cgroup_v2:dir { search write }; |
| 29 | allow hal_drm cgroup_v2:file w_file_perms; |
| 30 | |
Edwin Wong | 9730877 | 2022-07-11 23:03:34 +0000 | [diff] [blame] | 31 | # Allow dumpsys Widevine without root |
Robert Shih | 0f48605 | 2024-02-07 18:29:27 +0000 | [diff] [blame] | 32 | allow hal_drm_server shell:fd use; |
| 33 | allow hal_drm_server shell:fifo_file write; |
Edwin Wong | 9730877 | 2022-07-11 23:03:34 +0000 | [diff] [blame] | 34 | |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 35 | # Allow access to ion memory allocation device |
Armelle Laine | acfeaa6 | 2025-02-27 22:17:51 -0800 | [diff] [blame] | 36 | allow { hal_drm -hal_widevine_system } ion_device:chr_file rw_file_perms; |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 37 | allow hal_drm hal_graphics_allocator:fd use; |
| 38 | |
Robert Shih | 0ade379 | 2020-04-10 16:50:11 -0700 | [diff] [blame] | 39 | # Allow access to hidl_memory allocation service |
| 40 | allow hal_drm hal_allocator_server:fd use; |
| 41 | |
Jeff Tinker | 3bc24e6 | 2017-04-25 12:31:43 -0700 | [diff] [blame] | 42 | # Allow access to fds allocated by mediaserver |
| 43 | allow hal_drm mediaserver:fd use; |
| 44 | |
Armelle Laine | acfeaa6 | 2025-02-27 22:17:51 -0800 | [diff] [blame] | 45 | allow { hal_drm -hal_widevine_system } sysfs:file r_file_perms; |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 46 | |
Armelle Laine | acfeaa6 | 2025-02-27 22:17:51 -0800 | [diff] [blame] | 47 | allow { hal_drm -hal_widevine_system } tee_device:chr_file rw_file_perms; |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 48 | |
Joel Galenson | 0608ab5 | 2019-06-05 10:09:05 -0700 | [diff] [blame] | 49 | allow hal_drm_server { appdomain -isolated_app }:fd use; |
| 50 | |
Kyle Zhang | e176886 | 2025-03-14 17:04:38 -0700 | [diff] [blame] | 51 | # Reduce the audit log spam caused by the Rikers anti-root check (b/393637335) |
Kyle Zhang | 5446e3c | 2025-03-06 22:11:03 -0800 | [diff] [blame] | 52 | dontaudit hal_drm system_userdir_file:dir search; |
Kyle Zhang | e176886 | 2025-03-14 17:04:38 -0700 | [diff] [blame] | 53 | dontaudit hal_drm system_data_file:dir search; |
Kyle Zhang | 5446e3c | 2025-03-06 22:11:03 -0800 | [diff] [blame] | 54 | |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 55 | # only allow unprivileged socket ioctl commands |
| 56 | allowxperm hal_drm self:{ rawip_socket tcp_socket udp_socket } |
| 57 | ioctl { unpriv_sock_ioctls unpriv_tty_ioctls }; |
| 58 | |
| 59 | ### |
| 60 | ### neverallow rules |
| 61 | ### |
| 62 | |
| 63 | # hal_drm should never execute any executable without a |
| 64 | # domain transition |
Jeff Vander Stoep | 6a28b68 | 2017-11-20 21:43:25 -0800 | [diff] [blame] | 65 | neverallow hal_drm_server { file_type fs_type }:file execute_no_trans; |
Jeff Tinker | c86f42b | 2017-01-01 12:01:18 -0800 | [diff] [blame] | 66 | |
| 67 | # do not allow privileged socket ioctl commands |
Jeff Vander Stoep | 6a28b68 | 2017-11-20 21:43:25 -0800 | [diff] [blame] | 68 | neverallowxperm hal_drm_server domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; |