1*e4a36f41SAndroid Build Coastguard Worker# mediaserver - multimedia daemon 2*e4a36f41SAndroid Build Coastguard Workertype mediaserver, domain; 3*e4a36f41SAndroid Build Coastguard Workertype mediaserver_exec, system_file_type, exec_type, file_type; 4*e4a36f41SAndroid Build Coastguard Workertype mediaserver_tmpfs, file_type; 5*e4a36f41SAndroid Build Coastguard Worker 6*e4a36f41SAndroid Build Coastguard Workertypeattribute mediaserver mlstrustedsubject; 7*e4a36f41SAndroid Build Coastguard Worker 8*e4a36f41SAndroid Build Coastguard Workernet_domain(mediaserver) 9*e4a36f41SAndroid Build Coastguard Worker 10*e4a36f41SAndroid Build Coastguard Workerr_dir_file(mediaserver, sdcard_type) 11*e4a36f41SAndroid Build Coastguard Workerr_dir_file(mediaserver, cgroup) 12*e4a36f41SAndroid Build Coastguard Worker 13*e4a36f41SAndroid Build Coastguard Worker# stat /proc/self 14*e4a36f41SAndroid Build Coastguard Workerallow mediaserver proc:lnk_file getattr; 15*e4a36f41SAndroid Build Coastguard Worker 16*e4a36f41SAndroid Build Coastguard Worker# open /vendor/lib/mediadrm 17*e4a36f41SAndroid Build Coastguard Workerallow mediaserver system_file:dir r_dir_perms; 18*e4a36f41SAndroid Build Coastguard Worker 19*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(` 20*e4a36f41SAndroid Build Coastguard Worker # ptrace to processes in the same domain for memory leak detection 21*e4a36f41SAndroid Build Coastguard Worker allow mediaserver self:process ptrace; 22*e4a36f41SAndroid Build Coastguard Worker') 23*e4a36f41SAndroid Build Coastguard Worker 24*e4a36f41SAndroid Build Coastguard Workerbinder_use(mediaserver) 25*e4a36f41SAndroid Build Coastguard Workerbinder_call(mediaserver, binderservicedomain) 26*e4a36f41SAndroid Build Coastguard Workerbinder_call(mediaserver, appdomain) 27*e4a36f41SAndroid Build Coastguard Workerbinder_service(mediaserver) 28*e4a36f41SAndroid Build Coastguard Worker 29*e4a36f41SAndroid Build Coastguard Workerallow mediaserver media_data_file:dir create_dir_perms; 30*e4a36f41SAndroid Build Coastguard Workerallow mediaserver media_data_file:file create_file_perms; 31*e4a36f41SAndroid Build Coastguard Workerallow mediaserver { app_data_file privapp_data_file }:file { append getattr ioctl lock map read write }; 32*e4a36f41SAndroid Build Coastguard Workerallow mediaserver sdcard_type:file write; 33*e4a36f41SAndroid Build Coastguard Workerallow mediaserver gpu_device:chr_file rw_file_perms; 34*e4a36f41SAndroid Build Coastguard Workerallow mediaserver video_device:dir r_dir_perms; 35*e4a36f41SAndroid Build Coastguard Workerallow mediaserver video_device:chr_file rw_file_perms; 36*e4a36f41SAndroid Build Coastguard Worker 37*e4a36f41SAndroid Build Coastguard Workerset_prop(mediaserver, audio_prop) 38*e4a36f41SAndroid Build Coastguard Worker 39*e4a36f41SAndroid Build Coastguard Worker# Read resources from open apk files passed over Binder. 40*e4a36f41SAndroid Build Coastguard Workerallow mediaserver apk_data_file:file { read getattr }; 41*e4a36f41SAndroid Build Coastguard Workerallow mediaserver asec_apk_file:file { read getattr }; 42*e4a36f41SAndroid Build Coastguard Workerallow mediaserver ringtone_file:file { read getattr }; 43*e4a36f41SAndroid Build Coastguard Worker 44*e4a36f41SAndroid Build Coastguard Worker# Read /data/data/com.android.providers.telephony files passed over Binder. 45*e4a36f41SAndroid Build Coastguard Workerallow mediaserver radio_data_file:file { read getattr }; 46*e4a36f41SAndroid Build Coastguard Worker 47*e4a36f41SAndroid Build Coastguard Worker# Use pipes passed over Binder from app domains. 48*e4a36f41SAndroid Build Coastguard Workerallow mediaserver appdomain:fifo_file { getattr read write }; 49*e4a36f41SAndroid Build Coastguard Worker 50*e4a36f41SAndroid Build Coastguard Workerallow mediaserver rpmsg_device:chr_file rw_file_perms; 51*e4a36f41SAndroid Build Coastguard Worker 52*e4a36f41SAndroid Build Coastguard Worker# Inter System processes communicate over named pipe (FIFO) 53*e4a36f41SAndroid Build Coastguard Workerallow mediaserver system_server:fifo_file r_file_perms; 54*e4a36f41SAndroid Build Coastguard Worker 55*e4a36f41SAndroid Build Coastguard Workerr_dir_file(mediaserver, media_rw_data_file) 56*e4a36f41SAndroid Build Coastguard Worker 57*e4a36f41SAndroid Build Coastguard Worker# Grant access to read files on appfuse. 58*e4a36f41SAndroid Build Coastguard Workerallow mediaserver app_fuse_file:file { read getattr }; 59*e4a36f41SAndroid Build Coastguard Worker 60*e4a36f41SAndroid Build Coastguard Worker# Needed on some devices for playing DRM protected content, 61*e4a36f41SAndroid Build Coastguard Worker# but seems expected and appropriate for all devices. 62*e4a36f41SAndroid Build Coastguard Workerunix_socket_connect(mediaserver, drmserver, drmserver) 63*e4a36f41SAndroid Build Coastguard Worker 64*e4a36f41SAndroid Build Coastguard Worker# Needed on some devices for playing audio on paired BT device, 65*e4a36f41SAndroid Build Coastguard Worker# but seems appropriate for all devices. 66*e4a36f41SAndroid Build Coastguard Workerunix_socket_connect(mediaserver, bluetooth, bluetooth) 67*e4a36f41SAndroid Build Coastguard Worker 68*e4a36f41SAndroid Build Coastguard Workeradd_service(mediaserver, mediaserver_service) 69*e4a36f41SAndroid Build Coastguard Workerallow mediaserver activity_service:service_manager find; 70*e4a36f41SAndroid Build Coastguard Workerallow mediaserver appops_service:service_manager find; 71*e4a36f41SAndroid Build Coastguard Workerallow mediaserver audio_service:service_manager find; 72*e4a36f41SAndroid Build Coastguard Workerallow mediaserver audioserver_service:service_manager find; 73*e4a36f41SAndroid Build Coastguard Workerallow mediaserver cameraserver_service:service_manager find; 74*e4a36f41SAndroid Build Coastguard Workerallow mediaserver batterystats_service:service_manager find; 75*e4a36f41SAndroid Build Coastguard Workerallow mediaserver drmserver_service:service_manager find; 76*e4a36f41SAndroid Build Coastguard Workerallow mediaserver mediaextractor_service:service_manager find; 77*e4a36f41SAndroid Build Coastguard Workerallow mediaserver mediacodec_service:service_manager find; 78*e4a36f41SAndroid Build Coastguard Workerallow mediaserver mediametrics_service:service_manager find; 79*e4a36f41SAndroid Build Coastguard Workerallow mediaserver media_session_service:service_manager find; 80*e4a36f41SAndroid Build Coastguard Workerallow mediaserver permission_service:service_manager find; 81*e4a36f41SAndroid Build Coastguard Workerallow mediaserver power_service:service_manager find; 82*e4a36f41SAndroid Build Coastguard Workerallow mediaserver processinfo_service:service_manager find; 83*e4a36f41SAndroid Build Coastguard Workerallow mediaserver scheduling_policy_service:service_manager find; 84*e4a36f41SAndroid Build Coastguard Workerallow mediaserver surfaceflinger_service:service_manager find; 85*e4a36f41SAndroid Build Coastguard Worker 86*e4a36f41SAndroid Build Coastguard Worker# for ModDrm/MediaPlayer 87*e4a36f41SAndroid Build Coastguard Workerallow mediaserver mediadrmserver_service:service_manager find; 88*e4a36f41SAndroid Build Coastguard Worker 89*e4a36f41SAndroid Build Coastguard Worker# For hybrid interfaces 90*e4a36f41SAndroid Build Coastguard Workerallow mediaserver hidl_token_hwservice:hwservice_manager find; 91*e4a36f41SAndroid Build Coastguard Worker 92*e4a36f41SAndroid Build Coastguard Worker# /oem access 93*e4a36f41SAndroid Build Coastguard Workerallow mediaserver oemfs:dir search; 94*e4a36f41SAndroid Build Coastguard Workerallow mediaserver oemfs:file r_file_perms; 95*e4a36f41SAndroid Build Coastguard Worker 96*e4a36f41SAndroid Build Coastguard Worker# /vendor apk access 97*e4a36f41SAndroid Build Coastguard Workerallow mediaserver vendor_app_file:file { read map getattr }; 98*e4a36f41SAndroid Build Coastguard Worker 99*e4a36f41SAndroid Build Coastguard Workeruse_drmservice(mediaserver) 100*e4a36f41SAndroid Build Coastguard Workerallow mediaserver drmserver:drmservice { 101*e4a36f41SAndroid Build Coastguard Worker consumeRights 102*e4a36f41SAndroid Build Coastguard Worker setPlaybackStatus 103*e4a36f41SAndroid Build Coastguard Worker openDecryptSession 104*e4a36f41SAndroid Build Coastguard Worker closeDecryptSession 105*e4a36f41SAndroid Build Coastguard Worker initializeDecryptUnit 106*e4a36f41SAndroid Build Coastguard Worker decrypt 107*e4a36f41SAndroid Build Coastguard Worker finalizeDecryptUnit 108*e4a36f41SAndroid Build Coastguard Worker pread 109*e4a36f41SAndroid Build Coastguard Worker}; 110*e4a36f41SAndroid Build Coastguard Worker 111*e4a36f41SAndroid Build Coastguard Worker# only allow unprivileged socket ioctl commands 112*e4a36f41SAndroid Build Coastguard Workerallowxperm mediaserver self:{ rawip_socket tcp_socket udp_socket } 113*e4a36f41SAndroid Build Coastguard Worker ioctl { unpriv_sock_ioctls unpriv_tty_ioctls }; 114*e4a36f41SAndroid Build Coastguard Worker 115*e4a36f41SAndroid Build Coastguard Worker# Access to /data/media. 116*e4a36f41SAndroid Build Coastguard Worker# This should be removed if sdcardfs is modified to alter the secontext for its 117*e4a36f41SAndroid Build Coastguard Worker# accesses to the underlying FS. 118*e4a36f41SAndroid Build Coastguard Workerallow mediaserver media_rw_data_file:dir create_dir_perms; 119*e4a36f41SAndroid Build Coastguard Workerallow mediaserver media_rw_data_file:file create_file_perms; 120*e4a36f41SAndroid Build Coastguard Worker 121*e4a36f41SAndroid Build Coastguard Worker# Access to media in /data/preloads 122*e4a36f41SAndroid Build Coastguard Workerallow mediaserver preloads_media_file:file { getattr read ioctl }; 123*e4a36f41SAndroid Build Coastguard Worker 124*e4a36f41SAndroid Build Coastguard Workerallow mediaserver ion_device:chr_file r_file_perms; 125*e4a36f41SAndroid Build Coastguard Workerallow mediaserver hal_graphics_allocator:fd use; 126*e4a36f41SAndroid Build Coastguard Workerallow mediaserver hal_graphics_composer:fd use; 127*e4a36f41SAndroid Build Coastguard Workerallow mediaserver hal_camera:fd use; 128*e4a36f41SAndroid Build Coastguard Worker 129*e4a36f41SAndroid Build Coastguard Workerallow mediaserver system_server:fd use; 130*e4a36f41SAndroid Build Coastguard Worker 131*e4a36f41SAndroid Build Coastguard Worker# b/120491318 allow mediaserver to access void:fd 132*e4a36f41SAndroid Build Coastguard Workerallow mediaserver vold:fd use; 133*e4a36f41SAndroid Build Coastguard Worker 134*e4a36f41SAndroid Build Coastguard Workerhal_client_domain(mediaserver, hal_allocator) 135*e4a36f41SAndroid Build Coastguard Worker 136*e4a36f41SAndroid Build Coastguard Worker### 137*e4a36f41SAndroid Build Coastguard Worker### neverallow rules 138*e4a36f41SAndroid Build Coastguard Worker### 139*e4a36f41SAndroid Build Coastguard Worker 140*e4a36f41SAndroid Build Coastguard Worker# mediaserver should never execute any executable without a 141*e4a36f41SAndroid Build Coastguard Worker# domain transition 142*e4a36f41SAndroid Build Coastguard Workerneverallow mediaserver { file_type fs_type }:file execute_no_trans; 143*e4a36f41SAndroid Build Coastguard Worker 144*e4a36f41SAndroid Build Coastguard Worker# do not allow privileged socket ioctl commands 145*e4a36f41SAndroid Build Coastguard Workerneverallowxperm mediaserver domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; 146