6c53b23da8
avc: denied { find } for service=SurfaceFlinger scontext=u:r:mediacodec:s0 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager Bug: 26990688 Change-Id: Ie7c5f6d879c286375eb52ef4c6b84726aa4f1ba2
31 lines
1 KiB
Text
31 lines
1 KiB
Text
# mediacodec - audio and video codecs live here
|
|
type mediacodec, domain;
|
|
type mediacodec_exec, exec_type, file_type;
|
|
|
|
typeattribute mediacodec mlstrustedsubject;
|
|
|
|
init_daemon_domain(mediacodec)
|
|
|
|
binder_use(mediacodec)
|
|
binder_call(mediacodec, binderservicedomain)
|
|
binder_call(mediacodec, appdomain)
|
|
binder_service(mediacodec)
|
|
|
|
allow mediacodec mediacodec_service:service_manager add;
|
|
allow mediacodec surfaceflinger_service:service_manager find;
|
|
allow mediacodec gpu_device:chr_file rw_file_perms;
|
|
allow mediacodec video_device:chr_file rw_file_perms;
|
|
allow mediacodec video_device:dir search;
|
|
allow mediacodec ion_device:chr_file rw_file_perms;
|
|
|
|
###
|
|
### neverallow rules
|
|
###
|
|
|
|
# mediacodec should never execute any executable without a
|
|
# domain transition
|
|
neverallow mediacodec { file_type fs_type }:file execute_no_trans;
|
|
|
|
# mediacodec should never need network access. Disallow all sockets
|
|
# other than those needed for normal system functions
|
|
neverallow mediacodec { domain -debuggerd -dumpstate -adbd -mediacodec -logd userdebug_or_eng(`-su')}:socket_class_set *;
|