7171232c02
define(`binder_call', ` allow $1 $2:binder { call transfer }; allow $2 $1:binder transfer; allow $1 $2:fd use; ') binder_call(surfaceflinger, appdomain) binder_call(surfaceflinger, bootanim) it is alread include these policy.. so I can delete these policy! allow surfaceflinger appdomain:fd use; allow surfaceflinger bootanim:fd use;
68 lines
2.2 KiB
Text
68 lines
2.2 KiB
Text
# surfaceflinger - display compositor service
|
|
type surfaceflinger, domain, domain_deprecated;
|
|
type surfaceflinger_exec, exec_type, file_type;
|
|
|
|
init_daemon_domain(surfaceflinger)
|
|
typeattribute surfaceflinger mlstrustedsubject;
|
|
|
|
# Perform Binder IPC.
|
|
binder_use(surfaceflinger)
|
|
binder_call(surfaceflinger, binderservicedomain)
|
|
binder_call(surfaceflinger, appdomain)
|
|
binder_call(surfaceflinger, bootanim)
|
|
binder_service(surfaceflinger)
|
|
|
|
# Binder IPC to bu, presently runs in adbd domain.
|
|
binder_call(surfaceflinger, adbd)
|
|
|
|
# Read /proc/pid files for Binder clients.
|
|
r_dir_file(surfaceflinger, binderservicedomain)
|
|
r_dir_file(surfaceflinger, appdomain)
|
|
|
|
# Access the GPU.
|
|
allow surfaceflinger gpu_device:chr_file rw_file_perms;
|
|
|
|
# Access /dev/graphics/fb0.
|
|
allow surfaceflinger graphics_device:dir search;
|
|
allow surfaceflinger graphics_device:chr_file rw_file_perms;
|
|
|
|
# Access /dev/video1.
|
|
allow surfaceflinger video_device:dir r_dir_perms;
|
|
allow surfaceflinger video_device:chr_file rw_file_perms;
|
|
|
|
# Create and use netlink kobject uevent sockets.
|
|
allow surfaceflinger self:netlink_kobject_uevent_socket create_socket_perms;
|
|
|
|
# Set properties.
|
|
set_prop(surfaceflinger, system_prop)
|
|
set_prop(surfaceflinger, ctl_bootanim_prop)
|
|
|
|
# Use open files supplied by an app.
|
|
allow surfaceflinger app_data_file:file { read write };
|
|
|
|
# Allow a dumpstate triggered screenshot
|
|
binder_call(surfaceflinger, dumpstate)
|
|
binder_call(surfaceflinger, shell)
|
|
r_dir_file(surfaceflinger, dumpstate)
|
|
|
|
# Needed on some devices for playing DRM protected content,
|
|
# but seems expected and appropriate for all devices.
|
|
allow surfaceflinger tee:unix_stream_socket connectto;
|
|
allow surfaceflinger tee_device:chr_file rw_file_perms;
|
|
|
|
|
|
# media.player service
|
|
allow surfaceflinger mediaserver_service:service_manager find;
|
|
allow surfaceflinger permission_service:service_manager find;
|
|
allow surfaceflinger power_service:service_manager find;
|
|
allow surfaceflinger surfaceflinger_service:service_manager { add find };
|
|
allow surfaceflinger window_service:service_manager find;
|
|
|
|
###
|
|
### Neverallow rules
|
|
###
|
|
### surfaceflinger should NEVER do any of this
|
|
|
|
# Do not allow accessing SDcard files as unsafe ejection could
|
|
# cause the kernel to kill the process.
|
|
neverallow surfaceflinger sdcard_type:file rw_file_perms;
|