623975fa5a
Permissive domains are only intended for development. When a device launches, we want to ensure that all permissive domains are in, at a minimum, unconfined+enforcing. Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During development, this flag is false, and permissive domains are allowed. When SELinux new feature development has been frozen immediately before release, this flag will be flipped to true. Any previously permissive domains will move into unconfined+enforcing. This will ensure that all SELinux domains have at least a minimal level of protection. Unconditionally enable this flag for all user builds. Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
39 lines
1.4 KiB
Text
39 lines
1.4 KiB
Text
# drmserver - DRM service
|
|
type drmserver, domain;
|
|
permissive_or_unconfined(drmserver)
|
|
type drmserver_exec, exec_type, file_type;
|
|
|
|
init_daemon_domain(drmserver)
|
|
typeattribute drmserver mlstrustedsubject;
|
|
|
|
# Perform Binder IPC to system server.
|
|
binder_use(drmserver)
|
|
binder_call(drmserver, system_server)
|
|
binder_call(drmserver, appdomain)
|
|
binder_service(drmserver)
|
|
|
|
# Perform Binder IPC to mediaserver
|
|
binder_call(drmserver, mediaserver)
|
|
|
|
allow drmserver sdcard_type:dir search;
|
|
allow drmserver drm_data_file:dir create_dir_perms;
|
|
allow drmserver drm_data_file:file create_file_perms;
|
|
allow drmserver self:{ tcp_socket udp_socket } *;
|
|
allow drmserver port:tcp_socket name_connect;
|
|
allow drmserver tee_device:chr_file rw_file_perms;
|
|
allow drmserver platform_app_data_file:file { read write getattr };
|
|
allow drmserver { app_data_file asec_apk_file }:file { read write getattr };
|
|
allow drmserver sdcard_type:file { read write getattr };
|
|
allow drmserver efs_file:file { open read getattr };
|
|
|
|
type drmserver_socket, file_type;
|
|
|
|
# /data/app/tlcd_sock socket file.
|
|
# Clearly, /data/app is the most logical place to create a socket. Not.
|
|
allow drmserver apk_data_file:dir rw_dir_perms;
|
|
type_transition drmserver apk_data_file:sock_file drmserver_socket;
|
|
allow drmserver drmserver_socket:sock_file create_file_perms;
|
|
allow drmserver tee:unix_stream_socket connectto;
|
|
|
|
# After taking a video, drmserver looks at the video file.
|
|
r_dir_file(drmserver, media_rw_data_file)
|