Skip to content
Snippets Groups Projects
  • Alex Klyubin's avatar
    3ef2d51b
    Relax neverallow for video_device access · 3ef2d51b
    Alex Klyubin authored
    On fugu, surfaceflinger is Graphics Allocator HAL. surfaceflinger
    needs access to video_device. This commit thus relaxes the neverallow
    rule which says that out of all HALs, only Camera HAL can access
    video_device. The rule is relaxed to exclude HALs offered by
    framework/system image.
    
    Test: fugu boots
    Bug: 37575062
    Change-Id: I9b9be55fe0bf3928f1a6342113a7d6f9a2eb0260
    3ef2d51b
    History
    Relax neverallow for video_device access
    Alex Klyubin authored
    On fugu, surfaceflinger is Graphics Allocator HAL. surfaceflinger
    needs access to video_device. This commit thus relaxes the neverallow
    rule which says that out of all HALs, only Camera HAL can access
    video_device. The rule is relaxed to exclude HALs offered by
    framework/system image.
    
    Test: fugu boots
    Bug: 37575062
    Change-Id: I9b9be55fe0bf3928f1a6342113a7d6f9a2eb0260
hal_camera.te 1.49 KiB
# HwBinder IPC from clients to server and callbacks
binder_call(hal_camera_client, hal_camera_server)
binder_call(hal_camera_server, hal_camera_client)

add_hwservice(hal_camera_server, hal_camera_hwservice)
allow hal_camera_client hal_camera_hwservice:hwservice_manager find;

# access /data/misc/camera
allow hal_camera camera_data_file:dir create_dir_perms;
allow hal_camera camera_data_file:file create_file_perms;

allow hal_camera video_device:dir r_dir_perms;
allow hal_camera video_device:chr_file rw_file_perms;
allow hal_camera camera_device:chr_file rw_file_perms;
allow hal_camera ion_device:chr_file rw_file_perms;
# Both the client and the server need to use the graphics allocator
allow { hal_camera_client hal_camera_server } hal_graphics_allocator:fd use;

# Allow hal_camera to use fd from app,gralloc,and ashmem HAL
allow hal_camera { appdomain -isolated_app }:fd use;
allow hal_camera surfaceflinger:fd use;
allow hal_camera hal_allocator_server:fd use;

###
### neverallow rules
###

# hal_camera should never execute any executable without a
# domain transition
neverallow hal_camera { file_type fs_type }:file execute_no_trans;

# hal_camera should never need network access. Disallow network sockets.
neverallow hal_camera domain:{ tcp_socket udp_socket rawip_socket } *;

# Only camera HAL may directly access the camera and video hardware
neverallow { halserverdomain -hal_camera_server } camera_device:chr_file *;
neverallow { halserverdomain -coredomain -hal_camera_server } video_device:chr_file *;