assert mediaextractor uses a seccomp filter

As part of the media frameworks hardening effort, mediaextractor
runs in an unprivileged sandboxes intended for hosting risky
code responsible for parsing file formats. By default, the extractor
process runs with a seccomp filter which limits the syscalls
available to the process, providing additional protection for the
kernel and other processes. Enforce that these processes exist and
use a seccomp filter.

Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \
    android.security.cts.ProcessMustUseSeccompTest
    android.security.cts.ProcessMustUseSeccompTest#testMediaextractorHasSeccompFilter
    pass
Bug: 64536899
Change-Id: Ibfcf0942cb611e1ab26463293eed966e4ed91e81
(cherry picked from commit e6dfef9b9248a6f87d939ada97cb95431c679255)
diff --git a/hostsidetests/security/src/android/cts/security/ProcessMustUseSeccompTest.java b/hostsidetests/security/src/android/cts/security/ProcessMustUseSeccompTest.java
index 90640c2..6b6020c 100644
--- a/hostsidetests/security/src/android/cts/security/ProcessMustUseSeccompTest.java
+++ b/hostsidetests/security/src/android/cts/security/ProcessMustUseSeccompTest.java
@@ -96,4 +96,8 @@
     public void testConfigStoreHasSeccompFilter() throws DeviceNotAvailableException {
         assertSeccompFilter("android.hardware.configstore", true);
     }
+
+    public void testMediaextractorHasSeccompFilter() throws DeviceNotAvailableException {
+        assertSeccompFilter("media.extractor", false);
+    }
 }