blob: f84a4248cd45bcc2b80af22d90ee29fecb1edb35 [file] [log] [blame]
Stephen Smalley2dd4e512012-01-04 12:33:27 -05001# mediaserver - multimedia daemon
2type mediaserver, domain;
Nick Kralevichb8ac06f2014-01-06 16:00:11 -08003permissive mediaserver;
Stephen Smalley2dd4e512012-01-04 12:33:27 -05004type mediaserver_exec, exec_type, file_type;
5
Stephen Smalleyaf9238c2013-10-23 14:23:43 -04006typeattribute mediaserver mlstrustedsubject;
7
William Roberts4e030c22012-11-28 12:18:30 -08008net_domain(mediaserver)
Stephen Smalley2dd4e512012-01-04 12:33:27 -05009init_daemon_domain(mediaserver)
Stephen Smalleyaf9238c2013-10-23 14:23:43 -040010unix_socket_connect(mediaserver, property, init)
11
12r_dir_file(mediaserver, sdcard_type)
13
14binder_use(mediaserver)
15binder_call(mediaserver, binderservicedomain)
16binder_call(mediaserver, appdomain)
17binder_service(mediaserver)
18
19allow mediaserver self:process execmem;
20allow mediaserver kernel:system module_request;
Stephen Smalleya7716712013-11-04 09:50:52 -050021allow mediaserver media_data_file:dir rw_dir_perms;
22allow mediaserver media_data_file:file create_file_perms;
Stephen Smalleyaf9238c2013-10-23 14:23:43 -040023allow mediaserver app_data_file:dir search;
24allow mediaserver app_data_file:file rw_file_perms;
25allow mediaserver platform_app_data_file:file { getattr read };
26allow mediaserver sdcard_type:file write;
27allow mediaserver graphics_device:chr_file rw_file_perms;
Nick Kralevich37339c72014-01-06 12:39:19 -080028allow mediaserver video_device:dir r_dir_perms;
Stephen Smalleyaf9238c2013-10-23 14:23:43 -040029allow mediaserver video_device:chr_file rw_file_perms;
30allow mediaserver audio_device:dir r_dir_perms;
31allow mediaserver qemu_device:chr_file rw_file_perms;
32allow mediaserver tee_device:chr_file rw_file_perms;
33allow mediaserver audio_prop:property_service set;
34
35# Access audio devices at all.
36allow mediaserver audio_device:chr_file rw_file_perms;
37
38# XXX Label with a specific type?
39allow mediaserver sysfs:file rw_file_perms;
40
41# XXX Why?
42allow mediaserver { apk_data_file asec_apk_file }:file { read getattr };
43
44# Access camera device.
45allow mediaserver camera_device:chr_file rw_file_perms;
46allow mediaserver rpmsg_device:chr_file rw_file_perms;
47
48# Inter System processes communicate over named pipe (FIFO)
49allow mediaserver system_server:fifo_file r_file_perms;
50
Stephen Smalley8510d312013-11-07 13:42:46 -050051# Camera data
Nick Kralevich37339c72014-01-06 12:39:19 -080052r_dir_file(mediaserver, camera_data_file)
53r_dir_file(mediaserver, media_rw_data_file)
Stephen Smalleyaf9238c2013-10-23 14:23:43 -040054
Stephen Smalley8510d312013-11-07 13:42:46 -050055# Grant access to audio files to mediaserver
56allow mediaserver audio_data_file:dir ra_dir_perms;
57allow mediaserver audio_data_file:file create_file_perms;
Stephen Smalleya7c8ea82013-11-06 13:00:52 -050058
Stephen Smalleyaf9238c2013-10-23 14:23:43 -040059# Read/[write] to /proc/net/xt_qtaguid/ctrl and /dev/xt_qtaguid
60allow mediaserver qtaguid_proc:file rw_file_perms;
61allow mediaserver qtaguid_device:chr_file r_file_perms;
62
63# Allow abstract socket connection
64allow mediaserver rild:unix_stream_socket { connectto read write setopt };
Nick Kraleviche45603d2014-01-08 11:19:52 -080065
66# Needed on some devices for playing DRM protected content,
67# but seems expected and appropriate for all devices.
68unix_socket_connect(mediaserver, drmserver, drmserver)