2017-12-21 03:51:15 +01:00
|
|
|
# Perfetto tracing probes, has tracefs access.
|
2018-09-27 19:21:37 +02:00
|
|
|
type traced_probes_exec, system_file_type, exec_type, file_type;
|
2020-02-04 14:44:14 +01:00
|
|
|
type traced_probes_tmpfs, file_type;
|
2017-12-21 03:51:15 +01:00
|
|
|
|
|
|
|
# Allow init to exec the daemon.
|
|
|
|
init_daemon_domain(traced_probes)
|
2020-02-04 14:44:14 +01:00
|
|
|
tmpfs_domain(traced_probes)
|
2017-12-21 03:51:15 +01:00
|
|
|
|
|
|
|
# Write trace data to the Perfetto traced damon. This requires connecting to its
|
|
|
|
# producer socket and obtaining a (per-process) tmpfs fd.
|
2019-10-08 17:15:14 +02:00
|
|
|
perfetto_producer(traced_probes)
|
2017-12-21 03:51:15 +01:00
|
|
|
|
|
|
|
# Allow traced_probes to access tracefs.
|
|
|
|
allow traced_probes debugfs_tracing:dir r_dir_perms;
|
|
|
|
allow traced_probes debugfs_tracing:file rw_file_perms;
|
|
|
|
allow traced_probes debugfs_trace_marker:file getattr;
|
2020-11-05 13:54:52 +01:00
|
|
|
allow traced_probes debugfs_tracing_printk_formats:file r_file_perms;
|
2018-02-09 12:15:22 +01:00
|
|
|
|
2021-01-15 17:12:56 +01:00
|
|
|
# Allow traced_probes to access mm_events trace instance
|
|
|
|
allow traced_probes debugfs_tracing_instances:dir search;
|
|
|
|
allow traced_probes debugfs_mm_events_tracing:dir search;
|
|
|
|
allow traced_probes debugfs_mm_events_tracing:file rw_file_perms;
|
|
|
|
|
2018-02-09 12:15:22 +01:00
|
|
|
# TODO(primiano): temporarily I/O tracing categories are still
|
2020-07-31 20:28:11 +02:00
|
|
|
# userdebug only until we nail down the denylist/allowlist.
|
2018-02-09 12:15:22 +01:00
|
|
|
userdebug_or_eng(`
|
2018-12-06 19:32:23 +01:00
|
|
|
allow traced_probes debugfs_tracing_debug:dir r_dir_perms;
|
2018-02-09 12:15:22 +01:00
|
|
|
allow traced_probes debugfs_tracing_debug:file rw_file_perms;
|
2017-12-21 03:51:15 +01:00
|
|
|
')
|
|
|
|
|
|
|
|
# Allow traced_probes to start with a higher scheduling class and then downgrade
|
|
|
|
# itself.
|
|
|
|
allow traced_probes self:global_capability_class_set { sys_nice };
|
|
|
|
|
|
|
|
# Allow procfs access
|
|
|
|
r_dir_file(traced_probes, domain)
|
|
|
|
|
2020-10-09 10:15:10 +02:00
|
|
|
# Allow to temporarily lift the kptr_restrict setting and build a symbolization
|
|
|
|
# map reading /proc/kallsyms.
|
|
|
|
userdebug_or_eng(`set_prop(traced_probes, lower_kptr_restrict_prop)')
|
|
|
|
allow traced_probes proc_kallsyms:file r_file_perms;
|
|
|
|
|
2019-04-02 17:19:09 +02:00
|
|
|
# Allow to read packages.list file.
|
|
|
|
allow traced_probes packages_list_file:file r_file_perms;
|
|
|
|
|
2022-04-02 00:16:14 +02:00
|
|
|
# Allow to read game_mode_intervention.list file.
|
|
|
|
allow traced_probes game_mode_intervention_list_file:file r_file_perms;
|
|
|
|
|
2018-02-16 14:54:41 +01:00
|
|
|
# Allow to log to kernel dmesg when starting / stopping ftrace.
|
|
|
|
allow traced_probes kmsg_device:chr_file write;
|
|
|
|
|
2018-02-23 17:47:38 +01:00
|
|
|
# Allow traced_probes to list the system partition.
|
|
|
|
allow traced_probes system_file:dir { open read };
|
|
|
|
|
2018-03-02 11:52:56 +01:00
|
|
|
# Allow traced_probes to list some of the data partition.
|
2018-08-15 21:34:20 +02:00
|
|
|
allow traced_probes self:global_capability_class_set dac_read_search;
|
2018-03-02 11:52:56 +01:00
|
|
|
|
2018-04-06 13:55:22 +02:00
|
|
|
allow traced_probes apk_data_file:dir { getattr open read search };
|
2020-10-16 16:29:55 +02:00
|
|
|
allow traced_probes { apex_art_data_file apex_module_data_file }:dir { getattr open read search };
|
2018-04-06 13:55:22 +02:00
|
|
|
allow traced_probes dalvikcache_data_file:dir { getattr open read search };
|
2018-03-02 11:52:56 +01:00
|
|
|
userdebug_or_eng(`
|
2019-04-02 17:19:09 +02:00
|
|
|
# search and getattr are granted via domain and coredomain, respectively.
|
|
|
|
allow traced_probes system_data_file:dir { open read };
|
2018-03-02 11:52:56 +01:00
|
|
|
')
|
2018-04-06 13:55:22 +02:00
|
|
|
allow traced_probes system_app_data_file:dir { getattr open read search };
|
|
|
|
allow traced_probes backup_data_file:dir { getattr open read search };
|
|
|
|
allow traced_probes bootstat_data_file:dir { getattr open read search };
|
|
|
|
allow traced_probes update_engine_data_file:dir { getattr open read search };
|
|
|
|
allow traced_probes update_engine_log_data_file:dir { getattr open read search };
|
2020-12-04 15:07:52 +01:00
|
|
|
allow traced_probes { user_profile_root_file user_profile_data_file}:dir { getattr open read search };
|
2018-03-02 11:52:56 +01:00
|
|
|
|
2018-03-02 20:27:06 +01:00
|
|
|
# Allow traced_probes to run atrace. atrace pokes at system services to enable
|
|
|
|
# their userspace TRACE macros.
|
|
|
|
domain_auto_trans(traced_probes, atrace_exec, atrace);
|
|
|
|
|
2018-11-16 13:17:24 +01:00
|
|
|
# Allow traced_probes to kill atrace on timeout.
|
|
|
|
allow traced_probes atrace:process sigkill;
|
2018-03-02 20:27:06 +01:00
|
|
|
|
2018-09-18 09:51:06 +02:00
|
|
|
# Allow traced_probes to access /proc files for system stats.
|
|
|
|
# Note: trace data is NOT exposed to anything other than shell and privileged
|
|
|
|
# system apps that have access to the traced consumer socket.
|
|
|
|
allow traced_probes {
|
|
|
|
proc_meminfo
|
|
|
|
proc_vmstat
|
|
|
|
proc_stat
|
2022-08-04 22:21:37 +02:00
|
|
|
proc_buddyinfo
|
2018-09-18 09:51:06 +02:00
|
|
|
}:file r_file_perms;
|
|
|
|
|
2021-04-16 14:02:06 +02:00
|
|
|
# Allow access to read /sys/class/devfreq/ and /$DEVICE/cur_freq files
|
|
|
|
allow traced_probes sysfs_devfreq_dir:dir r_dir_perms;
|
|
|
|
allow traced_probes sysfs_devfreq_cur:file r_file_perms;
|
|
|
|
|
2023-04-03 22:01:00 +02:00
|
|
|
# Allow access to read /proc/diskstats for I/O profiling.
|
|
|
|
allow traced_probes proc_diskstats:file r_file_perms;
|
|
|
|
|
2019-03-13 18:08:43 +01:00
|
|
|
# Allow access to the IHealth and IPowerStats HAL service for tracing battery counters.
|
2018-12-02 22:59:10 +01:00
|
|
|
hal_client_domain(traced_probes, hal_health)
|
2019-03-13 18:08:43 +01:00
|
|
|
hal_client_domain(traced_probes, hal_power_stats)
|
2018-12-02 22:59:10 +01:00
|
|
|
|
2019-03-26 12:03:35 +01:00
|
|
|
# Allow access to Atrace HAL for enabling vendor/device specific tracing categories.
|
|
|
|
hal_client_domain(traced_probes, hal_atrace)
|
|
|
|
|
2019-01-10 21:07:51 +01:00
|
|
|
# On debug builds allow to ingest system logs into the trace.
|
|
|
|
userdebug_or_eng(`read_logd(traced_probes)')
|
|
|
|
|
2023-03-22 09:14:38 +01:00
|
|
|
# Allow traced_probes to talk to statsd for logging metrics and recording atoms.
|
2021-04-30 13:13:39 +02:00
|
|
|
unix_socket_send(traced_probes, statsdw, statsd)
|
2023-03-22 09:14:38 +01:00
|
|
|
binder_call(traced_probes, statsd)
|
|
|
|
allow traced_probes stats_service:service_manager find;
|
2021-04-30 13:13:39 +02:00
|
|
|
|
2017-12-21 03:51:15 +01:00
|
|
|
###
|
|
|
|
### Neverallow rules
|
|
|
|
###
|
|
|
|
### traced_probes should NEVER do any of this
|
|
|
|
|
|
|
|
# Disallow mapping executable memory (execstack and exec are already disallowed
|
|
|
|
# globally in domain.te).
|
|
|
|
neverallow traced_probes self:process execmem;
|
|
|
|
|
|
|
|
# Block device access.
|
|
|
|
neverallow traced_probes dev_type:blk_file { read write };
|
|
|
|
|
|
|
|
# ptrace any other app
|
|
|
|
neverallow traced_probes domain:process ptrace;
|
|
|
|
|
|
|
|
# Disallows access to /data files.
|
2018-02-16 14:54:41 +01:00
|
|
|
neverallow traced_probes {
|
2018-02-08 01:29:06 +01:00
|
|
|
data_file_type
|
2020-10-16 16:29:55 +02:00
|
|
|
-apex_module_data_file
|
|
|
|
-apex_art_data_file
|
2018-03-02 11:52:56 +01:00
|
|
|
-apk_data_file
|
|
|
|
-dalvikcache_data_file
|
2018-02-08 01:29:06 +01:00
|
|
|
-system_data_file
|
2019-08-02 00:57:47 +02:00
|
|
|
-system_data_root_file
|
Restrict creating per-user encrypted directories
Creating a per-user encrypted directory such as /data/system_ce/0 and
the subdirectories in it too early has been a recurring bug. Typically,
individual services in system_server are to blame; system_server has
permission to create these directories, and it's easy to write
"mkdirs()" instead of "mkdir()". Such bugs are very bad, as they
prevent these directories from being encrypted, as encryption policies
can only be set on empty directories. Due to recent changes, a factory
reset is now forced in such cases, which helps detect these bugs;
however, it would be much better to prevent them in the first place.
This CL locks down the ability to create these directories to just vold
and init, or to just vold when possible. This is done by assigning new
types to the directories that contain these directories, and then only
allowing the needed domains to write to these parent directories. This
is similar to what https://r.android.com/1117297 did for /data itself.
Three new types are used instead of just one, since these directories
had three different types already (system_data_file, media_rw_data_file,
vendor_data_file), and this allows the policy to be a bit more precise.
A significant limitation is that /data/user/0 is currently being created
by init during early boot. Therefore, this CL doesn't help much for
/data/user/0, though it helps a lot for the other directories. As the
next step, I'll try to eliminate the /data/user/0 quirk. Anyway, this
CL is needed regardless of whether we're able to do that.
Test: Booted cuttlefish. Ran 'sm partition disk:253,32 private', then
created and deleted a user. Used 'ls -lZ' to check the relevant
SELinux labels on both internal and adoptable storage. Also did
similar tests on raven, with the addition of going through the
setup wizard and using an app that creates media files. No
relevant SELinux denials seen during any of this.
Bug: 156305599
Change-Id: I1fbdd180f56dd2fe4703763936f5850cef8ab0ba
2022-05-05 00:18:02 +02:00
|
|
|
-media_userdir_file
|
|
|
|
-system_userdir_file
|
|
|
|
-vendor_userdir_file
|
2018-03-02 11:52:56 +01:00
|
|
|
-system_app_data_file
|
|
|
|
-backup_data_file
|
|
|
|
-bootstat_data_file
|
|
|
|
-update_engine_data_file
|
|
|
|
-update_engine_log_data_file
|
2020-12-04 15:07:52 +01:00
|
|
|
-user_profile_root_file
|
2018-03-02 11:52:56 +01:00
|
|
|
-user_profile_data_file
|
2018-02-08 01:29:06 +01:00
|
|
|
# TODO(b/72998741) Remove vendor_data_file exemption. Further restricted in a
|
|
|
|
# subsequent neverallow. Currently only getattr and search are allowed.
|
|
|
|
-vendor_data_file
|
2019-06-14 00:05:15 +02:00
|
|
|
with_native_coverage(`-method_trace_data_file')
|
2018-02-08 01:29:06 +01:00
|
|
|
}:dir *;
|
2018-03-02 11:52:56 +01:00
|
|
|
neverallow traced_probes system_data_file:dir ~{ getattr userdebug_or_eng(`open read') search };
|
2019-06-14 00:05:15 +02:00
|
|
|
neverallow traced_probes {
|
|
|
|
data_file_type
|
|
|
|
-packages_list_file
|
|
|
|
with_native_coverage(`-method_trace_data_file')
|
2022-04-02 00:16:14 +02:00
|
|
|
-game_mode_intervention_list_file
|
2019-06-14 00:05:15 +02:00
|
|
|
}:file *;
|
2017-12-21 03:51:15 +01:00
|
|
|
|
|
|
|
# Only init is allowed to enter the traced_probes domain via exec()
|
|
|
|
neverallow { domain -init } traced_probes:process transition;
|
|
|
|
neverallow * traced_probes:process dyntransition;
|
2021-01-15 17:12:56 +01:00
|
|
|
|