fb0ed7fcc4
As virtualizationmanager holds references to IBoundDevice returned by vfio_handler, virtualizationmanager should also have permission to binder_call. Bug: 278008519 Test: boot microdroid with assigned devices Change-Id: I7b87de099b0731c386666cec215807dc39d8c89c
118 lines
5.7 KiB
Text
118 lines
5.7 KiB
Text
# Domain for a child process that manages virtual machines on behalf of its parent.
|
|
|
|
type virtualizationmanager, domain, coredomain;
|
|
type virtualizationmanager_exec, system_file_type, exec_type, file_type;
|
|
|
|
# Allow virtualizationmanager to communicate use, read and write over the adb connection.
|
|
allow virtualizationmanager adbd:fd use;
|
|
allow virtualizationmanager adbd:unix_stream_socket { getattr read write };
|
|
|
|
# Allow writing VM logs to the shell console
|
|
allow virtualizationmanager devpts:chr_file { read write getattr ioctl };
|
|
|
|
# Let the virtualizationmanager domain use Binder.
|
|
binder_use(virtualizationmanager)
|
|
|
|
# Let virtualizationmanager find and communicate with virtualizationservice.
|
|
allow virtualizationmanager virtualization_service:service_manager find;
|
|
binder_call(virtualizationmanager, virtualizationservice)
|
|
|
|
# Allow calling into the system server to find native services. "permission_service" to check
|
|
# permissions, and "package_native" for staged apex info.
|
|
binder_call(virtualizationmanager, system_server)
|
|
allow virtualizationmanager { package_native_service permission_service }:service_manager find;
|
|
|
|
# When virtualizationmanager execs a file with the crosvm_exec label, run it in the crosvm domain.
|
|
domain_auto_trans(virtualizationmanager, crosvm_exec, crosvm)
|
|
|
|
# Let virtualizationmanager kill crosvm.
|
|
allow virtualizationmanager crosvm:process sigkill;
|
|
|
|
# Let virtualizationmanager create files inside virtualizationservice's temporary directories.
|
|
allow virtualizationmanager virtualizationservice_data_file:dir rw_dir_perms;
|
|
allow virtualizationmanager virtualizationservice_data_file:{ file sock_file } create_file_perms;
|
|
|
|
# Let virtualizationmanager read and write files from its various clients, but not open them
|
|
# directly as they must be passed over Binder by the client.
|
|
allow virtualizationmanager apk_data_file:file { getattr read };
|
|
|
|
# Write access is needed for mutable partitions like instance.img
|
|
allow virtualizationmanager {
|
|
app_data_file
|
|
apex_compos_data_file
|
|
apex_virt_data_file
|
|
privapp_data_file
|
|
}:file { getattr read write };
|
|
|
|
# shell_data_file is used for automated tests and manual debugging.
|
|
allow virtualizationmanager shell_data_file:file { getattr read write };
|
|
|
|
# Allow virtualizationmanager to read apex-info-list.xml and access the APEX files listed there.
|
|
allow virtualizationmanager apex_info_file:file r_file_perms;
|
|
allow virtualizationmanager apex_data_file:dir search;
|
|
allow virtualizationmanager staging_data_file:file r_file_perms;
|
|
allow virtualizationmanager staging_data_file:dir search;
|
|
|
|
# Run derive_classpath in our domain
|
|
allow virtualizationmanager derive_classpath_exec:file rx_file_perms;
|
|
allow virtualizationmanager apex_mnt_dir:dir r_dir_perms;
|
|
# Ignore harmless denials on /proc/self/fd
|
|
dontaudit virtualizationmanager self:dir write;
|
|
|
|
# Let virtualizationmanager to accept vsock connection from the guest VMs
|
|
allow virtualizationmanager self:vsock_socket { create_socket_perms_no_ioctl listen accept };
|
|
|
|
# Allow virtualizationmanager to inspect all hypervisor capabilities.
|
|
get_prop(virtualizationmanager, hypervisor_prop)
|
|
get_prop(virtualizationmanager, hypervisor_restricted_prop)
|
|
|
|
# Allow virtualizationmanager to be read custom pvmfw.img configuration
|
|
userdebug_or_eng(`get_prop(virtualizationmanager, hypervisor_pvmfw_prop)')
|
|
dontaudit virtualizationmanager hypervisor_pvmfw_prop:file read;
|
|
neverallow { domain -init -dumpstate userdebug_or_eng(`-virtualizationmanager') } hypervisor_pvmfw_prop:file no_rw_file_perms;
|
|
|
|
# Allow virtualizationmanager to be read custom virtualizationmanager configuration
|
|
userdebug_or_eng(`get_prop(virtualizationmanager, hypervisor_virtualizationmanager_prop)')
|
|
dontaudit virtualizationmanager hypervisor_virtualizationmanager_prop:file read;
|
|
neverallow { domain -init -dumpstate userdebug_or_eng(`-virtualizationmanager') } hypervisor_virtualizationmanager_prop:file no_rw_file_perms;
|
|
|
|
# Allow virtualizationmanager service to talk to tombstoned to push guest ramdumps
|
|
unix_socket_connect(virtualizationmanager, tombstoned_crash, tombstoned)
|
|
|
|
# Append ramdumps to tombstone files passed as fds from tombstoned
|
|
allow virtualizationmanager tombstone_data_file:file { append getattr };
|
|
allow virtualizationmanager tombstoned:fd use;
|
|
|
|
# Allow virtualizationmanager to read AVF debug policy
|
|
allow virtualizationmanager sysfs_dt_avf:dir search;
|
|
allow virtualizationmanager sysfs_dt_avf:file r_file_perms;
|
|
|
|
# virtualizationmanager to be client of secretkeeper HAL. It ferries SecretManagement messages
|
|
# from pVM to HAL.
|
|
hal_client_domain(virtualizationmanager, hal_secretkeeper);
|
|
|
|
# Let virtualizationmanager open test artifacts under /data/local/tmp with file path.
|
|
# (e.g. custom debug policy)
|
|
userdebug_or_eng(`
|
|
allow virtualizationmanager shell_data_file:dir search;
|
|
allow virtualizationmanager shell_data_file:file open;
|
|
')
|
|
|
|
# Allow virtualizationmanager to read microdroid related files in vendor partition
|
|
r_dir_file(virtualizationmanager, vendor_microdroid_file)
|
|
|
|
# Do not allow writing vendor_microdroid_file from any process.
|
|
neverallow { domain recovery_only(`userdebug_or_eng(`-fastbootd')') } vendor_microdroid_file:dir no_w_dir_perms;
|
|
neverallow { domain recovery_only(`userdebug_or_eng(`-fastbootd')') } vendor_microdroid_file:file no_w_file_perms;
|
|
|
|
# Allow reading files under /proc/[crosvm pid]/, for collecting CPU & memory usage inside VM.
|
|
r_dir_file(virtualizationmanager, crosvm);
|
|
|
|
# For debug purposes we try to get the canonical path from /proc/self/fd/N. That triggers
|
|
# a harmless denial for CompOS log files, so ignore that.
|
|
dontaudit virtualizationmanager apex_module_data_file:dir search;
|
|
|
|
is_flag_enabled(RELEASE_AVF_ENABLE_DEVICE_ASSIGNMENT, `
|
|
# virtualizationmanager holds references to bound devices, returned from vfio_handler
|
|
binder_call(virtualizationmanager, vfio_handler)
|
|
')
|