8f75f76fbd
odrefresh is the process responsible for checking and creating ART compilation artifacts that live in the ART APEX data directory (/data/misc/apexdata/com.android.art). There are two types of change here: 1) enabling odrefresh to run dex2oat and write updated boot class path and system server AOT artifacts into the ART APEX data directory. 2) enabling the zygote and assorted diagnostic tools to use the updated AOT artifacts. odrefresh uses two file contexts: apex_art_data_file and apex_art_staging_data_file. When odrefresh invokes dex2oat, the generated files have the apex_art_staging_data_file label (which allows writing). odrefresh then moves these files from the staging area to their installation area and gives them the apex_art_data_file label. Bug: 160683548 Test: adb root && adb shell /apex/com.android.art/bin/odrefresh Change-Id: I9fa290e0c9c1b7b82be4dacb9f2f8cb8c11e4895
76 lines
2.8 KiB
Text
76 lines
2.8 KiB
Text
# Android heap profiling daemon. go/heapprofd.
|
|
#
|
|
# On user builds, this daemon is responsible for receiving the initial
|
|
# profiling configuration, finding matching target processes (if profiling by
|
|
# process name), and sending the activation signal to them (+ setting system
|
|
# properties for new processes to start profiling from startup). When profiling
|
|
# is triggered in a process, it spawns a private heapprofd subprocess (in its
|
|
# own SELinux domain), which will exclusively handle profiling of its parent.
|
|
#
|
|
# On debug builds, this central daemon performs profiling for all target
|
|
# processes (which talk directly to this daemon).
|
|
type heapprofd_exec, exec_type, file_type, system_file_type;
|
|
type heapprofd_tmpfs, file_type;
|
|
|
|
init_daemon_domain(heapprofd)
|
|
tmpfs_domain(heapprofd)
|
|
|
|
# Allow apps in other MLS contexts (for multi-user) to access
|
|
# shared memory buffers created by heapprofd.
|
|
typeattribute heapprofd_tmpfs mlstrustedobject;
|
|
|
|
set_prop(heapprofd, heapprofd_prop);
|
|
|
|
# Necessary for /proc/[pid]/cmdline access & sending signals.
|
|
typeattribute heapprofd mlstrustedsubject;
|
|
|
|
# Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
|
|
# SIGCHLD, which are controlled by separate permissions.
|
|
allow heapprofd self:capability kill;
|
|
|
|
# When scanning /proc/[pid]/cmdline to find matching processes for by-name
|
|
# profiling, only allowlisted domains will be allowed by SELinux. Avoid
|
|
# spamming logs with denials for entries that we can not access.
|
|
dontaudit heapprofd domain:dir { search open };
|
|
|
|
# Write trace data to the Perfetto traced daemon. This requires connecting to
|
|
# its producer socket and obtaining a (per-process) tmpfs fd.
|
|
perfetto_producer(heapprofd)
|
|
|
|
# When handling profiling for all processes, heapprofd needs to read
|
|
# executables/libraries/etc to do stack unwinding.
|
|
r_dir_file(heapprofd, nativetest_data_file)
|
|
r_dir_file(heapprofd, system_file_type)
|
|
r_dir_file(heapprofd, apex_art_data_file)
|
|
r_dir_file(heapprofd, apk_data_file)
|
|
r_dir_file(heapprofd, dalvikcache_data_file)
|
|
r_dir_file(heapprofd, vendor_file_type)
|
|
# Some dex files are not world-readable.
|
|
# We are still constrained by the SELinux rules above.
|
|
allow heapprofd self:global_capability_class_set dac_read_search;
|
|
|
|
# For checking profileability.
|
|
allow heapprofd packages_list_file:file r_file_perms;
|
|
|
|
# This is going to happen on user but is benign because central heapprofd
|
|
# does not actually need these permission.
|
|
# If the dac_read_search capability check is rejected, the kernel then tries
|
|
# to perform a dac_override capability check, so we need to dontaudit that
|
|
# as well.
|
|
dontaudit heapprofd self:global_capability_class_set { dac_read_search dac_override };
|
|
|
|
never_profile_heap(`{
|
|
bpfloader
|
|
init
|
|
kernel
|
|
keystore
|
|
llkd
|
|
logd
|
|
ueventd
|
|
vendor_init
|
|
vold
|
|
}')
|
|
|
|
full_treble_only(`
|
|
neverallow heapprofd vendor_file:file { no_w_file_perms no_x_file_perms };
|
|
')
|