b10ff337bf
Selinux violations while calling dump() on statsd by bugreport. avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1 denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1 avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 Test: manual Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
90 lines
2.6 KiB
Text
90 lines
2.6 KiB
Text
type statsd, domain;
|
|
typeattribute statsd coredomain;
|
|
|
|
init_daemon_domain(statsd)
|
|
|
|
type statsd_exec, exec_type, file_type;
|
|
binder_use(statsd)
|
|
|
|
# Allow statsd to scan through /proc/pid for all processes.
|
|
r_dir_file(statsd, domain)
|
|
|
|
# Allow executing files on system, such as running a shell or running:
|
|
# /system/bin/toolbox
|
|
# /system/bin/logcat
|
|
# /system/bin/dumpsys
|
|
allow statsd devpts:chr_file { getattr ioctl read write };
|
|
allow statsd shell_exec:file rx_file_perms;
|
|
allow statsd system_file:file execute_no_trans;
|
|
allow statsd toolbox_exec:file rx_file_perms;
|
|
|
|
userdebug_or_eng(`
|
|
allow statsd su:fifo_file read;
|
|
')
|
|
|
|
# Create, read, and write into /data/misc/stats-data, /data/misc/stats-system.
|
|
allow statsd stats_data_file:dir create_dir_perms;
|
|
allow statsd stats_data_file:file create_file_perms;
|
|
|
|
# Allow statsd to make binder calls to any binder service.
|
|
binder_call(statsd, appdomain)
|
|
binder_call(statsd, incidentd)
|
|
binder_call(statsd, statscompanion_service)
|
|
binder_call(statsd, system_server)
|
|
|
|
# Allow logd access.
|
|
read_logd(statsd)
|
|
control_logd(statsd)
|
|
|
|
# Allow to control Perfetto traced and consume its traces.
|
|
unix_socket_connect(statsd, traced_consumer, traced)
|
|
|
|
# Grant statsd with permissions to register the services.
|
|
allow statsd {
|
|
statscompanion_service
|
|
app_api_service
|
|
system_api_service
|
|
}:service_manager find;
|
|
|
|
# Only statsd can publish the binder service.
|
|
add_service(statsd, stats_service)
|
|
|
|
# Allow pipes from (and only from) stats.
|
|
allow statsd stats:fd use;
|
|
allow statsd stats:fifo_file write;
|
|
|
|
# Allow statsd to send dump info to dumpstate
|
|
allow statsd dumpstate:fd use;
|
|
allow statsd dumpstate:fifo_file { getattr write };
|
|
|
|
# Allow statsd to call back to stats with status updates.
|
|
binder_call(statsd, stats)
|
|
|
|
# Allow access to with hardware layer and process stats.
|
|
allow statsd proc_uid_cputime_showstat:file { getattr open read };
|
|
hal_client_domain(statsd, hal_power)
|
|
|
|
###
|
|
### neverallow rules
|
|
###
|
|
|
|
# Only system_server, system_app, traceur_app, and stats command can find the stats service.
|
|
neverallow {
|
|
domain
|
|
-dumpstate
|
|
-priv_app
|
|
-shell
|
|
-stats
|
|
-statsd
|
|
-system_app
|
|
-system_server
|
|
userdebug_or_eng(`-traceur_app')
|
|
} stats_service:service_manager find;
|
|
|
|
# Only statsd and the other root services in limited circumstances.
|
|
# can get to the files in /data/misc/stats-data, /data/misc/stats-service.
|
|
# Other services are prohibitted from accessing the file.
|
|
neverallow { domain -statsd -init -vold -vendor_init } stats_data_file:file *;
|
|
|
|
# Limited access to the directory itself.
|
|
neverallow { domain -statsd -init -vold -vendor_init } stats_data_file:dir *;
|