a9f1dc9708
For Guest: tombstone_tranmit needs permissions for: 1. keeping track of files being written on /data/tombstones. 2. creating vsock socket to talk to virtualizationservice (to forward these tombstones) These permissions will be similar to tombstone_tarnsmit on cuttlefish (device/google/cuttlefish/guest/monitoring/tombstone_transmit/tombstone_transmit.cpp) For Host (virtualizationservice) needs: 1. permission to connect to tombstoned. 2. permission to use fd belonging to tombstoned. 3. append and related permissions on tombstone_data file. Test: Tested by crashing a process in guest (started using microdroid demo) Change-Id: Ifd0728d792bda98ba139f18fa9406494a714879d
84 lines
3.6 KiB
Text
84 lines
3.6 KiB
Text
type virtualizationservice, domain, coredomain;
|
|
type virtualizationservice_exec, system_file_type, exec_type, file_type;
|
|
|
|
# When init runs a file labelled with virtualizationservice_exec, run it in the
|
|
# virtualizationservice domain.
|
|
init_daemon_domain(virtualizationservice)
|
|
|
|
# Let the virtualizationservice domain use Binder.
|
|
binder_use(virtualizationservice)
|
|
# ... and host a binder service
|
|
binder_service(virtualizationservice)
|
|
|
|
# Allow calling into the system server so that it can check permissions.
|
|
binder_call(virtualizationservice, system_server)
|
|
allow virtualizationservice permission_service:service_manager find;
|
|
# Allow virtualizationservice to access "package_native" service for staged apex info.
|
|
allow virtualizationservice package_native_service:service_manager find;
|
|
|
|
# Let the virtualizationservice domain register the virtualization_service with ServiceManager.
|
|
add_service(virtualizationservice, virtualization_service)
|
|
|
|
# When virtualizationservice execs a file with the crosvm_exec label, run it in the crosvm domain.
|
|
domain_auto_trans(virtualizationservice, crosvm_exec, crosvm)
|
|
|
|
# Let virtualizationservice kill crosvm.
|
|
allow virtualizationservice crosvm:process sigkill;
|
|
|
|
# Let virtualizationservice access its data directory.
|
|
allow virtualizationservice virtualizationservice_data_file:file create_file_perms;
|
|
allow virtualizationservice virtualizationservice_data_file:dir create_dir_perms;
|
|
|
|
# Allow to use fd (e.g. /dev/pts/0) inherited from adbd so that we can redirect output from
|
|
# crosvm to the console
|
|
allow virtualizationservice adbd:fd use;
|
|
allow virtualizationservice adbd:unix_stream_socket { read write };
|
|
|
|
# Let virtualizationservice read and write files from its various clients, but not open them
|
|
# directly as they must be passed over Binder by the client.
|
|
allow virtualizationservice apk_data_file:file { getattr read };
|
|
# Write access is needed for mutable partitions like instance.img
|
|
allow virtualizationservice {
|
|
app_data_file
|
|
apex_compos_data_file
|
|
}:file { getattr read write };
|
|
|
|
# shell_data_file is used for automated tests and manual debugging.
|
|
allow virtualizationservice shell_data_file:file { getattr read write };
|
|
|
|
# Allow virtualizationservice to read apex-info-list.xml and access the APEX files listed there.
|
|
allow virtualizationservice apex_info_file:file r_file_perms;
|
|
allow virtualizationservice apex_data_file:dir search;
|
|
allow virtualizationservice staging_data_file:file r_file_perms;
|
|
allow virtualizationservice staging_data_file:dir search;
|
|
|
|
# Run derive_classpath in our domain
|
|
allow virtualizationservice derive_classpath_exec:file rx_file_perms;
|
|
allow virtualizationservice apex_mnt_dir:dir r_dir_perms;
|
|
# Ignore harmless denials on /proc/self/fd
|
|
dontaudit virtualizationservice self:dir write;
|
|
|
|
# Let virtualizationservice to accept vsock connection from the guest VMs
|
|
allow virtualizationservice self:vsock_socket { create_socket_perms_no_ioctl listen accept };
|
|
|
|
# Allow virtualizationservice to read/write its own sysprop. Only the process can do so.
|
|
set_prop(virtualizationservice, virtualizationservice_prop)
|
|
|
|
# Allow virtualizationservice to inspect hypervisor capabilities.
|
|
get_prop(virtualizationservice, hypervisor_prop)
|
|
|
|
# Allow writing stats to statsd
|
|
unix_socket_send(virtualizationservice, statsdw, statsd)
|
|
|
|
# Allow virtualization service to talk to tombstoned to push guest tombstones
|
|
unix_socket_connect(virtualizationservice, tombstoned_crash, tombstoned)
|
|
|
|
# Append to tombstone files passed as fds from tombstoned
|
|
allow virtualizationservice tombstone_data_file:file { append getattr };
|
|
allow virtualizationservice tombstoned:fd use;
|
|
|
|
neverallow {
|
|
domain
|
|
-init
|
|
-virtualizationservice
|
|
} virtualizationservice_prop:property_service set;
|