platform_system_sepolicy/prebuilts/api/31.0/private/profcollectd.te
Jeff Sharkey 6a5fd26e7a platform/system/sepolicy - SEPolicy Prebuilts for S
Bug: 171506470
Test: Build
Change-Id: I8bf6c8833ecc65ca241fb9bc8be1b7b919825414
2021-06-01 06:49:23 -06:00

61 lines
2.5 KiB
Text

# profcollectd - hardware profile collection daemon
type profcollectd, domain, coredomain, mlstrustedsubject;
type profcollectd_exec, system_file_type, exec_type, file_type;
userdebug_or_eng(`
init_daemon_domain(profcollectd)
# profcollectd opens a file for writing in /data/misc/profcollectd.
allow profcollectd profcollectd_data_file:file create_file_perms;
allow profcollectd profcollectd_data_file:dir create_dir_perms;
# Allow profcollectd full use of perf_event_open(2), to enable system wide profiling.
allow profcollectd self:perf_event { cpu kernel open read write };
# Allow profcollectd to scan through /proc/pid for all processes.
r_dir_file(profcollectd, domain)
# Allow profcollectd to read executable binaries.
allow profcollectd system_file_type:file r_file_perms;
allow profcollectd vendor_file_type:file r_file_perms;
# Allow profcollectd to search for and read kernel modules.
allow profcollectd vendor_file:dir r_dir_perms;
allow profcollectd vendor_kernel_modules:file r_file_perms;
# Allow profcollectd to read system bootstrap libs.
allow profcollectd system_bootstrap_lib_file:dir search;
allow profcollectd system_bootstrap_lib_file:file r_file_perms;
# Allow profcollectd to access tracefs.
allow profcollectd debugfs_tracing:dir r_dir_perms;
allow profcollectd debugfs_tracing:file rw_file_perms;
allow profcollectd debugfs_tracing_debug:dir r_dir_perms;
allow profcollectd debugfs_tracing_debug:file rw_file_perms;
# Allow profcollectd to write to perf_event_paranoid under /proc.
allow profcollectd proc_perf:file write;
# Allow profcollectd to access cs_etm sysfs.
r_dir_file(profcollectd, sysfs_devices_cs_etm)
# Allow profcollectd to ptrace.
allow profcollectd self:global_capability_class_set sys_ptrace;
# Allow profcollectd to read its system properties.
get_prop(profcollectd, device_config_profcollect_native_boot_prop)
set_prop(profcollectd, profcollectd_node_id_prop)
# Allow profcollectd to publish a binder service and make binder calls.
binder_use(profcollectd)
add_service(profcollectd, profcollectd_service)
# Allow to temporarily lift the kptr_restrict setting and get kernel start address
# by reading /proc/kallsyms, get module start address by reading /proc/modules.
set_prop(profcollectd, lower_kptr_restrict_prop)
allow profcollectd proc_kallsyms:file r_file_perms;
allow profcollectd proc_modules:file r_file_perms;
# Allow profcollectd to read kernel build id.
allow profcollectd sysfs_kernel_notes:file r_file_perms;
')