Update sepolicy to add label for /data/misc/perfprofd.
Bug: 19483574
(cherry picked from commit 7d66f783c2ddea4dd5f9fcd91b2589ab74e30f8a)
Change-Id: If617e29b6fd36c88c157941bc9e11cf41329da48
diff --git a/domain.te b/domain.te
index 9614ab3..bf3295c 100644
--- a/domain.te
+++ b/domain.te
@@ -182,6 +182,7 @@
-dumpstate
-system_server
userdebug_or_eng(`-procrank')
+ userdebug_or_eng(`-perfprofd')
} self:capability sys_ptrace;
# Limit device node creation to these whitelisted domains.
diff --git a/file.te b/file.te
index e6ad9e2..815c892 100644
--- a/file.te
+++ b/file.te
@@ -116,6 +116,7 @@
type wifi_data_file, file_type, data_file_type;
type zoneinfo_data_file, file_type, data_file_type;
type vold_data_file, file_type, data_file_type;
+type perfprofd_data_file, file_type, data_file_type, mlstrustedobject;
# Compatibility with type names used in vanilla Android 4.3 and 4.4.
typealias audio_data_file alias audio_firmware_file;
diff --git a/file_contexts b/file_contexts
index 48fbb5a..9575fb0 100644
--- a/file_contexts
+++ b/file_contexts
@@ -248,6 +248,7 @@
/data/misc/wifi/hostapd(/.*)? u:object_r:wpa_socket:s0
/data/misc/zoneinfo(/.*)? u:object_r:zoneinfo_data_file:s0
/data/misc/vold(/.*)? u:object_r:vold_data_file:s0
+/data/misc/perfprofd(/.*)? u:object_r:perfprofd_data_file:s0
/data/system/heapdump(/.*)? u:object_r:heapdump_data_file:s0
# Bootchart data
diff --git a/perfprofd.te b/perfprofd.te
index 30b438b..c9f7f35 100644
--- a/perfprofd.te
+++ b/perfprofd.te
@@ -18,19 +18,13 @@
allow perfprofd system_file:file rx_file_perms;
# perfprofd reads a config file from /data/data/com.google.android.gms/files
- # opens a file for writing in the same directory
- allow perfprofd app_data_file:file rw_file_perms;
- allow perfprofd app_data_file:dir rw_dir_perms;
-
- # perfprofd looks for the existence of a semaphore file to determine
- # whether collection is enabled/disabled (where the semphore file is
- # created by some other entity, e.g. gms)
+ allow perfprofd app_data_file:file r_file_perms;
allow perfprofd app_data_file:dir search;
allow perfprofd self:capability { dac_override };
- # perfprofd reads profiles from /data/data/..., encodes them,
- # and then dumps the encoded profiles back to /data/data/....
- allow perfprofd app_data_file:dir_file_class_set create_file_perms;
+ # perfprofd opens a file for writing in /data/misc/perfprofd
+ allow perfprofd perfprofd_data_file:file create_file_perms;
+ allow perfprofd perfprofd_data_file:dir rw_dir_perms;
# perfprofd uses the system log
read_logd(perfprofd);
@@ -39,6 +33,17 @@
# simpleperf uses ioctl() to turn on kernel perf events measurements
allow perfprofd self:capability sys_admin;
+ # simpleperf needs to examine /proc to collect task/thread info
+ r_dir_file(perfprofd, domain)
+
+ # simpleperf needs to access /proc/<pid>/exec
+ allow perfprofd self:capability { sys_resource sys_ptrace };
+ neverallow perfprofd domain:process ptrace;
+
+ # simpleperf needs open/read any file that turns up in a profile
+ # to see whether it has a build ID
+ allow perfprofd exec_type:file r_file_perms;
+
# simpleperf is going to execute "sleep"
allow perfprofd toolbox_exec:file x_file_perms;
diff --git a/untrusted_app.te b/untrusted_app.te
index 215898f..7a9e2dd 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -104,6 +104,13 @@
# #define SIOCSIWCOMMIT 0x8B00 /* Commit pending changes to driver */
allow untrusted_app self:{ rawip_socket tcp_socket udp_socket } { 0x8900-0x8926 0x8928-0x89ff 0x8b00 };
+# Allow GMS core to access perfprofd output, which is stored
+# in /data/misc/perfprofd/. GMS core will need to list all
+# data stored in that directory to process them one by one.
+userdebug_or_eng(`
+ allow untrusted_app perfprofd_data_file:file r_file_perms;
+ allow untrusted_app perfprofd_data_file:dir r_dir_perms;
+')
###
### neverallow rules
###