blob: 0cc6e9660bd5bf7898c66776de9410efc87f089b [file] [log] [blame]
Inseob Kimff43be22021-06-07 16:56:56 +09001typeattribute logd coredomain;
2
3init_daemon_domain(logd)
4
Inseob Kim4eb56602021-07-09 15:51:12 +09005allow logd adbd:dir search;
6allow logd adbd:file { getattr open read };
7allow logd device:dir search;
8allow logd hwservicemanager:dir search;
9allow logd hwservicemanager:file { open read };
10allow logd init:dir search;
11allow logd init:fd use;
12allow logd init:file { getattr open read };
13allow logd kernel:dir search;
14allow logd kernel:file { getattr open read };
15allow logd kernel:system { syslog_mod syslog_read };
16allow logd keystore:dir search;
17allow logd keystore:file { getattr open read };
18allow logd linkerconfig_file:dir search;
19allow logd microdroid_manager:dir search;
20allow logd microdroid_manager:file { getattr open read };
21allow logd null_device:chr_file { open read };
22#allow logd proc_kmsg:file read;
23r_dir_file(logd, cgroup)
24r_dir_file(logd, cgroup_v2)
25r_dir_file(logd, proc_kmsg)
26r_dir_file(logd, proc_meminfo)
27allow logd self:fifo_file { read write };
28allow logd self:file { getattr open read };
29allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
30allow logd self:global_capability2_class_set syslog;
31#allow logd self:netlink_audit_socket getopt;
32allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
33allow logd kmsg_device:chr_file { getattr w_file_perms };
34r_dir_file(logd, domain)
35allow logd self:unix_stream_socket { accept getopt setopt shutdown };
36allow logd servicemanager:dir search;
37allow logd servicemanager:file { open read };
38allow logd tombstoned:dir search;
39allow logd tombstoned:file { getattr open read };
40allow logd ueventd:dir search;
41allow logd ueventd:file { getattr open read };
42control_logd(logd)
43read_runtime_log_tags(logd)