Merge "remove syslog_* from unconfined"
diff --git a/app.te b/app.te
index 296a536..6116757 100644
--- a/app.te
+++ b/app.te
@@ -317,9 +317,9 @@
proc:dir_file_class_set write;
# Access to syslog(2) or /proc/kmsg.
-neverallow { appdomain -system_app -unconfineddomain }
+neverallow { appdomain -system_app }
kernel:system { syslog_mod syslog_console };
-neverallow { appdomain -system_app -unconfineddomain -shelldomain }
+neverallow { appdomain -system_app -shelldomain }
kernel:system syslog_read;
# Ability to perform any filesystem operation other than statfs(2).
diff --git a/init.te b/init.te
index e94ca47..028c461 100644
--- a/init.te
+++ b/init.te
@@ -12,6 +12,7 @@
allow init fs_type:filesystem *;
allow init {fs_type dev_type file_type}:dir_file_class_set relabelto;
allow init kernel:security load_policy;
+allow init kernel:system syslog_mod;
allow init usermodehelper:file rw_file_perms;
allow init proc_security:file rw_file_perms;
diff --git a/unconfined.te b/unconfined.te
index 326904a..d4009f0 100644
--- a/unconfined.te
+++ b/unconfined.te
@@ -19,7 +19,7 @@
allow unconfineddomain self:capability ~{ sys_ptrace sys_rawio mknod sys_module audit_write audit_control linux_immutable };
allow unconfineddomain self:capability2 ~{ mac_override mac_admin };
allow unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot setbool setsecparam };
-allow unconfineddomain kernel:system *;
+allow unconfineddomain kernel:system ~{ syslog_read syslog_mod syslog_console };
allow unconfineddomain domain:process ~{ execmem execstack execheap ptrace transition dyntransition setexec setfscreate setcurrent setkeycreate setsockcreate };
allow unconfineddomain domain:fd *;
allow unconfineddomain domain:dir r_dir_perms;