blob: 6f6ab5056499ef91978393580b3d04adbedc73f2 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute logpersist coredomain;
2
Mark Salyzynda62cb42016-08-10 11:10:02 -07003# android debug log storage in logpersist domains (eng and userdebug only)
4userdebug_or_eng(`
5
6 r_dir_file(logpersist, cgroup)
7
8 allow logpersist misc_logd_file:file create_file_perms;
9 allow logpersist misc_logd_file:dir rw_dir_perms;
10
Benjamin Gordon9b2e0cb2017-11-09 15:51:26 -070011 allow logpersist self:global_capability_class_set sys_nice;
Mark Salyzynda62cb42016-08-10 11:10:02 -070012 allow logpersist pstorefs:dir search;
13 allow logpersist pstorefs:file r_file_perms;
14
15 control_logd(logpersist)
16 unix_socket_connect(logpersist, logdr, logd)
Mark Salyzynd33a9a12016-11-07 15:11:39 -080017 read_runtime_log_tags(logpersist)
Mark Salyzynda62cb42016-08-10 11:10:02 -070018
19')
20
21# logpersist is allowed to write to /data/misc/log for userdebug and eng builds
Pirama Arumuga Nainarce9c0c52019-06-13 15:05:15 -070022neverallow logpersist {
23 file_type
24 userdebug_or_eng(`-misc_logd_file -coredump_file')
25 with_native_coverage(`-method_trace_data_file')
26}:file { create write append };
Tom Cherry77f8d4f2019-07-08 13:17:03 -070027neverallow { domain -init -dumpstate userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_rw_file_perms;
28neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_perms;
Mark Salyzyn384ce662016-09-13 09:33:35 -070029neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };