blob: ab2c9c63f38d5855af89a2b5aaef150bdb7e2274 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute logpersist coredomain;
2
Mark Salyzynda62cb42016-08-10 11:10:02 -07003# android debug log storage in logpersist domains (eng and userdebug only)
4userdebug_or_eng(`
5
6 r_dir_file(logpersist, cgroup)
Marco Ballesioaa4ce952021-02-11 15:18:11 -08007 r_dir_file(logpersist, cgroup_v2)
Mark Salyzynda62cb42016-08-10 11:10:02 -07008
9 allow logpersist misc_logd_file:file create_file_perms;
10 allow logpersist misc_logd_file:dir rw_dir_perms;
11
Benjamin Gordon9b2e0cb2017-11-09 15:51:26 -070012 allow logpersist self:global_capability_class_set sys_nice;
Mark Salyzynda62cb42016-08-10 11:10:02 -070013 allow logpersist pstorefs:dir search;
14 allow logpersist pstorefs:file r_file_perms;
15
16 control_logd(logpersist)
17 unix_socket_connect(logpersist, logdr, logd)
Mark Salyzynd33a9a12016-11-07 15:11:39 -080018 read_runtime_log_tags(logpersist)
Mark Salyzynda62cb42016-08-10 11:10:02 -070019
20')
21
22# logpersist is allowed to write to /data/misc/log for userdebug and eng builds
Pirama Arumuga Nainarce9c0c52019-06-13 15:05:15 -070023neverallow logpersist {
24 file_type
25 userdebug_or_eng(`-misc_logd_file -coredump_file')
26 with_native_coverage(`-method_trace_data_file')
27}:file { create write append };
Mike Ma08f494d2020-01-17 19:00:16 -080028neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_rw_file_perms;
Tom Cherry77f8d4f2019-07-08 13:17:03 -070029neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_perms;
Mark Salyzyn384ce662016-09-13 09:33:35 -070030neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };