blob: e1518103daa6c855e11c433b0bacf910c2545e25 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute logpersist coredomain;
2
Mark Salyzynda62cb42016-08-10 11:10:02 -07003# android debug log storage in logpersist domains (eng and userdebug only)
4userdebug_or_eng(`
5
6 r_dir_file(logpersist, cgroup)
Marco Ballesioaa4ce952021-02-11 15:18:11 -08007 r_dir_file(logpersist, cgroup_v2)
Mark Salyzynda62cb42016-08-10 11:10:02 -07008
9 allow logpersist misc_logd_file:file create_file_perms;
10 allow logpersist misc_logd_file:dir rw_dir_perms;
11
Benjamin Gordon9b2e0cb2017-11-09 15:51:26 -070012 allow logpersist self:global_capability_class_set sys_nice;
Mark Salyzynda62cb42016-08-10 11:10:02 -070013 allow logpersist pstorefs:dir search;
14 allow logpersist pstorefs:file r_file_perms;
15
16 control_logd(logpersist)
17 unix_socket_connect(logpersist, logdr, logd)
Jiyong Parkff304832021-11-22 14:18:03 +090018 get_prop(logpersist, logd_prop)
Mark Salyzynd33a9a12016-11-07 15:11:39 -080019 read_runtime_log_tags(logpersist)
Mark Salyzynda62cb42016-08-10 11:10:02 -070020
21')
22
23# logpersist is allowed to write to /data/misc/log for userdebug and eng builds
Pirama Arumuga Nainarce9c0c52019-06-13 15:05:15 -070024neverallow logpersist {
25 file_type
26 userdebug_or_eng(`-misc_logd_file -coredump_file')
27 with_native_coverage(`-method_trace_data_file')
28}:file { create write append };
Mike Ma08f494d2020-01-17 19:00:16 -080029neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_rw_file_perms;
Tom Cherry77f8d4f2019-07-08 13:17:03 -070030neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_perms;
Mark Salyzyn384ce662016-09-13 09:33:35 -070031neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };