blob: cde721a6de309e6d6188ed47a6189f9b92544781 [file] [log] [blame]
Mark Salyzyn8ed750e2013-11-12 15:34:52 -08001# android user-space log manager
2type logd, domain;
3type logd_exec, exec_type, file_type;
4
5init_daemon_domain(logd)
Mark Salyzyn8ed750e2013-11-12 15:34:52 -08006
Mark Salyzyn238a6542014-04-01 11:02:57 -07007allow logd self:capability { setuid setgid sys_nice audit_control };
8allow logd self:capability2 syslog;
9allow logd self:netlink_audit_socket { create_socket_perms nlmsg_write };
10allow logd kernel:system syslog_read;
Mark Salyzyn6252b632014-04-07 14:04:30 -070011allow logd kmsg_device:chr_file w_file_perms;
Mark Salyzyn8ed750e2013-11-12 15:34:52 -080012
13r_dir_file(logd, domain)
14
15userdebug_or_eng(`
16 # Debug output
17 type_transition logd device:file logd_debug;
18 allow logd device:dir rw_dir_perms;
19 allow logd logd_debug:file create_file_perms;
20')
21
22###
23### Neverallow rules
24###
25### logd should NEVER do any of this
26
27# Block device access.
28neverallow logd dev_type:blk_file { read write };
29
30# ptrace any other app
31neverallow logd domain:process ptrace;
32
33# Write to /system.
34neverallow logd system_file:dir_file_class_set write;
35
36# Write to files in /data/data or system files on /data
37neverallow logd { app_data_file system_data_file }:dir_file_class_set write;