diff --git a/private/auditctl.te b/private/auditctl.te new file mode 100644 index 000000000..f634d3d1d --- /dev/null +++ b/private/auditctl.te @@ -0,0 +1,18 @@ +# +# /system/bin/auditctl executed for logd +# +# Performs maintenance of the kernel auditing system, including +# setting rate limits on SELinux denials. +# + +type auditctl, domain, coredomain; +type auditctl_exec, file_type, system_file_type, exec_type; + +# Uncomment the line below to put this domain into permissive +# mode. This helps speed SELinux policy development. +# userdebug_or_eng(`permissive auditctl;') + +init_daemon_domain(auditctl) + +allow auditctl self:global_capability_class_set audit_control; +allow auditctl self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; diff --git a/private/file_contexts b/private/file_contexts index f4aefe3f1..a42041a2d 100644 --- a/private/file_contexts +++ b/private/file_contexts @@ -182,6 +182,7 @@ /system/lib(64)?(/.*)? u:object_r:system_lib_file:s0 /system/bin/atrace u:object_r:atrace_exec:s0 /system/bin/ashmemd u:object_r:ashmemd_exec:s0 +/system/bin/auditctl u:object_r:auditctl_exec:s0 /system/bin/bcc u:object_r:rs_exec:s0 /system/bin/blank_screen u:object_r:blank_screen_exec:s0 /system/bin/charger u:object_r:charger_exec:s0