platform_system_sepolicy/microdroid/system/private/logd.te
Oleg Matcovschi f21542906d microdroid: dont audit access to event-log-tags
Bug: 225223271
Test: run microdroid, confirm no denial messages
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I505402c5ff886c18c06133825f9a7ced84c17c1f
2022-03-23 08:55:19 -07:00

44 lines
1.6 KiB
Text

typeattribute logd coredomain;
init_daemon_domain(logd)
allow logd adbd:dir search;
allow logd adbd:file { getattr open read };
allow logd device:dir search;
allow logd init:dir search;
allow logd init:fd use;
allow logd init:file { getattr open read };
allow logd kernel:dir search;
allow logd kernel:file { getattr open read };
allow logd kernel:system { syslog_mod syslog_read };
allow logd linkerconfig_file:dir search;
allow logd microdroid_manager:dir search;
allow logd microdroid_manager:file { getattr open read };
allow logd null_device:chr_file { open read };
#allow logd proc_kmsg:file read;
r_dir_file(logd, cgroup)
r_dir_file(logd, cgroup_v2)
r_dir_file(logd, proc_kmsg)
r_dir_file(logd, proc_meminfo)
allow logd self:fifo_file { read write };
allow logd self:file { getattr open read };
allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
allow logd self:global_capability2_class_set syslog;
#allow logd self:netlink_audit_socket getopt;
allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
allow logd kmsg_device:chr_file { getattr w_file_perms };
r_dir_file(logd, domain)
allow logd self:unix_stream_socket { accept getopt setopt shutdown };
allow logd servicemanager:dir search;
allow logd servicemanager:file { open read };
allow logd tombstoned:dir search;
allow logd tombstoned:file { getattr open read };
allow logd ueventd:dir search;
allow logd ueventd:file { getattr open read };
control_logd(logd)
read_runtime_log_tags(logd)
# Logd sets defaults if certain properties are empty.
set_prop(logd, logd_prop)
dontaudit domain runtime_event_log_tags_file:file { map open read };