6a5fd26e7a
Bug: 171506470 Test: Build Change-Id: I8bf6c8833ecc65ca241fb9bc8be1b7b919825414
18 lines
589 B
Text
18 lines
589 B
Text
#
|
|
# /system/bin/auditctl executed for logd
|
|
#
|
|
# Performs maintenance of the kernel auditing system, including
|
|
# setting rate limits on SELinux denials.
|
|
#
|
|
|
|
type auditctl, domain, coredomain;
|
|
type auditctl_exec, file_type, system_file_type, exec_type;
|
|
|
|
# Uncomment the line below to put this domain into permissive
|
|
# mode. This helps speed SELinux policy development.
|
|
# userdebug_or_eng(`permissive auditctl;')
|
|
|
|
init_daemon_domain(auditctl)
|
|
|
|
allow auditctl self:global_capability_class_set audit_control;
|
|
allow auditctl self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
|