8ed750e973
- Add write_logd, read_logd and control_logd macros added along with contexts for user space logd. - Specify above on domain wide, or service-by-service basis - Add logd rules. - deprecate access_logcat as unused. - 'allow <domain> zygote:unix_dgram_socket write;' rule added to deal with fd inheritance. ToDo: investigate means to allow references to close, and reopen in context of application or call setsockcreatecon() to label them in child context. Change-Id: I35dbb9d5122c5ed9b8c8f128abf24a871d6b26d8
34 lines
822 B
Text
34 lines
822 B
Text
# android user-space log manager
|
|
type logd, domain;
|
|
type logd_exec, exec_type, file_type;
|
|
|
|
init_daemon_domain(logd)
|
|
allow logd self:unix_stream_socket *;
|
|
|
|
allow logd self:capability { setuid setgid sys_nice };
|
|
|
|
r_dir_file(logd, domain)
|
|
|
|
userdebug_or_eng(`
|
|
# Debug output
|
|
type_transition logd device:file logd_debug;
|
|
allow logd device:dir rw_dir_perms;
|
|
allow logd logd_debug:file create_file_perms;
|
|
')
|
|
|
|
###
|
|
### Neverallow rules
|
|
###
|
|
### logd should NEVER do any of this
|
|
|
|
# Block device access.
|
|
neverallow logd dev_type:blk_file { read write };
|
|
|
|
# ptrace any other app
|
|
neverallow logd domain:process ptrace;
|
|
|
|
# Write to /system.
|
|
neverallow logd system_file:dir_file_class_set write;
|
|
|
|
# Write to files in /data/data or system files on /data
|
|
neverallow logd { app_data_file system_data_file }:dir_file_class_set write;
|