75806ef3c5
Ideally, public should only contain APIs (types / attributes) for vendor. The other statements like allow/neverallow/typeattributes are regarded as implementation detail for platform and should be in private. Bug: 232023812 Test: m selinux_policy Test: diff <(git diff --staged | grep "^-" | cut -b2- | sort) \ <(git diff --staged | grep "^+" | cut -b2- | sort) Test: remove comments on plat_sepolicy.cil, replace base_typeattr_* to base_typeattr and then compare old and new plat_sepolicy.cil Change-Id: I5e7d2da4465ab0216de6bacdf03077d37f6ffe12
64 lines
2.3 KiB
Text
64 lines
2.3 KiB
Text
typeattribute logpersist coredomain;
|
|
|
|
# android debug log storage in logpersist domains (eng and userdebug only)
|
|
userdebug_or_eng(`
|
|
|
|
r_dir_file(logpersist, cgroup)
|
|
r_dir_file(logpersist, cgroup_v2)
|
|
|
|
allow logpersist misc_logd_file:file create_file_perms;
|
|
allow logpersist misc_logd_file:dir rw_dir_perms;
|
|
|
|
allow logpersist self:global_capability_class_set sys_nice;
|
|
allow logpersist pstorefs:dir search;
|
|
allow logpersist pstorefs:file r_file_perms;
|
|
|
|
control_logd(logpersist)
|
|
unix_socket_connect(logpersist, logdr, logd)
|
|
get_prop(logpersist, logd_prop)
|
|
read_runtime_log_tags(logpersist)
|
|
|
|
')
|
|
|
|
# logcatd is a shell script that execs logcat with various parameters.
|
|
allow logpersist shell_exec:file rx_file_perms;
|
|
allow logpersist logcat_exec:file rx_file_perms;
|
|
|
|
allowxperm logpersist misc_logd_file:file ioctl {
|
|
F2FS_IOC_RELEASE_COMPRESS_BLOCKS
|
|
FS_IOC_SETFLAGS
|
|
};
|
|
|
|
###
|
|
### Neverallow rules
|
|
###
|
|
### logpersist should NEVER do any of this
|
|
|
|
# Block device access.
|
|
neverallow logpersist dev_type:blk_file { read write };
|
|
|
|
# ptrace any other app
|
|
neverallow logpersist domain:process ptrace;
|
|
|
|
# Write to files in /data/data or system files on /data except misc_logd_file
|
|
neverallow logpersist { app_data_file_type system_data_file }:dir_file_class_set write;
|
|
|
|
# Only init should be allowed to enter the logpersist domain via exec()
|
|
# Following is a list of debug domains we know that transition to logpersist
|
|
# neverallow_with_undefined_domains {
|
|
# domain
|
|
# -init # goldfish, logcatd, raft
|
|
# -mmi # bat, mtp8996, msmcobalt
|
|
# -system_app # Smith.apk
|
|
# } logpersist:process transition;
|
|
neverallow * logpersist:process dyntransition;
|
|
|
|
# logpersist is allowed to write to /data/misc/log for userdebug and eng builds
|
|
neverallow logpersist {
|
|
file_type
|
|
userdebug_or_eng(`-misc_logd_file -coredump_file')
|
|
with_native_coverage(`-method_trace_data_file')
|
|
}:file { create write append };
|
|
neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_rw_file_perms;
|
|
neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_perms;
|
|
neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
|