blob: 62d41969f52262fc50111d89633bd0d95d7ed227 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute logd coredomain;
2
dcashmancc39f632016-07-22 13:13:11 -07003init_daemon_domain(logd)
dcashman2e00e632016-10-12 14:58:09 -07004
Inseob Kim55e5c9b2020-03-04 17:20:35 +09005# Access device logging gating property
6get_prop(logd, device_logging_prop)
7
dcashman2e00e632016-10-12 14:58:09 -07008# logd is not allowed to write anywhere other than /data/misc/logd, and then
9# only on userdebug or eng builds
Mark Salyzynd33a9a12016-11-07 15:11:39 -080010neverallow logd {
11 file_type
Mark Salyzynd33a9a12016-11-07 15:11:39 -080012 -runtime_event_log_tags_file
Wenhao Wang6a656c02022-01-11 15:16:12 -080013 # shell_data_file access is needed to dump bugreports
14 -shell_data_file
Mark Salyzyn384ce662016-09-13 09:33:35 -070015 userdebug_or_eng(`-coredump_file -misc_logd_file')
Pirama Arumuga Nainarce9c0c52019-06-13 15:05:15 -070016 with_native_coverage(`-method_trace_data_file')
Mark Salyzynd33a9a12016-11-07 15:11:39 -080017}:file { create write append };
18
19# protect the event-log-tags file
20neverallow {
21 domain
22 -appdomain # covered below
23 -bootstat
24 -dumpstate
Mark Salyzyn384ce662016-09-13 09:33:35 -070025 -init
Mark Salyzynd33a9a12016-11-07 15:11:39 -080026 -logd
27 userdebug_or_eng(`-logpersist')
28 -servicemanager
29 -system_server
30 -surfaceflinger
31 -zygote
32} runtime_event_log_tags_file:file no_rw_file_perms;
33
34neverallow {
35 appdomain
36 -bluetooth
37 -platform_app
38 -priv_app
39 -radio
40 -shell
41 userdebug_or_eng(`-su')
42 -system_app
43} runtime_event_log_tags_file:file no_rw_file_perms;
Wenhao Wang6a656c02022-01-11 15:16:12 -080044
45# Only binder communication between logd and system_server is allowed
46binder_use(logd)
47binder_service(logd)
48binder_call(logd, system_server)
49
50add_service(logd, logd_service)
51allow logd logcat_service:service_manager find;