xref: /aosp_15_r20/system/sepolicy/private/logpersist.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1typeattribute logpersist coredomain;
2
3# android debug log storage in logpersist domains (eng and userdebug only)
4userdebug_or_eng(`
5
6  r_dir_file(logpersist, cgroup)
7  r_dir_file(logpersist, cgroup_v2)
8
9  allow logpersist misc_logd_file:file create_file_perms;
10  allow logpersist misc_logd_file:dir rw_dir_perms;
11
12  allow logpersist self:global_capability_class_set sys_nice;
13  allow logpersist pstorefs:dir search;
14  allow logpersist pstorefs:file r_file_perms;
15
16  control_logd(logpersist)
17  unix_socket_connect(logpersist, logdr, logd)
18  get_prop(logpersist, logd_prop)
19  read_runtime_log_tags(logpersist)
20
21')
22
23# logcatd is a shell script that execs logcat with various parameters.
24allow logpersist shell_exec:file rx_file_perms;
25allow logpersist logcat_exec:file rx_file_perms;
26
27allowxperm logpersist misc_logd_file:file ioctl {
28  F2FS_IOC_RELEASE_COMPRESS_BLOCKS
29  FS_IOC_SETFLAGS
30};
31
32###
33### Neverallow rules
34###
35### logpersist should NEVER do any of this
36
37# Block device access.
38neverallow logpersist dev_type:blk_file { read write };
39
40# ptrace any other app
41neverallow logpersist domain:process ptrace;
42
43# Write to files in /data/data or system files on /data except misc_logd_file
44neverallow logpersist { app_data_file_type system_data_file }:dir_file_class_set write;
45
46# Only init should be allowed to enter the logpersist domain via exec()
47# Following is a list of debug domains we know that transition to logpersist
48# neverallow_with_undefined_domains {
49#   domain
50#   -init       # goldfish, logcatd, raft
51#   -mmi        # bat, mtp8996, msmcobalt
52#   -system_app # Smith.apk
53# } logpersist:process transition;
54neverallow * logpersist:process dyntransition;
55
56# logpersist is allowed to write to /data/misc/log for userdebug and eng builds
57neverallow logpersist {
58  file_type
59  userdebug_or_eng(`-misc_logd_file -coredump_file')
60  with_native_coverage(`-method_trace_data_file')
61}:file { create write append };
62neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_rw_file_perms;
63neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_perms;
64neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
65