log: avc: denied { getattr } for comm="y.silentlogging" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0 avc: denied { search } for comm="y.silentlogging" name="com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0 denied { read } for comm="y.silentlogging" name="u:object_r:vendor_slog_prop:s0" dev="tmpfs" ino=338 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_prop:s0 tclass=file permissive=0 avc: denied { search } for comm="y.silentlogging" name="slog" dev="dm-42" ino=314 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0 avc: denied { read } for comm="y.silentlogging" name="u:object_r:default_prop:s0" dev="tmpfs" ino=150 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 pid=7322 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0 avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:r:dmd:s0 tclass=binder permissive=0 avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:r:sced:s0 tclass=binder permissive=0 avc: denied { read } for comm="getenforce" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=0 avc: denied { set } for property=persist.vendor.modem.logging.shannon_app pid=7279 uid=1000 gid=1000 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=0' avc: denied { call } for comm="HwBinder:1001_1" scontext=u:r:sced:s0 tcontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tclass=binder permissive=0 avc: denied { call } for scontext=u:r:dmd:s0 tcontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tclass=binder permissive=0 avc: denied { getattr } for comm="tlogging:remote" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_silentlogging_remote_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0 avc: denied { read } for name="slog" dev="dm-42" ino=314 scontext=u:r:vendor_silentlogging_remote_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0 Test: flash TH build then run basic test of silent logging app Bug: 220847487 Change-Id: Ib5ac1e796e8e816d024cebc584b5699ab8ed1162
32 lines
1.1 KiB
Text
32 lines
1.1 KiB
Text
type dmd, domain;
|
|
type dmd_exec, vendor_file_type, exec_type, file_type;
|
|
init_daemon_domain(dmd)
|
|
|
|
# Grant to access serial device for external logging tool
|
|
allow dmd serial_device:chr_file rw_file_perms;
|
|
|
|
# Grant to access radio device
|
|
allow dmd radio_device:chr_file rw_file_perms;
|
|
|
|
# Grant to access slog dir/file
|
|
allow dmd vendor_slog_file:dir create_dir_perms;
|
|
allow dmd vendor_slog_file:file create_file_perms;
|
|
|
|
# Grant to access tcp socket
|
|
allow dmd node:tcp_socket node_bind;
|
|
allow dmd self:tcp_socket { create_socket_perms_no_ioctl listen accept bind };
|
|
|
|
# Grant to access log related properties
|
|
set_prop(dmd, vendor_diag_prop)
|
|
set_prop(dmd, vendor_slog_prop)
|
|
set_prop(dmd, vendor_modem_prop)
|
|
get_prop(dmd, vendor_persist_config_default_prop)
|
|
|
|
# Grant to access hwservice manager
|
|
get_prop(dmd, hwservicemanager_prop)
|
|
allow dmd hidl_base_hwservice:hwservice_manager add;
|
|
allow dmd hal_vendor_oem_hwservice:hwservice_manager { add find };
|
|
binder_call(dmd, hwservicemanager)
|
|
binder_call(dmd, modem_diagnostic_app)
|
|
binder_call(dmd, modem_logging_control)
|
|
binder_call(dmd, vendor_telephony_silentlogging_app)
|