Skip to content
Snippets Groups Projects
Commit 3bb1ccc2 authored by Geremy Condra's avatar Geremy Condra
Browse files

Fix long-tail denials in enforcing domains.

The specific denials we see are:

denied  { getattr } for  pid=169 comm=""installd"" path=""/data/data/com.android.providers.downloads/cache/downloadfile.jpeg"" dev=""mmcblk0p23"" ino=602861 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=file
denied  { fsetid } for  pid=598 comm=""netd"" capability=4  scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=capability
denied  { read } for  pid=209 comm=""installd"" name=""cache"" dev=""mmcblk0p28"" ino=81694 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=dir

Bug: 10786017
Change-Id: Ia5d0b6337f3de6a168ac0d5a77df2a1ac419ec29
parent 13a74a3a
No related branches found
No related tags found
No related merge requests found
...@@ -17,6 +17,7 @@ allow installd apk_tmp_file:file r_file_perms; ...@@ -17,6 +17,7 @@ allow installd apk_tmp_file:file r_file_perms;
allow installd system_file:file x_file_perms; allow installd system_file:file x_file_perms;
allow installd cgroup:dir create_dir_perms; allow installd cgroup:dir create_dir_perms;
allow installd download_file:dir { r_dir_perms }; allow installd download_file:dir { r_dir_perms };
allow installd download_file:file { r_file_perms };
dontaudit installd self:capability sys_admin; dontaudit installd self:capability sys_admin;
# Check validity of SELinux context before use. # Check validity of SELinux context before use.
selinux_check_context(installd) selinux_check_context(installd)
......
...@@ -3,7 +3,7 @@ type netd, domain; ...@@ -3,7 +3,7 @@ type netd, domain;
type netd_exec, exec_type, file_type; type netd_exec, exec_type, file_type;
init_daemon_domain(netd) init_daemon_domain(netd)
allow netd self:capability { net_admin net_raw kill }; allow netd self:capability { net_admin net_raw kill fsetid };
allow netd self:netlink_kobject_uevent_socket *; allow netd self:netlink_kobject_uevent_socket *;
allow netd self:netlink_route_socket *; allow netd self:netlink_route_socket *;
allow netd self:netlink_nflog_socket *; allow netd self:netlink_nflog_socket *;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment