Skip to content
Snippets Groups Projects
Commit e06e5363 authored by Stephen Smalley's avatar Stephen Smalley
Browse files

Allow inputflinger to call system_server.


Resolves denials such as:
avc:  denied  { read } for  pid=752 comm="ActivityManager" name="stat" dev="proc" ino=1878 scontext=u:r:system_server:s0 tcontext=u:r:inputflinger:s0 tclass=file
avc:  denied  { open } for  pid=752 comm="ActivityManager" name="stat" dev="proc" ino=1878 scontext=u:r:system_server:s0 tcontext=u:r:inputflinger:s0 tclass=file
avc:  denied  { search } for  pid=752 comm="ActivityManager" name="214" dev="proc" ino=1568 scontext=u:r:system_server:s0 tcontext=u:r:inputflinger:s0 tclass=dir
avc:  denied  { read } for  pid=752 comm="ActivityManager" name="stat" dev="proc" ino=1878 scontext=u:r:system_server:s0 tcontext=u:r:inputflinger:s0 tclass=file
avc:  denied  { call } for  pid=187 comm="Binder_2" scontext=u:r:inputflinger:s0 tcontext=u:r:system_server:s0 tclass=binder

Change-Id: I099d7dacf7116efa73163245597c3de629d358c1
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 01ba6834
No related branches found
No related tags found
No related merge requests found
...@@ -6,3 +6,5 @@ type inputflinger_exec, exec_type, file_type; ...@@ -6,3 +6,5 @@ type inputflinger_exec, exec_type, file_type;
init_daemon_domain(inputflinger) init_daemon_domain(inputflinger)
binder_use(inputflinger) binder_use(inputflinger)
binder_service(inputflinger) binder_service(inputflinger)
binder_call(inputflinger, system_server)
...@@ -132,6 +132,7 @@ binder_service(system_server) ...@@ -132,6 +132,7 @@ binder_service(system_server)
r_dir_file(system_server, mediaserver) r_dir_file(system_server, mediaserver)
r_dir_file(system_server, sdcardd) r_dir_file(system_server, sdcardd)
r_dir_file(system_server, surfaceflinger) r_dir_file(system_server, surfaceflinger)
r_dir_file(system_server, inputflinger)
# Use sockets received over binder from various services. # Use sockets received over binder from various services.
allow system_server mediaserver:tcp_socket rw_socket_perms; allow system_server mediaserver:tcp_socket rw_socket_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment