diff --git a/domain_deprecated.te b/domain_deprecated.te index ed88cca9957845cc6f23e4a46bf2979fc37366a3..4da7a31906ea9b2082847eb23395208338565ca4 100644 --- a/domain_deprecated.te +++ b/domain_deprecated.te @@ -57,6 +57,7 @@ r_dir_file(domain_deprecated, proc) r_dir_file(domain_deprecated, sysfs) r_dir_file(domain_deprecated, inotify) r_dir_file(domain_deprecated, cgroup) +r_dir_file(domain_deprecated, proc_meminfo) r_dir_file(domain_deprecated, proc_net) # Get SELinux enforcing status. diff --git a/file.te b/file.te index d205c56f5e3178bd566ed537e0f62db4f0010de1..1998669af012f2842b059d69a1060c2f634851bc 100644 --- a/file.te +++ b/file.te @@ -14,6 +14,7 @@ type qtaguid_proc, fs_type, mlstrustedobject; type proc_bluetooth_writable, fs_type; type proc_cpuinfo, fs_type; type proc_iomem, fs_type; +type proc_meminfo, fs_type; type proc_net, fs_type; type proc_sysrq, fs_type; type proc_uid_cputime_showstat, fs_type; diff --git a/genfs_contexts b/genfs_contexts index 3f865c4e4b7ed8203b34a924890cf96aa14f4f05..2700a945895ef4526fcc2a458732205e6ff66b41 100644 --- a/genfs_contexts +++ b/genfs_contexts @@ -3,6 +3,7 @@ genfscon rootfs / u:object_r:rootfs:s0 # proc labeling can be further refined (longest matching prefix). genfscon proc / u:object_r:proc:s0 genfscon proc /iomem u:object_r:proc_iomem:s0 +genfscon proc /meminfo u:object_r:proc_meminfo:s0 genfscon proc /net u:object_r:proc_net:s0 genfscon proc /net/xt_qtaguid/ctrl u:object_r:qtaguid_proc:s0 genfscon proc /cpuinfo u:object_r:proc_cpuinfo:s0 diff --git a/untrusted_app.te b/untrusted_app.te index 1b2d89e2847ec449f07a173192a5dc3529177963..fd55653677e4a3857c3c1ec0a4d7a0ef6893ff33 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -89,9 +89,13 @@ allow untrusted_app self:process ptrace; # for files. Suppress the denials when they occur. dontaudit untrusted_app exec_type:file getattr; -# TODO: access of /proc/meminfo, give specific label or switch to -# using meminfo service +# TODO: switch to meminfo service +allow untrusted_app proc_meminfo:file r_file_perms; + +# https://code.google.com/p/chromium/issues/detail?id=586021 allow untrusted_app proc:file r_file_perms; +auditallow untrusted_app proc:file r_file_perms; + # access /proc/net/xt_qtguid/stats r_dir_file(untrusted_app, proc_net)