Fix more long-tail denials.
For additional context- The denials related to init_tmpfs are of the form: denied { read } for pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file (the path above is "/dev/ashmem/dalvik-heap (deleted)") The denials related to executing things from the dalvik cache are of the form: enied { execute } for pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file The denials related to isolated_app and the init socket are: denied { getattr } for pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket The getopt denials for the aforementioned socket are: denied { getopt } for pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
This commit is contained in:
parent
d615ef3477
commit
217f8afc18
3 changed files with 12 additions and 0 deletions
|
@ -21,3 +21,9 @@ r_dir_file(appdomain, isolated_app)
|
||||||
# Chrome works, may need to be updated as more apps using isolated services
|
# Chrome works, may need to be updated as more apps using isolated services
|
||||||
# are examined.
|
# are examined.
|
||||||
allow isolated_app appdomain:unix_stream_socket { read write };
|
allow isolated_app appdomain:unix_stream_socket { read write };
|
||||||
|
|
||||||
|
allow isolated_app dalvikcache_data_file:file execute;
|
||||||
|
allow isolated_app apk_data_file:dir getattr;
|
||||||
|
|
||||||
|
allow isolated_app init:unix_stream_socket { read write getattr getopt };
|
||||||
|
allow isolated_app init_tmpfs:file read;
|
||||||
|
|
|
@ -6,3 +6,4 @@ unconfined_domain(kernel)
|
||||||
relabelto_domain(kernel)
|
relabelto_domain(kernel)
|
||||||
|
|
||||||
allow kernel {fs_type dev_type file_type}:dir_file_class_set relabelto;
|
allow kernel {fs_type dev_type file_type}:dir_file_class_set relabelto;
|
||||||
|
allow kernel unlabeled:filesystem mount;
|
||||||
|
|
|
@ -14,5 +14,10 @@ allow system self:zygote { specifyids specifyrlimits specifyseinfo };
|
||||||
|
|
||||||
allow system backup_data_file:dir relabelto;
|
allow system backup_data_file:dir relabelto;
|
||||||
allow system cache_backup_file:dir relabelto;
|
allow system cache_backup_file:dir relabelto;
|
||||||
|
allow system anr_data_file:dir relabelto;
|
||||||
|
allow system system_data_file:dir relabelto;
|
||||||
allow system apk_data_file:file relabelto;
|
allow system apk_data_file:file relabelto;
|
||||||
allow system apk_tmp_file:file relabelto;
|
allow system apk_tmp_file:file relabelto;
|
||||||
|
allow system cache_backup_file:file relabelto;
|
||||||
|
allow system apk_private_tmp_file:file relabelto;
|
||||||
|
allow system wallpaper_file:file relabelto;
|
||||||
|
|
Loading…
Reference in a new issue