Skip to content
Snippets Groups Projects
Commit e477c781 authored by Joel Galenson's avatar Joel Galenson
Browse files

Hide sys_rawio SELinux denials.

We often see the following denials:

avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0

These are benign, so we are hiding them.

Bug: 37778617
Test: Boot device.
Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
(cherry picked from commit bf4afae1)
parent 2ccd99a5
No related branches found
No related tags found
No related merge requests found
...@@ -4,3 +4,5 @@ binder_call(hal_bootctl_server, hal_bootctl_client) ...@@ -4,3 +4,5 @@ binder_call(hal_bootctl_server, hal_bootctl_client)
add_hwservice(hal_bootctl_server, hal_bootctl_hwservice) add_hwservice(hal_bootctl_server, hal_bootctl_hwservice)
allow hal_bootctl_client hal_bootctl_hwservice:hwservice_manager find; allow hal_bootctl_client hal_bootctl_hwservice:hwservice_manager find;
dontaudit hal_bootctl self:capability sys_rawio;
...@@ -24,6 +24,7 @@ wakelock_use(update_engine); ...@@ -24,6 +24,7 @@ wakelock_use(update_engine);
# Ignore these denials. # Ignore these denials.
dontaudit update_engine kernel:process setsched; dontaudit update_engine kernel:process setsched;
dontaudit update_engine self:capability sys_rawio;
# Allow using persistent storage in /data/misc/update_engine. # Allow using persistent storage in /data/misc/update_engine.
allow update_engine update_engine_data_file:dir create_dir_perms; allow update_engine update_engine_data_file:dir create_dir_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment