Skip to content
Snippets Groups Projects
Commit ea219e37 authored by Stephen Smalley's avatar Stephen Smalley
Browse files

Allow domains to stat and open their entrypoint executables.


Resolves denials such as:
 avc:  denied  { open } for  pid=2758 comm="mediaserver" name="mediaserver" dev="mmcblk0p22" ino=169 scontext=u:r:mediaserver:s0 tcontext=u:object_r:mediaserver_exec:s0 tclass=file
 avc:  denied  { getattr } for  pid=2758 comm="mediaserver" path="/system/bin/mediaserver" dev="mmcblk0p22" ino=169 scontext=u:r:mediaserver:s0 tcontext=u:object_r:mediaserver_exec:s0 tclass=file

Change-Id: Ifee9e6fa87ae933639ce0b1d69a2feee460cf31f
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 18f2b80e
No related branches found
No related tags found
No related merge requests found
...@@ -11,7 +11,7 @@ define(`domain_trans', ` ...@@ -11,7 +11,7 @@ define(`domain_trans', `
allow $1 $2:file { getattr open read execute }; allow $1 $2:file { getattr open read execute };
allow $1 $3:process transition; allow $1 $3:process transition;
# New domain is entered by executing the file. # New domain is entered by executing the file.
allow $3 $2:file { entrypoint read execute }; allow $3 $2:file { entrypoint open read execute getattr };
# New domain can send SIGCHLD to its caller. # New domain can send SIGCHLD to its caller.
allow $3 $1:process sigchld; allow $3 $1:process sigchld;
# Enable AT_SECURE, i.e. libc secure mode. # Enable AT_SECURE, i.e. libc secure mode.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment