On 08/27/2013 08:17 AM, Stephen Smalley wrote:
> On 08/26/2013 09:48 PM, Peck, Michael A wrote:
>> Hi,
>>
>> When testing a bunch of applications, I'm getting a denial like the below
>> from about 60% of the apps. I'm using a very recent master branch (AOSP +
>> SE for Android) on a Galaxy Nexus.
>> I don't see any recent, related changes to the SELinux policy so perhaps
>> there was a recent change in AOSP causing many apps to try to get the
>> attributes of /data/app? Is anyone else seeing anything similar?
>>
>> type=1400 msg=audit(1377395793.361:557): avc: denied { getattr } for
>> pid=27640 comm="id.nycsubwaymap" path="/data/app" dev=mmcblk0p12 ino=773681
>> scontext=u:r:untrusted_app:s0:c58,c256 tcontext=u:object_r:apk_data_file:s0
>> tclass=dir
>
> Interesting, I haven't seen that. Does it only happen with apps from
> Google Play or with any of the AOSP apps?
>
> I suppose we could add getattr to domain.te; we already allow search to
> apk_data_file:dir and r_file_perms to apk_data_file:file there for all
> domains. getattr only permits stat(2) so it isn't a big deal to permit it.
Technically, it permits stat(2), getxattr(2), listxattr(2), and certain
ioctl calls (e.g. GETFLAGS, GETVERSION).
--
This message was distributed to subscribers of the seandroid-list mailing list.
If you no longer wish to subscribe, send mail to [email protected] with
the words "unsubscribe seandroid-list" without quotes as the message.