I got this audit message when running the Xray app
audit(1390917101.250:6): avc: denied { execute } for pid=5371
comm=4173796E635461736B202331
path="/data/data/com.duosecurity.xray/files/libashmem_v1.so" dev=dm-0
ino=155658 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:app_data_file:s0
tclass=file
It seems like it just uses its code, so it should be allowed to do that.
However, I look at the app.te and we only give app_domain create_file_perms
which doesn’t include executable permission.
# App sandbox file accesses.
allow appdomain app_data_file:dir create_dir_perms;
allow appdomain app_data_file:notdevfile_class_set create_file_perms;
So, why don’t we give app domain executable permission for its data file?
Thanks,
Tai
_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to
[email protected].