diff options
author | Joel Galenson | 2018-01-24 15:56:28 -0600 |
---|---|---|
committer | Joel Galenson | 2018-01-25 12:07:19 -0600 |
commit | b050dccdd86bed1e9de9be2ebf9222d7032eb221 (patch) | |
tree | e37ddf7e3a9b455ffe5f5ad9a404dde60a0a1f33 /private | |
parent | 715c3a78d29c9b2c026e77f82f9895d87e8801a8 (diff) | |
download | system-sepolicy-b050dccdd86bed1e9de9be2ebf9222d7032eb221.tar.gz system-sepolicy-b050dccdd86bed1e9de9be2ebf9222d7032eb221.tar.xz system-sepolicy-b050dccdd86bed1e9de9be2ebf9222d7032eb221.zip |
Suppress denials from idmap reading installd's files.
We are occasionally seeing the following SELinux denial:
avc: denied { read } for comm="idmap" path="/proc/947/mounts" scontext=u:r:idmap:s0 tcontext=u:r:installd:s0 tclass=file
This commit suppresses that exact denial.
We believe this is occurring when idmap is forked from installd, which is reading its mounts file in another thread.
Bug: 72444813
Test: Boot Walleye and test wifi and camera.
Change-Id: I3440e4b00c7e5a708b562a93b304aa726b6a3ab9
Diffstat (limited to 'private')
-rw-r--r-- | private/bug_map | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/private/bug_map b/private/bug_map index 6bc55e5b..2b970dd6 100644 --- a/private/bug_map +++ b/private/bug_map | |||
@@ -9,4 +9,3 @@ hal_graphics_allocator_default unlabeled dir 70180742 | |||
9 | surfaceflinger unlabeled dir 68864350 | 9 | surfaceflinger unlabeled dir 68864350 |
10 | hal_graphics_composer_default unlabeled dir 68864350 | 10 | hal_graphics_composer_default unlabeled dir 68864350 |
11 | bootanim unlabeled dir 68864350 | 11 | bootanim unlabeled dir 68864350 |
12 | idmap installd file 72444813 | ||