Dear SEAndroid developers
Always thank your for your help.

I saw the bellow denial log

*avc: denied { execute_no_trans } for pid=18451 comm="process_a"
path="/system/bin/toolbox" dev="mmcblk0p53" ino=916 scontext=u:r:shell:s0
tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1*

But my device already have the following policy

*domain_auto_trans(shell, toolbox_exec, toolbox)*

Certainly I allowed the domain transition but I wonder why execute_no_trans
violation arose.

After looking into the kernel source, I found some hints in the hooks.c

*if (new_tsec->sid == old_tsec->sid) {*
* rc = avc_has_perm(old_tsec->sid, isec->sid,*
*  SECCLASS_FILE, FILE__EXECUTE_NO_TRANS, &ad);*
* if (rc)*
* return rc;*
*} else {*

Then... my question is...
Was the denials log arisen because both of scontext=u:r:shell:s0 and
tcontext=u:object_r:toolbox_exec:s0 have same sid ?

Thank you
Best regards
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to