Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    4adf0e8f
    Allow write access to ashmem allocated regions · 4adf0e8f
    Nick Kralevich authored
    Allow tmpfs_domains the ability to write to ashmem allocated
    regions. At least one Google internal app does this, and switching
    untrusted_app into enforcing causes the following denial:
    
    <5>[  291.791423] type=1400 audit(1385587240.320:79): avc:  denied  { write } for  pid=3774 comm="XXXXXXXXXXXX" path=2F6465762F6173686D656D202864656C6574656429 dev="tmpfs" ino=16937 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:untrusted_app_tmpfs:s0 tclass=file
    
    path=/dev/ashmem (deleted)
    
    Bug: 11891764
    
    (cherry picked from commit 47685535)
    
    Change-Id: I1b8fcb82b7d21291707f18364486beb2fa9eb332
    4adf0e8f
    History
    Allow write access to ashmem allocated regions
    Nick Kralevich authored
    Allow tmpfs_domains the ability to write to ashmem allocated
    regions. At least one Google internal app does this, and switching
    untrusted_app into enforcing causes the following denial:
    
    <5>[  291.791423] type=1400 audit(1385587240.320:79): avc:  denied  { write } for  pid=3774 comm="XXXXXXXXXXXX" path=2F6465762F6173686D656D202864656C6574656429 dev="tmpfs" ino=16937 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:untrusted_app_tmpfs:s0 tclass=file
    
    path=/dev/ashmem (deleted)
    
    Bug: 11891764
    
    (cherry picked from commit 47685535)
    
    Change-Id: I1b8fcb82b7d21291707f18364486beb2fa9eb332