Skip to content
Snippets Groups Projects
  1. Dec 05, 2013
  2. Dec 02, 2013
  3. Nov 27, 2013
    • Nick Kralevich's avatar
      Allow write access to ashmem allocated regions · 47685535
      Nick Kralevich authored
      Allow tmpfs_domains the ability to write to ashmem allocated
      regions. At least one Google internal app does this, and switching
      untrusted_app into enforcing causes the following denial:
      
      <5>[  291.791423] type=1400 audit(1385587240.320:79): avc:  denied  { write } for  pid=3774 comm="XXXXXXXXXXXX" path=2F6465762F6173686D656D202864656C6574656429 dev="tmpfs" ino=16937 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:untrusted_app_tmpfs:s0 tclass=file
      
      path=/dev/ashmem (deleted)
      
      Bug: 11891764
      Change-Id: I64d414c055cd02481ebf69994fad65d777d8381d
      47685535
  4. Nov 23, 2013
  5. Nov 22, 2013
  6. Nov 21, 2013
  7. Nov 19, 2013
  8. Nov 18, 2013
  9. Nov 14, 2013
  10. Nov 13, 2013
  11. Nov 12, 2013
  12. Nov 11, 2013
    • Stephen Smalley's avatar
      am af47ebb6: Label /dev/fscklogs and allow system_server access to it. · a9ccd7dc
      Stephen Smalley authored
      * commit 'af47ebb6':
        Label /dev/fscklogs and allow system_server access to it.
      a9ccd7dc
    • Stephen Smalley's avatar
      Label /dev/fscklogs and allow system_server access to it. · af47ebb6
      Stephen Smalley authored
      
      Otherwise you get denials such as:
      type=1400 audit(1383590310.430:623): avc:  denied  { getattr } for  pid=1629 comm="Thread-78" path="/dev/fscklogs/log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      type=1400 audit(1383590310.430:624): avc:  denied  { open } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      type=1400 audit(1383590310.430:625): avc:  denied  { write } for  pid=1629 comm="Thread-78" name="fscklogs" dev="tmpfs" ino=1628 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir
      type=1400 audit(1383590310.430:625): avc:  denied  { remove_name } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir
      type=1400 audit(1383590310.430:625): avc:  denied  { unlink } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      
      Change-Id: Ia7ae06a6d4cc5d2a59b8b85a5fb93cc31074fd37
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      af47ebb6
    • Nick Kralevich's avatar
      am 00739e3d: Make the ueventd domain enforcing. · c1468d45
      Nick Kralevich authored
      * commit '00739e3d':
        Make the ueventd domain enforcing.
      c1468d45
Loading