On 01/17/2014 03:52 AM, Edvard Holst wrote:
type=1400 msg=audit(3703774.009:181): avc: denied { read write } for pid=683 comm="PackageManager" path="/data/app/vmdl1971219509.tmp" dev="mmcblk0p23" ino=276900 scontext=u:r:untrusted_app:s0:c3,c256 tcontext=u:object_r:apk_tmp_file:s0 tclass=file type=1400 msg=audit(3703774.119:182): avc: denied { getattr } for pid=1523 comm="Binder_2" path="/data/app/vmdl1971219509.tmp" dev="mmcblk0p23" ino=276900 scontext=u:r:untrusted_app:s0:c3,c256 tcontext=u:object_r:apk_tmp_file:s0 tclass=file
Not sure that the PackageManager is causing that set of denials. Looks like there is an untrusted_app that is instead generating it. We presently only allow the platform_app domain to read and write to apk_tmp_file. Is it possible that you have some improperly labeled apps? Maybe a wrong seinfo tag or bad stanza inside mac_permissions.xml.
_______________________________________________ Seandroid-list mailing list [email protected] To unsubscribe, send email to [email protected]. To get help, send an email containing "help" to [email protected].
