On 05/04/2015 01:57 AM, Inamdar Sharif wrote:
> Hi Guys,
>
> I am facing the following avc denied
>
> avc: denied { execute } for pid=667 comm="android.ui" name="dex2oat"
> dev="sda22" ino=158 scontext=u:r:system_server:s0
> tcontext=u:object_r:dex2oat_exec:s0 tclass=file
>
>
>
> But on AOSP this is a neverallow rule.
>
> https://android.googlesource.com/platform/external/sepolicy/+/361cdaff3096fafc16bbe88b84d6f99f7944def7
>
>
>
> I can see that the process is “android.ui” (process running when this
> avc occured)
>
> Is this a bug in Android or something in the code went wrong??
Are you running AOSP master?
Did you get logcat output for the failure beyond just the avc denial?
The change that added the neverallow was:
https://android-review.googlesource.com/#/c/127510/
_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to
[email protected].