Skip to content
Snippets Groups Projects
  1. Apr 02, 2015
  2. Nov 26, 2014
    • Nick Kralevich's avatar
      Allow dex2oat to work on /oem APKs · adbabeeb
      Nick Kralevich authored
      Dex2oat needs the ability to read from already open file descriptors
      in /oem so that apps from that location can be installed. Allow it.
      
      Addresses the following denials:
      
        avc: denied { read } for comm="dex2oat" path="/oem/app/TabletInfo.apk" dev="mmcblk0p12" ino=20 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/AskMe_android_one.apk" dev="mmcblk0p12" ino=14 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerRegulatoryInfo.apk" dev="mmcblk0p12" ino=19 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerLauncherProvider.apk" dev="mmcblk0p12" ino=18 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/Amazon_Mobile_com.apk" dev="mmcblk0p12" ino=13 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerBookmarksProvider.apk" dev="mmcblk0p12" ino=17 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/Hike.apk" dev="mmcblk0p12" ino=15 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/MiLive_embedded_IndiaGames_version4.0_android1.apk" dev="mmcblk0p12" ino=16 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
      
      Bug: 18539205
      Change-Id: I92bd91c66befc5a1060dd189324b2c046bba0258
      adbabeeb
  3. Nov 10, 2014
    • Igor Murashkin's avatar
      zygote/dex2oat: Grant additional symlink permissions · 3df12275
      Igor Murashkin authored
      * zygote needs to be able to symlink from dalvik cache to system
        to avoid having to copy boot.oat
        (when the boot.oat file was built with --compile-pic)
      * dex2oat needs to be able to read the symlink in the dalvik cache
        (the one that zygote creates)
      
      (cherry-picked from AOSP master
      83c5612e)
      
      Bug: 18035729
      
      (cherry picked from commit f7ccfd00)
      
      Change-Id: I5dca27241f46f481515b96e968fb2bef7866c89b
      3df12275
  4. Oct 31, 2014
    • Igor Murashkin's avatar
      zygote/dex2oat: Grant additional symlink permissions · f7ccfd00
      Igor Murashkin authored
      * zygote needs to be able to symlink from dalvik cache to system
        to avoid having to copy boot.oat
        (when the boot.oat file was built with --compile-pic)
      * dex2oat needs to be able to read the symlink in the dalvik cache
        (the one that zygote creates)
      
      (cherry-picked from AOSP master
      83c5612e)
      
      Bug: 18035729
      Change-Id: Ie1acad81a0fd8b2f24e1f3f07a06e6fdb548be62
      f7ccfd00
  5. Oct 28, 2014
    • Igor Murashkin's avatar
      zygote/dex2oat: Grant additional symlink permissions · 83c5612e
      Igor Murashkin authored
      * zygote needs to be able to symlink from dalvik cache to system
        to avoid having to copy boot.oat
        (when the boot.oat file was built with --compile-pic)
      * dex2oat needs to be able to read the symlink in the dalvik cache
        (the one that zygote creates)
      
      Bug: 18035729
      Change-Id: Ie1acad81a0fd8b2f24e1f3f07a06e6fdb548be62
      83c5612e
  6. Jul 16, 2014
    • Nick Kralevich's avatar
      dex2oat: fix forward-locked upgrades with unlabeled asecs · e4aa75db
      Nick Kralevich authored
      dex2oat fails when upgrading unlabeled asec containers.
      
      Steps to reproduce:
      
      1) Install a forward locked app on Android 4.1
        adb install -l foo.apk
      2) Upgrade to tip-of-tree
      
      Addresses the following denial:
      
        <4>[  379.886665] type=1400 audit(1405549869.210:4): avc: denied { read } for pid=2389 comm="dex2oat" path="/mnt/asec/jackpal.androidterm-1/pkg.apk" dev=dm-0 ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      (cherry picked from commit 270be6e8)
      
      Change-Id: I58dc6ebe61a5b5840434077a55f1afbeed602137
      e4aa75db
    • Nick Kralevich's avatar
      dex2oat: fix forward locked apps · 94b2ba94
      Nick Kralevich authored
      dex2oat can't access file descriptors associated with asec_apk_files.
      This breaks installing forward locked apps, and generates the following
      denial:
      
        type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file
      
      Steps to reproduce:
      
        $ adb install -r -l SimpleJNI.apk
      
      Expected:
      
        app installs
      
      Actual:
      
        app fails to install.
      
      Bug: 16328233
      
      (cherry picked from commit 5259c5e6)
      
      Change-Id: I1969b9ae8d2187f4860587f7ff42d16139657b5b
      94b2ba94
    • Nick Kralevich's avatar
      dex2oat: fix forward-locked upgrades with unlabeled asecs · 270be6e8
      Nick Kralevich authored
      dex2oat fails when upgrading unlabeled asec containers.
      
      Steps to reproduce:
      
      1) Install a forward locked app on Android 4.1
        adb install -l foo.apk
      2) Upgrade to tip-of-tree
      
      Addresses the following denial:
      
        <4>[  379.886665] type=1400 audit(1405549869.210:4): avc: denied { read } for pid=2389 comm="dex2oat" path="/mnt/asec/jackpal.androidterm-1/pkg.apk" dev=dm-0 ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      Change-Id: I58dc6ebe61a5b5840434077a55f1afbeed602137
      270be6e8
    • Nick Kralevich's avatar
      dex2oat: fix forward locked apps · 5259c5e6
      Nick Kralevich authored
      dex2oat can't access file descriptors associated with asec_apk_files.
      This breaks installing forward locked apps, and generates the following
      denial:
      
        type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file
      
      Steps to reproduce:
      
        $ adb install -r -l SimpleJNI.apk
      
      Expected:
      
        app installs
      
      Actual:
      
        app fails to install.
      
      Change-Id: I5a468508014e9963460d13d78e1c4867187322b3
      Bug: 16328233
      5259c5e6
  7. Jul 15, 2014
  8. Jul 10, 2014
    • Nick Kralevich's avatar
      Put dex2oat in it's own sandbox · 75d63fcf
      Nick Kralevich authored
      Currently, dex2oat runs in the installd sandbox, and has
      all the SELinux capabilities that installd does. That's too
      excessive.
      
      dex2oat handles untrusted user data, so we want to put it in
      it's own tighter sandbox.
      
      Bug: 15358102
      Change-Id: I08083b84b9769e24d6dad6dbd12401987cb006be
      75d63fcf
Loading