- Jul 10, 2015
-
-
Jeff Vander Stoep authored
avc: denied { write } for pid=14742 comm="procrank" path="/data/data/com.android.shell/files/bugreports/bugreport-2015-07-02-22-17-43.txt.tmp" dev="dm-2" ino=44479 scontext=u:r:procrank:s0 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=0 (cherry picked from af16c40c) Bug: 22400298 Change-Id: Ibf5dcf9f7edf416e977577afc32bbbef62e50974
-
Jeff Vander Stoep authored
avc: denied { write } for pid=14742 comm="procrank" path="/data/data/com.android.shell/files/bugreports/bugreport-2015-07-02-22-17-43.txt.tmp" dev="dm-2" ino=44479 scontext=u:r:procrank:s0 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=0 Bug: 22400298 Change-Id: Ibf5dcf9f7edf416e977577afc32bbbef62e50974
-
- Mar 19, 2015
-
-
Nick Kralevich authored
Commit a1913988 added a new SELinux label to /system/xbin/procrank, which had the effect of preventing dumpstate from executing procrank. Allow dumpstate to execute procrank. Bug: 18342188 Change-Id: If5b781db0d3af34912f3c803b7fa73d53120f3ba
-
Nick Kralevich authored
/system/xbin/procrank is a setuid program run by adb shell on userdebug / eng devices. Allow it to work without running adb root. Bug: 18342188 Change-Id: I18d9f743e5588c26661eaa26e1b7e6980b15caf7
-