[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-10-11 Thread Jamie Strandboge
Adding a t-series task since this looks like it won't be fixed for 13.10. ** Also affects: lxc-android-config (Ubuntu T-series) Importance: Undecided Status: New ** Also affects: apparmor-easyprof-ubuntu (Ubuntu T-series) Importance: Undecided Status: New ** Changed in: appar

[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-09-26 Thread Jamie Strandboge
This is still an issue on update to date mako system-image and booting into mir after creating ~/.display-mir. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1197134 Title: SDK applications require a

[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-09-04 Thread Ricardo Salveti
** Description changed: SDK applications need the following AppArmor policy to run:   /dev/binder rw, The writes to /dev/binder allow applications to attack binder directly which weakens our application confinement policy. - Update 2013-08-08: + Update 2013-09-04 (audioflinger and

[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-09-04 Thread Jamie Strandboge
** Changed in: lxc-android-config (Ubuntu Saucy) Assignee: (unassigned) => Ubuntu Phonedations bugs (ubuntu-phonedations-bugs) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1197134 Title: SDK

[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-09-03 Thread Jamie Strandboge
Adding lxc-android-config taks since it provides the udev rule. This is almost certainly the wrong package and will have to be retargeted, but at least this puts the bug in Phone Foundations court. ** Also affects: lxc-android-config (Ubuntu) Importance: Undecided Status: New ** Descrip

[Bug 1197134] Re: SDK applications require access to /dev/binder

2013-08-08 Thread Jamie Strandboge
** Description changed: SDK applications need the following AppArmor policy to run: - /dev/binder rw, +   /dev/binder rw, The writes to /dev/binder allow applications to attack binder directly which weakens our application confinement policy. + + Update 2013-08-08: + All apps curren