4c0078d67a
When pushing to a path, we first try to ensure the directory path exists and has the permissions expected by fs_config. Due to a change that changed the fs_config check from a blacklist to a whitelist, we started doing this for /data (which doesn't begin with /data/), and the UID/GID for that path was accidentally being reused for following path segments that didn't exist, leading to a failed attempt to chown /data/local/tmp/foo to be owned by system. Bug: http://b/110953234 Test: python test_device.py Change-Id: Ie798eec48bcf54aea40f6d90cc03bb2170280ee8 |
||
---|---|---|
.. | ||
auth.cpp | ||
file_sync_service.cpp | ||
framebuffer_service.cpp | ||
jdwp_service.cpp | ||
main.cpp | ||
mdns.cpp | ||
mdns.h | ||
remount_service.cpp | ||
set_verity_enable_state_service.cpp | ||
shell_service.cpp | ||
shell_service_test.cpp | ||
usb.cpp | ||
usb.h |