Skip to content
Snippets Groups Projects
  1. May 29, 2014
  2. May 28, 2014
  3. May 27, 2014
  4. May 23, 2014
  5. May 22, 2014
    • Nick Kralevich's avatar
      Label /dev/socket/zygote_secondary · 7cba5da2
      Nick Kralevich authored
      zygote_secondary talks over a different socket named
      /dev/socket/zygote_secondary. Make sure it's properly labeled.
      
      See https://android-review.googlesource.com/89604
      
      Addresses the following denial:
      
      <12>[   48.442004] type=1400 audit(1400801842.179:5): avc:  denied  { write } for  pid=1082 comm="main" name="zygote_secondary" dev="tmpfs" ino=9953 scontext=u:r:system_server:s0 tcontext=u:object_r:socket_device:s0 tclass=sock_file permissive=1
      
      Bug: 13647418
      Change-Id: I1ff5f1d614295a5870bb8a3992ad9167e1656c92
      7cba5da2
    • Nick Kralevich's avatar
      Fix use of valgrind via app wrapping · 4fce0ef9
      Nick Kralevich authored
      On userdebug / eng builds, Android supports the concept of app wrapping.
      You can run an app wrapped by another process. This is traditionally used
      to run valgrind on apps, looking for memory leaks and other problems.
      
      App wrapping is enabled by running the following command:
      
        adb shell setprop wrap.com.android.foo "TMPDIR=/data/data/com.android.foo logwrapper valgrind"
      
      Valgrind attempts to mmap exec /system/bin/app_process, which is being denied
      by SELinux. Allow app_process exec.
      
      Addresses the following denial:
      
        <4>[   82.643790] type=1400 audit(16301075.079:26): avc:  denied  { execute } for  pid=1519 comm="memcheck-arm-li" path="/system/bin/app_process32" dev="mmcblk0p25" ino=61 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:zygote_exec:s0 tclass=file
      
      Bug: 15146424
      
      Change-Id: I65394938c53da9252ea57856d9f2de465bb30c25
      4fce0ef9
  6. May 20, 2014
Loading