Skip to content
Snippets Groups Projects
  1. Mar 20, 2019
  2. Mar 19, 2019
    • Jeffrey Vander Stoep's avatar
    • George Burgess IV's avatar
      Fix memory leaks · bf2f9270
      George Burgess IV authored
      This CL fixes leaks of the policy that we're building up. The analyzer
      only caught the leaks on the error path, but I assume that
      `check_assertions` does nothing to free the object that it's handed.
      
      Analyzer warnings:
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:439:9: warning:
      Potential leak of memory pointed to by 'avrule'
      [clang-analyzer-unix.Malloc]
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:439:9: warning:
      Potential leak of memory pointed to by 'neverallows'
      [clang-analyzer-unix.Malloc]
      
      Bug: None
      Test: Treehugger; reran the analyzer
      Change-Id: I79a0c34e8b53d33a1f01497337590eab660ad3ec
      bf2f9270
    • Andreas Gampe's avatar
      Sepolicy: Allow zygote to pick up dalvikcache artifacts · 08450264
      Andreas Gampe authored
      Allow the zygote to pick up integrity-checked boot classpath
      artifacts from the dalvik cache.
      
      Bug: 125474642
      Test: m
      Test: manual
      Merged-In: I45d760c981c55a52bd0b22c79a9cba4868a09528
      Change-Id: I45d760c981c55a52bd0b22c79a9cba4868a09528
      08450264
    • Andreas Gampe's avatar
      Sepolicy: Allow system_server_startup to load dalvikcache artifacts · e72ec6bf
      Andreas Gampe authored
      Allow the startup domain to pick up integrity-checked artifacts
      from the dalvik-cache. The corresponding framework code will
      only load the system server classpath.
      
      Bug: 128688902
      Test: m
      Test: manual
      Merged-In: Ib37f8d7c39431e2792eeb4dac1cd732307519827
      Change-Id: Ib37f8d7c39431e2792eeb4dac1cd732307519827
      e72ec6bf
    • Nicolas Geoffray's avatar
      e6687329
    • Roland Levillain's avatar
      Allow `otapreopt_chroot` to use a flattened Runtime APEX package. · 66f40a8b
      Roland Levillain authored
      - Allow (again) `otapreopt` (running as `postinstall_dexopt`) to
        execute `dex2oat` from `/postinstall` -- this is for the case where
        it is located in a flattened Runtime APEX in
        `/postinstall/system/apex`.
      - Allow `dex2oat` to read directories under `/postinstall`.
      - Allow `otapreopt_chroot` to unmount flattened APEX packages under
        `/postinstall/system/apex` (which are bind-mounted in
        `/postinstall/apex`).
      
      Test: A/B OTA update test (asit/dexoptota/self_full).
      Bug: 127543974
      Bug: 123684826
      Bug: 113373927
      Change-Id: Ie023ee5c64989ea071e1683f31073a70c93cac18
      66f40a8b
    • Xiao Ma's avatar
    • Jeff Vander Stoep's avatar
      crash_dump: suppress devpts denials · 60bb29fc
      Jeff Vander Stoep authored
      The following denial caused a presubmit failure:
      06-15 15:16:24.176   956   956 I auditd  : type=1400 audit(0.0:4): avc:
      denied { read write } for comm="crash_dump64" path="/dev/pts/3"
      dev="devpts" ino=6 scontext=u:r:crash_dump:s0
      tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=0
      
      Suppress these denials. They are not needed by crash_dump and are only
      caused by the default behavior of sharing FDs across exec.
      
      Test: build
      Change-Id: I183f7a54e6b807fdf46b04d67dd4b819d4f0e507
      60bb29fc
    • Xiao Ma's avatar
      Allow the netowrk stack to access its own data files. · c06f0f60
      Xiao Ma authored
      After moving IpMemoryStore service to network stack module(aosp/906907),
      the following untracked SELinux denials are observed on boot.
      
      W id.networkstack: type=1400 audit(0.0:63): avc: denied { write } for
      name="com.android.networkstack" dev="sda13" ino=704810
      scontext=u:r:network_stack:s0:c49,c260,c512,c768
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
      
      Add radio_data_file type for network stack user configuration and
      relevant permission to allow access to its data, as the network stack
      is a privileged app.
      
      Test: m -j passed
      Change-Id: I6eab528714df6a17aae0cb546dcc3ad4bb21deea
      c06f0f60
  3. Mar 18, 2019
  4. Mar 16, 2019
  5. Mar 15, 2019
  6. Mar 14, 2019
Loading