Skip to content
Snippets Groups Projects
  1. Mar 07, 2018
    • Joel Galenson's avatar
      Use user policy when checking neverallow rules. · 053cb341
      Joel Galenson authored
      When building userdebug or eng builds, we still want to build the user
      policy when checking neverallow rules so that we can catch compile
      errors.
      
      Commit c0713e86 split out a helper function but lost one instance of
      using user instead of the real variant.  This restores that one and
      adds it to the neverallow check.
      
      Bug: 74344625
      Test: Added a rule that referred to a type defined only
      in userdebug and eng and ensure we throw a compile error when building
      userdebug mode.
      
      Change-Id: I1a6ffbb36dbeeb880852f9cbac880f923370c2ae
      053cb341
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · 6cd70c2f
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      6cd70c2f
  2. Mar 02, 2018
  3. Mar 01, 2018
  4. Feb 28, 2018
Loading