Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
S
sepolicy
Manage
Activity
Members
Plan
Wiki
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Terraform modules
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
CodeLinaro
public-release-test
platform
system
sepolicy
Commits
585b3bcf
Commit
585b3bcf
authored
Mar 7, 2018
by
Chenbo Feng
Committed by
android-build-merger
Mar 7, 2018
Browse files
Options
Downloads
Plain Diff
Fix sepolicy for bpf object
am:
bfa95fcd
Change-Id: I7e6cf042e2e16cff73525fdd6ef754b2d07944cf
parents
caf0139b
bfa95fcd
Branches
Branches containing commit
No related tags found
No related merge requests found
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
private/bpfloader.te
+1
-2
1 addition, 2 deletions
private/bpfloader.te
private/system_server.te
+2
-2
2 additions, 2 deletions
private/system_server.te
with
3 additions
and
4 deletions
private/bpfloader.te
+
1
−
2
View file @
585b3bcf
...
...
@@ -13,8 +13,7 @@ allow bpfloader fs_bpf:dir create_dir_perms;
allow bpfloader fs_bpf:file create_file_perms;
allow bpfloader devpts:chr_file { read write };
# TODO: unknown fd pass denials, need further investigation.
dontaudit bpfloader netd:fd use;
allow bpfloader netd:fd use;
# Use pinned bpf map files from netd.
allow bpfloader netd:bpf { map_read map_write };
...
...
...
...
This diff is collapsed.
Click to expand it.
private/system_server.te
+
2
−
2
View file @
585b3bcf
...
...
@@ -746,8 +746,8 @@ with_asan(`
# allow system_server to read the eBPF maps that stores the traffic stats information amd clean up
# the map after snapshot is recorded
allow system_server fs_bpf:file
write
;
allow system_server netd:bpf
{
map_read
map_write }
;
allow system_server fs_bpf:file
read
;
allow system_server netd:bpf map_read;
# ART Profiles.
# Allow system_server to open profile snapshots for read.
...
...
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
sign in
to comment