Add uprobestats path to BpfLoader. am: 9c56a5a699
am: b8fe151a9b
am: f233c8b3ac
Original change: https://android-review.googlesource.com/c/platform/system/bpf/+/2907041 Change-Id: Ia262d395ec95da65d78553187624c917f91ddccb Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
commit
56858e9fee
1 changed files with 12 additions and 1 deletions
|
@ -76,6 +76,10 @@ constexpr bpf_prog_type kPlatformAllowedProgTypes[] = {
|
|||
BPF_PROG_TYPE_UNSPEC, // Will be replaced with fuse bpf program type
|
||||
};
|
||||
|
||||
constexpr bpf_prog_type kUprobestatsAllowedProgTypes[] = {
|
||||
BPF_PROG_TYPE_KPROBE,
|
||||
};
|
||||
|
||||
// see b/162057235. For arbitrary program types, the concern is that due to the lack of
|
||||
// SELinux access controls over BPF program attachpoints, we have no way to control the
|
||||
// attachment of programs to shared resources (or to detect when a shared resource
|
||||
|
@ -84,7 +88,6 @@ constexpr bpf_prog_type kVendorAllowedProgTypes[] = {
|
|||
BPF_PROG_TYPE_SOCKET_FILTER,
|
||||
};
|
||||
|
||||
|
||||
const android::bpf::Location locations[] = {
|
||||
// Core operating system
|
||||
{
|
||||
|
@ -94,6 +97,14 @@ const android::bpf::Location locations[] = {
|
|||
.allowedProgTypes = kPlatformAllowedProgTypes,
|
||||
.allowedProgTypesLength = arraysize(kPlatformAllowedProgTypes),
|
||||
},
|
||||
// uprobestats
|
||||
{
|
||||
.dir = "/system/etc/bpf/uprobestats/",
|
||||
.prefix = "uprobestats/",
|
||||
.allowedDomainBitmask = domainToBitmask(domain::platform),
|
||||
.allowedProgTypes = kUprobestatsAllowedProgTypes,
|
||||
.allowedProgTypesLength = arraysize(kUprobestatsAllowedProgTypes),
|
||||
},
|
||||
// Vendor operating system
|
||||
{
|
||||
.dir = "/vendor/etc/bpf/",
|
||||
|
|
Loading…
Reference in a new issue