Revert "Revert "Exclude vendor_modprobe from debugfs neverallow restrictions""
This reverts commit 231c04b2b9
.
Now that b/186727553 is fixed, it should be safe to revert this revert.
Test: build
Bug: 184381659
Change-Id: If26ba23df19e9854a121bbcf10a027c738006515
This commit is contained in:
parent
23f9f51fcd
commit
498318cc65
4 changed files with 5 additions and 2 deletions
|
@ -138,6 +138,7 @@
|
||||||
vcn_management_service
|
vcn_management_service
|
||||||
vd_device
|
vd_device
|
||||||
vendor_kernel_modules
|
vendor_kernel_modules
|
||||||
|
vendor_modprobe
|
||||||
vibrator_manager_service
|
vibrator_manager_service
|
||||||
virtualization_service
|
virtualization_service
|
||||||
vpn_management_service
|
vpn_management_service
|
||||||
|
|
|
@ -524,9 +524,12 @@ neverallow {
|
||||||
|
|
||||||
# debugfs_kcov type is not included in this neverallow statement since the KCOV
|
# debugfs_kcov type is not included in this neverallow statement since the KCOV
|
||||||
# tool uses it for kernel fuzzing.
|
# tool uses it for kernel fuzzing.
|
||||||
|
# vendor_modprobe is also exempted since the kernel modules it loads may create
|
||||||
|
# debugfs files in its context.
|
||||||
enforce_debugfs_restriction(`
|
enforce_debugfs_restriction(`
|
||||||
neverallow {
|
neverallow {
|
||||||
domain
|
domain
|
||||||
|
-vendor_modprobe
|
||||||
userdebug_or_eng(`
|
userdebug_or_eng(`
|
||||||
-init
|
-init
|
||||||
-hal_dumpstate
|
-hal_dumpstate
|
||||||
|
|
1
public/vendor_modprobe.te
Normal file
1
public/vendor_modprobe.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
type vendor_modprobe, domain;
|
2
vendor/vendor_modprobe.te
vendored
2
vendor/vendor_modprobe.te
vendored
|
@ -1,5 +1,3 @@
|
||||||
type vendor_modprobe, domain;
|
|
||||||
|
|
||||||
# For the use of /vendor/bin/modprobe from vendor init.rc fragments
|
# For the use of /vendor/bin/modprobe from vendor init.rc fragments
|
||||||
domain_trans(init, vendor_toolbox_exec, vendor_modprobe)
|
domain_trans(init, vendor_toolbox_exec, vendor_modprobe)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue