Restrict write access to etm sysfs interface. am: 927d7a752b am: f288523c0c am: f8a7b98ff6 am: f09314ba84

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1945414

Change-Id: Icde999119eb131bd939ec2f0d0a8621601128622
This commit is contained in:
Yabin Cui 2022-01-12 19:02:23 +00:00 committed by Automerger Merge Worker
commit 674eeb732f

View file

@ -569,6 +569,9 @@ enforce_debugfs_restriction(`
}:file no_rw_file_perms;
')
# Restrict write access to etm sysfs interface.
neverallow { domain -ueventd -vendor_init } sysfs_devices_cs_etm:file no_w_file_perms;
# Restrict write access to shell owned files. The /data/local/tmp directory is
# untrustworthy, and non-allowed domains should not be trusting any content in
# those directories. We allow shell files to be passed around by file