Restrict write access to etm sysfs interface. am: 927d7a752b
am: f288523c0c
am: f8a7b98ff6
am: f09314ba84
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1945414 Change-Id: Icde999119eb131bd939ec2f0d0a8621601128622
This commit is contained in:
commit
674eeb732f
1 changed files with 3 additions and 0 deletions
|
@ -569,6 +569,9 @@ enforce_debugfs_restriction(`
|
|||
}:file no_rw_file_perms;
|
||||
')
|
||||
|
||||
# Restrict write access to etm sysfs interface.
|
||||
neverallow { domain -ueventd -vendor_init } sysfs_devices_cs_etm:file no_w_file_perms;
|
||||
|
||||
# Restrict write access to shell owned files. The /data/local/tmp directory is
|
||||
# untrustworthy, and non-allowed domains should not be trusting any content in
|
||||
# those directories. We allow shell files to be passed around by file
|
||||
|
|
Loading…
Reference in a new issue