Restrict write access to etm sysfs interface. am: 927d7a752b am: f288523c0c

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1945414

Change-Id: I7ca14acf15cf5eee452bf9d299099238db218c42
This commit is contained in:
Yabin Cui 2022-01-12 18:39:20 +00:00 committed by Automerger Merge Worker
commit f8a7b98ff6

View file

@ -569,6 +569,9 @@ enforce_debugfs_restriction(`
}:file no_rw_file_perms;
')
# Restrict write access to etm sysfs interface.
neverallow { domain -ueventd -vendor_init } sysfs_devices_cs_etm:file no_w_file_perms;
# Restrict write access to shell owned files. The /data/local/tmp directory is
# untrustworthy, and non-allowed domains should not be trusting any content in
# those directories. We allow shell files to be passed around by file