Add uprobestats path to BpfLoader. am: 9c56a5a699
Original change: https://android-review.googlesource.com/c/platform/system/bpf/+/2907041
Change-Id: I9609e9c47ed4325cdc940c74c687b735316ea2ca
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
diff --git a/bpfloader/BpfLoader.cpp b/bpfloader/BpfLoader.cpp
index f153b40..3cfdc15 100644
--- a/bpfloader/BpfLoader.cpp
+++ b/bpfloader/BpfLoader.cpp
@@ -76,6 +76,10 @@
BPF_PROG_TYPE_UNSPEC, // Will be replaced with fuse bpf program type
};
+constexpr bpf_prog_type kUprobestatsAllowedProgTypes[] = {
+ BPF_PROG_TYPE_KPROBE,
+};
+
// see b/162057235. For arbitrary program types, the concern is that due to the lack of
// SELinux access controls over BPF program attachpoints, we have no way to control the
// attachment of programs to shared resources (or to detect when a shared resource
@@ -84,7 +88,6 @@
BPF_PROG_TYPE_SOCKET_FILTER,
};
-
const android::bpf::Location locations[] = {
// Core operating system
{
@@ -94,6 +97,14 @@
.allowedProgTypes = kPlatformAllowedProgTypes,
.allowedProgTypesLength = arraysize(kPlatformAllowedProgTypes),
},
+ // uprobestats
+ {
+ .dir = "/system/etc/bpf/uprobestats/",
+ .prefix = "uprobestats/",
+ .allowedDomainBitmask = domainToBitmask(domain::platform),
+ .allowedProgTypes = kUprobestatsAllowedProgTypes,
+ .allowedProgTypesLength = arraysize(kUprobestatsAllowedProgTypes),
+ },
// Vendor operating system
{
.dir = "/vendor/etc/bpf/",