platform BpfLoader: drop support for uprobestats
this has moved to mainline via apex
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I77e6ae3248ce1aa1ee20c9ab834516053cac5d16
diff --git a/loader/Loader.cpp b/loader/Loader.cpp
index 09e2e17..89bdb80 100644
--- a/loader/Loader.cpp
+++ b/loader/Loader.cpp
@@ -882,10 +882,6 @@
BPF_PROG_TYPE_SOCKET_FILTER,
};
-constexpr bpf_prog_type kUprobestatsAllowedProgTypes[] = {
- BPF_PROG_TYPE_KPROBE,
-};
-
// see b/162057235. For arbitrary program types, the concern is that due to the lack of
// SELinux access controls over BPF program attachpoints, we have no way to control the
// attachment of programs to shared resources (or to detect when a shared resource
@@ -909,13 +905,6 @@
.allowedProgTypes = kMemEventsAllowedProgTypes,
.allowedProgTypesLength = arraysize(kMemEventsAllowedProgTypes),
},
- // uprobestats
- {
- .dir = "/system/etc/bpf/uprobestats/",
- .prefix = "uprobestats/",
- .allowedProgTypes = kUprobestatsAllowedProgTypes,
- .allowedProgTypesLength = arraysize(kUprobestatsAllowedProgTypes),
- },
// Vendor operating system
{
.dir = "/vendor/etc/bpf/",