File tree 10 files changed +56
-12
lines changed
prebuilts/api/30.0/private
10 files changed +56
-12
lines changed Original file line number Diff line number Diff line change @@ -17,3 +17,10 @@ bluetooth_domain(untrusted_app)
17
17
18
18
allow untrusted_app self:process execmem;
19
19
auditallow untrusted_app self:process execmem;
20
+
21
+ # Some apps ship with shared libraries and binaries that they write out
22
+ # to their sandbox directory and then execute.
23
+ # This is allowed for non-base system apps targetAPI <=29.
24
+ allow untrusted_app privapp_data_file:file { r_file_perms execute };
25
+ allow untrusted_app app_data_file:file { r_file_perms execute };
26
+ auditallow untrusted_app app_data_file:file execute;
Original file line number Diff line number Diff line change @@ -39,6 +39,13 @@ allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file exe
39
39
allow untrusted_app_25 app_data_file:file execute_no_trans;
40
40
auditallow untrusted_app_25 app_data_file:file { execute execute_no_trans };
41
41
42
+ # Some apps ship with shared libraries and binaries that they write out
43
+ # to their sandbox directory and then execute.
44
+ # This is allowed for non-base system apps targetAPI <=25.
45
+ allow untrusted_app_25 privapp_data_file:file { r_file_perms execute };
46
+ allow untrusted_app_25 app_data_file:file { r_file_perms execute };
47
+ auditallow untrusted_app_25 app_data_file:file execute;
48
+
42
49
# The ability to invoke dex2oat. Historically required by ART, now only
43
50
# allowed for targetApi<=28 for compat reasons.
44
51
allow untrusted_app_25 dex2 oat_exec:file rx_file_perms;
Original file line number Diff line number Diff line change @@ -27,6 +27,13 @@ allow untrusted_app_27 { apk_data_file app_data_file asec_public_file }:file exe
27
27
allow untrusted_app_27 app_data_file:file execute_no_trans;
28
28
auditallow untrusted_app_27 app_data_file:file { execute execute_no_trans };
29
29
30
+ # Some apps ship with shared libraries and binaries that they write out
31
+ # to their sandbox directory and then execute.
32
+ # This is allowed for non-base system apps targetAPI <=27.
33
+ allow untrusted_app_27 privapp_data_file:file { r_file_perms execute };
34
+ allow untrusted_app_27 app_data_file:file { r_file_perms execute };
35
+ auditallow untrusted_app_27 app_data_file:file execute;
36
+
30
37
# The ability to invoke dex2oat. Historically required by ART, now only
31
38
# allowed for targetApi<=28 for compat reasons.
32
39
allow untrusted_app_27 dex2 oat_exec:file rx_file_perms;
Original file line number Diff line number Diff line change @@ -18,5 +18,12 @@ bluetooth_domain(untrusted_app_29)
18
18
allow untrusted_app_29 self:process execmem;
19
19
auditallow untrusted_app_29 self:process execmem;
20
20
21
+ # Some apps ship with shared libraries and binaries that they write out
22
+ # to their sandbox directory and then execute.
23
+ # This is allowed for non-base system apps targetAPI <=27.
24
+ allow untrusted_app_29 privapp_data_file:file { r_file_perms execute };
25
+ allow untrusted_app_29 app_data_file:file { r_file_perms execute };
26
+ auditallow untrusted_app_29 app_data_file:file execute;
27
+
21
28
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
22
29
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
Original file line number Diff line number Diff line change 20
20
# ## Note that rules that should apply to all untrusted apps must be in app.te or also
21
21
# ## added to ephemeral_app.te.
22
22
23
- # Some apps ship with shared libraries and binaries that they write out
24
- # to their sandbox directory and then execute.
25
- allow untrusted_app_all privapp_data_file:file { r_file_perms execute };
26
- allow untrusted_app_all app_data_file:file { r_file_perms execute };
27
- auditallow untrusted_app_all app_data_file:file execute;
28
-
29
23
# Chrome Crashpad uses the the dynamic linker to load native executables
30
24
# from an APK (b/112050209, crbug.com/928422)
31
25
allow untrusted_app_all system_linker_exec:file execute_no_trans;
Original file line number Diff line number Diff line change @@ -17,3 +17,10 @@ bluetooth_domain(untrusted_app)
17
17
18
18
allow untrusted_app self:process execmem;
19
19
auditallow untrusted_app self:process execmem;
20
+
21
+ # Some apps ship with shared libraries and binaries that they write out
22
+ # to their sandbox directory and then execute.
23
+ # This is allowed for non-base system apps targetAPI <=29.
24
+ allow untrusted_app privapp_data_file:file { r_file_perms execute };
25
+ allow untrusted_app app_data_file:file { r_file_perms execute };
26
+ auditallow untrusted_app app_data_file:file execute;
Original file line number Diff line number Diff line change @@ -39,6 +39,13 @@ allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file exe
39
39
allow untrusted_app_25 app_data_file:file execute_no_trans;
40
40
auditallow untrusted_app_25 app_data_file:file { execute execute_no_trans };
41
41
42
+ # Some apps ship with shared libraries and binaries that they write out
43
+ # to their sandbox directory and then execute.
44
+ # This is allowed for non-base system apps targetAPI <=25.
45
+ allow untrusted_app_25 privapp_data_file:file { r_file_perms execute };
46
+ allow untrusted_app_25 app_data_file:file { r_file_perms execute };
47
+ auditallow untrusted_app_25 app_data_file:file execute;
48
+
42
49
# The ability to invoke dex2oat. Historically required by ART, now only
43
50
# allowed for targetApi<=28 for compat reasons.
44
51
allow untrusted_app_25 dex2 oat_exec:file rx_file_perms;
Original file line number Diff line number Diff line change @@ -27,6 +27,13 @@ allow untrusted_app_27 { apk_data_file app_data_file asec_public_file }:file exe
27
27
allow untrusted_app_27 app_data_file:file execute_no_trans;
28
28
auditallow untrusted_app_27 app_data_file:file { execute execute_no_trans };
29
29
30
+ # Some apps ship with shared libraries and binaries that they write out
31
+ # to their sandbox directory and then execute.
32
+ # This is allowed for non-base system apps targetAPI <=27.
33
+ allow untrusted_app_27 privapp_data_file:file { r_file_perms execute };
34
+ allow untrusted_app_27 app_data_file:file { r_file_perms execute };
35
+ auditallow untrusted_app_27 app_data_file:file execute;
36
+
30
37
# The ability to invoke dex2oat. Historically required by ART, now only
31
38
# allowed for targetApi<=28 for compat reasons.
32
39
allow untrusted_app_27 dex2 oat_exec:file rx_file_perms;
Original file line number Diff line number Diff line change @@ -18,5 +18,12 @@ bluetooth_domain(untrusted_app_29)
18
18
allow untrusted_app_29 self:process execmem;
19
19
auditallow untrusted_app_29 self:process execmem;
20
20
21
+ # Some apps ship with shared libraries and binaries that they write out
22
+ # to their sandbox directory and then execute.
23
+ # This is allowed for non-base system apps targetAPI <=27.
24
+ allow untrusted_app_29 privapp_data_file:file { r_file_perms execute };
25
+ allow untrusted_app_29 app_data_file:file { r_file_perms execute };
26
+ auditallow untrusted_app_29 app_data_file:file execute;
27
+
21
28
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
22
29
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
Original file line number Diff line number Diff line change 20
20
# ## Note that rules that should apply to all untrusted apps must be in app.te or also
21
21
# ## added to ephemeral_app.te.
22
22
23
- # Some apps ship with shared libraries and binaries that they write out
24
- # to their sandbox directory and then execute.
25
- allow untrusted_app_all privapp_data_file:file { r_file_perms execute };
26
- allow untrusted_app_all app_data_file:file { r_file_perms execute };
27
- auditallow untrusted_app_all app_data_file:file execute;
28
-
29
23
# Chrome Crashpad uses the the dynamic linker to load native executables
30
24
# from an APK (b/112050209, crbug.com/928422)
31
25
allow untrusted_app_all system_linker_exec:file execute_no_trans;
You can’t perform that action at this time.
0 commit comments