File tree 14 files changed +36
-8
lines changed
14 files changed +36
-8
lines changed Original file line number Diff line number Diff line change @@ -16,6 +16,9 @@ typeattribute ephemeral_app coredomain;
16
16
net_domain(ephemeral_app)
17
17
app_domain(ephemeral_app)
18
18
19
+ allow ephemeral_app self:process execmem;
20
+ auditallow ephemeral_app self:process execmem;
21
+
19
22
# Allow ephemeral apps to read/write files in visible storage if provided fds
20
23
allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
21
24
Original file line number Diff line number Diff line change @@ -10,6 +10,9 @@ typeattribute isolated_app coredomain;
10
10
11
11
app_domain(isolated_app)
12
12
13
+ allow isolated_app self:process execmem;
14
+ auditallow isolated_app self:process execmem;
15
+
13
16
# Access already open app data files received over Binder or local socket IPC.
14
17
allow isolated_app { app_data_file privapp_data_file }:file { append read write getattr lock map };
15
18
Original file line number Diff line number Diff line change @@ -14,3 +14,6 @@ app_domain(untrusted_app)
14
14
untrusted_app_domain(untrusted_app)
15
15
net_domain(untrusted_app)
16
16
bluetooth_domain(untrusted_app)
17
+
18
+ allow untrusted_app self:process execmem;
19
+ auditallow untrusted_app self:process execmem;
Original file line number Diff line number Diff line change @@ -15,6 +15,9 @@ untrusted_app_domain(untrusted_app_25)
15
15
net_domain(untrusted_app_25 )
16
16
bluetooth_domain(untrusted_app_25 )
17
17
18
+ allow untrusted_app_25 self:process execmem;
19
+ auditallow untrusted_app_25 self:process execmem;
20
+
18
21
# b/35917228 - /proc/misc access
19
22
# This will go away in a future Android release
20
23
allow untrusted_app_25 proc_misc:file r_file_perms;
Original file line number Diff line number Diff line change @@ -15,6 +15,9 @@ untrusted_app_domain(untrusted_app_27)
15
15
net_domain(untrusted_app_27 )
16
16
bluetooth_domain(untrusted_app_27 )
17
17
18
+ allow untrusted_app_27 self:process execmem;
19
+ auditallow untrusted_app_27 self:process execmem;
20
+
18
21
# Text relocation support for API < 23. This is now disallowed for targetSdkVersion>=Q.
19
22
# https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
20
23
allow untrusted_app_27 { apk_data_file app_data_file asec_public_file }:file execmod;
Original file line number Diff line number Diff line change @@ -15,5 +15,8 @@ untrusted_app_domain(untrusted_app_29)
15
15
net_domain(untrusted_app_29 )
16
16
bluetooth_domain(untrusted_app_29 )
17
17
18
+ allow untrusted_app_29 self:process execmem;
19
+ auditallow untrusted_app_29 self:process execmem;
20
+
18
21
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
19
22
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
Original file line number Diff line number Diff line change 8
8
# ##
9
9
type appdomain_tmpfs, file_type;
10
10
11
- # WebView and other application-specific JIT compilers
12
- allow appdomain self:process execmem;
13
- auditallow appdomain self:process execmem;
14
-
15
11
allow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
16
12
auditallow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
17
13
Original file line number Diff line number Diff line change @@ -16,6 +16,9 @@ typeattribute ephemeral_app coredomain;
16
16
net_domain(ephemeral_app)
17
17
app_domain(ephemeral_app)
18
18
19
+ allow ephemeral_app self:process execmem;
20
+ auditallow ephemeral_app self:process execmem;
21
+
19
22
# Allow ephemeral apps to read/write files in visible storage if provided fds
20
23
allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
21
24
Original file line number Diff line number Diff line change @@ -10,6 +10,9 @@ typeattribute isolated_app coredomain;
10
10
11
11
app_domain(isolated_app)
12
12
13
+ allow isolated_app self:process execmem;
14
+ auditallow isolated_app self:process execmem;
15
+
13
16
# Access already open app data files received over Binder or local socket IPC.
14
17
allow isolated_app { app_data_file privapp_data_file }:file { append read write getattr lock map };
15
18
Original file line number Diff line number Diff line change @@ -14,3 +14,6 @@ app_domain(untrusted_app)
14
14
untrusted_app_domain(untrusted_app)
15
15
net_domain(untrusted_app)
16
16
bluetooth_domain(untrusted_app)
17
+
18
+ allow untrusted_app self:process execmem;
19
+ auditallow untrusted_app self:process execmem;
Original file line number Diff line number Diff line change @@ -15,6 +15,9 @@ untrusted_app_domain(untrusted_app_25)
15
15
net_domain(untrusted_app_25 )
16
16
bluetooth_domain(untrusted_app_25 )
17
17
18
+ allow untrusted_app_25 self:process execmem;
19
+ auditallow untrusted_app_25 self:process execmem;
20
+
18
21
# b/35917228 - /proc/misc access
19
22
# This will go away in a future Android release
20
23
allow untrusted_app_25 proc_misc:file r_file_perms;
Original file line number Diff line number Diff line change @@ -15,6 +15,9 @@ untrusted_app_domain(untrusted_app_27)
15
15
net_domain(untrusted_app_27 )
16
16
bluetooth_domain(untrusted_app_27 )
17
17
18
+ allow untrusted_app_27 self:process execmem;
19
+ auditallow untrusted_app_27 self:process execmem;
20
+
18
21
# Text relocation support for API < 23. This is now disallowed for targetSdkVersion>=Q.
19
22
# https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
20
23
allow untrusted_app_27 { apk_data_file app_data_file asec_public_file }:file execmod;
Original file line number Diff line number Diff line change @@ -15,5 +15,8 @@ untrusted_app_domain(untrusted_app_29)
15
15
net_domain(untrusted_app_29 )
16
16
bluetooth_domain(untrusted_app_29 )
17
17
18
+ allow untrusted_app_29 self:process execmem;
19
+ auditallow untrusted_app_29 self:process execmem;
20
+
18
21
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
19
22
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
Original file line number Diff line number Diff line change 8
8
# ##
9
9
type appdomain_tmpfs, file_type;
10
10
11
- # WebView and other application-specific JIT compilers
12
- allow appdomain self:process execmem;
13
- auditallow appdomain self:process execmem;
14
-
15
11
allow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
16
12
auditallow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
17
13
You can’t perform that action at this time.
0 commit comments