File tree 14 files changed +36
-6
lines changed
14 files changed +36
-6
lines changed Original file line number Diff line number Diff line change @@ -67,6 +67,9 @@ allow ephemeral_app system_server:udp_socket {
67
67
68
68
allow ephemeral_app ashmem_device:chr_file rw_file_perms;
69
69
70
+ allow ephemeral_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
71
+ auditallow ephemeral_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
72
+
70
73
# ##
71
74
# ## neverallow rules
72
75
# ##
Original file line number Diff line number Diff line change @@ -70,6 +70,9 @@ perfetto_producer(isolated_app)
70
70
can_profile_heap(isolated_app)
71
71
can_profile_perf(isolated_app)
72
72
73
+ allow isolated_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
74
+ auditallow isolated_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
75
+
73
76
# ####
74
77
# #### Neverallow
75
78
# ####
Original file line number Diff line number Diff line change @@ -24,3 +24,6 @@ auditallow untrusted_app self:process execmem;
24
24
allow untrusted_app privapp_data_file:file { r_file_perms execute };
25
25
allow untrusted_app app_data_file:file { r_file_perms execute };
26
26
auditallow untrusted_app app_data_file:file execute;
27
+
28
+ allow untrusted_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
29
+ auditallow untrusted_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -61,3 +61,6 @@ allow untrusted_app_25 mnt_sdcard_file:lnk_file r_file_perms;
61
61
62
62
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
63
63
allow untrusted_app_25 self:netlink_route_socket { bind nlmsg_readpriv };
64
+
65
+ allow untrusted_app_25 { ashmem_device ashmem_libcutils_device }:chr_file execute;
66
+ auditallow untrusted_app_25 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -49,3 +49,6 @@ allow untrusted_app_27 mnt_sdcard_file:lnk_file r_file_perms;
49
49
50
50
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
51
51
allow untrusted_app_27 self:netlink_route_socket { bind nlmsg_readpriv };
52
+
53
+ allow untrusted_app_27 { ashmem_device ashmem_libcutils_device }:chr_file execute;
54
+ auditallow untrusted_app_27 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -27,3 +27,6 @@ auditallow untrusted_app_29 app_data_file:file execute;
27
27
28
28
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
29
29
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
30
+
31
+ allow untrusted_app_29 { ashmem_device ashmem_libcutils_device }:chr_file execute;
32
+ auditallow untrusted_app_29 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change 8
8
# ##
9
9
type appdomain_tmpfs, file_type;
10
10
11
- allow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
12
- auditallow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
13
-
14
11
# Receive and use open file descriptors inherited from zygote.
15
12
allow appdomain zygote:fd use;
16
13
Original file line number Diff line number Diff line change @@ -67,6 +67,9 @@ allow ephemeral_app system_server:udp_socket {
67
67
68
68
allow ephemeral_app ashmem_device:chr_file rw_file_perms;
69
69
70
+ allow ephemeral_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
71
+ auditallow ephemeral_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
72
+
70
73
# ##
71
74
# ## neverallow rules
72
75
# ##
Original file line number Diff line number Diff line change @@ -70,6 +70,9 @@ perfetto_producer(isolated_app)
70
70
can_profile_heap(isolated_app)
71
71
can_profile_perf(isolated_app)
72
72
73
+ allow isolated_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
74
+ auditallow isolated_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
75
+
73
76
# ####
74
77
# #### Neverallow
75
78
# ####
Original file line number Diff line number Diff line change @@ -24,3 +24,6 @@ auditallow untrusted_app self:process execmem;
24
24
allow untrusted_app privapp_data_file:file { r_file_perms execute };
25
25
allow untrusted_app app_data_file:file { r_file_perms execute };
26
26
auditallow untrusted_app app_data_file:file execute;
27
+
28
+ allow untrusted_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
29
+ auditallow untrusted_app { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -61,3 +61,6 @@ allow untrusted_app_25 mnt_sdcard_file:lnk_file r_file_perms;
61
61
62
62
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
63
63
allow untrusted_app_25 self:netlink_route_socket { bind nlmsg_readpriv };
64
+
65
+ allow untrusted_app_25 { ashmem_device ashmem_libcutils_device }:chr_file execute;
66
+ auditallow untrusted_app_25 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -49,3 +49,6 @@ allow untrusted_app_27 mnt_sdcard_file:lnk_file r_file_perms;
49
49
50
50
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
51
51
allow untrusted_app_27 self:netlink_route_socket { bind nlmsg_readpriv };
52
+
53
+ allow untrusted_app_27 { ashmem_device ashmem_libcutils_device }:chr_file execute;
54
+ auditallow untrusted_app_27 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change @@ -27,3 +27,6 @@ auditallow untrusted_app_29 app_data_file:file execute;
27
27
28
28
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
29
29
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
30
+
31
+ allow untrusted_app_29 { ashmem_device ashmem_libcutils_device }:chr_file execute;
32
+ auditallow untrusted_app_29 { ashmem_device ashmem_libcutils_device }:chr_file execute;
Original file line number Diff line number Diff line change 8
8
# ##
9
9
type appdomain_tmpfs, file_type;
10
10
11
- allow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
12
- auditallow appdomain { ashmem_device ashmem_libcutils_device }:chr_file execute;
13
-
14
11
# Receive and use open file descriptors inherited from zygote.
15
12
allow appdomain zygote:fd use;
16
13
You can’t perform that action at this time.
0 commit comments