Skip to content
Snippets Groups Projects
Commit 37c58663 authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Remove execmod support for newer API versions

am: 38d3eca0

Change-Id: Ie6ab2417788e627ae15e7faf76f9f9ef852c0c72
parents 9178884c 38d3eca0
No related branches found
No related tags found
No related merge requests found
...@@ -42,3 +42,6 @@ allow untrusted_app_25 proc_misc:file r_file_perms; ...@@ -42,3 +42,6 @@ allow untrusted_app_25 proc_misc:file r_file_perms;
# https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java # https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java
# This will go away in a future Android release # This will go away in a future Android release
allow untrusted_app_25 proc_tty_drivers:file r_file_perms; allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
# Legacy text relocations
allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod;
...@@ -17,18 +17,15 @@ ...@@ -17,18 +17,15 @@
### seapp_contexts. ### seapp_contexts.
### ###
# Legacy text relocations
allow untrusted_app_all apk_data_file:file execmod;
# Some apps ship with shared libraries and binaries that they write out # Some apps ship with shared libraries and binaries that they write out
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; allow untrusted_app_all app_data_file:file rx_file_perms;
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
allow untrusted_app_all asec_apk_file:dir r_dir_perms; allow untrusted_app_all asec_apk_file:dir r_dir_perms;
# Execute libs in asec containers. # Execute libs in asec containers.
allow untrusted_app_all asec_public_file:file { execute execmod }; allow untrusted_app_all asec_public_file:file execute;
# Used by Finsky / Android "Verify Apps" functionality when # Used by Finsky / Android "Verify Apps" functionality when
# running "adb install foo.apk". # running "adb install foo.apk".
......
...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap }; ...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap };
# prohibit non-zygote spawned processes from using shared libraries # prohibit non-zygote spawned processes from using shared libraries
# with text relocations. b/20013628 . # with text relocations. b/20013628 .
neverallow { domain -untrusted_app_all } file_type:file execmod; neverallow { domain -untrusted_app_25 } file_type:file execmod;
neverallow { domain -init } proc:{ file dir } mounton; neverallow { domain -init } proc:{ file dir } mounton;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment