Skip to content
Snippets Groups Projects
Commit 9bf4029b authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Merge "Revert "Remove execmod support for newer API versions"" am: 8276dfb4

am: af5c27ad

Change-Id: Ib509846ef003b0f161e1d472278c6d858eb08112
parents 163c535c af5c27ad
No related branches found
No related tags found
No related merge requests found
...@@ -42,6 +42,3 @@ allow untrusted_app_25 proc_misc:file r_file_perms; ...@@ -42,6 +42,3 @@ allow untrusted_app_25 proc_misc:file r_file_perms;
# https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java # https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java
# This will go away in a future Android release # This will go away in a future Android release
allow untrusted_app_25 proc_tty_drivers:file r_file_perms; allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
# Legacy text relocations
allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod;
...@@ -17,15 +17,18 @@ ...@@ -17,15 +17,18 @@
### seapp_contexts. ### seapp_contexts.
### ###
# Legacy text relocations
allow untrusted_app_all apk_data_file:file execmod;
# Some apps ship with shared libraries and binaries that they write out # Some apps ship with shared libraries and binaries that they write out
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all app_data_file:file rx_file_perms; allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
allow untrusted_app_all asec_apk_file:dir r_dir_perms; allow untrusted_app_all asec_apk_file:dir r_dir_perms;
# Execute libs in asec containers. # Execute libs in asec containers.
allow untrusted_app_all asec_public_file:file execute; allow untrusted_app_all asec_public_file:file { execute execmod };
# Used by Finsky / Android "Verify Apps" functionality when # Used by Finsky / Android "Verify Apps" functionality when
# running "adb install foo.apk". # running "adb install foo.apk".
......
...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap }; ...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap };
# prohibit non-zygote spawned processes from using shared libraries # prohibit non-zygote spawned processes from using shared libraries
# with text relocations. b/20013628 . # with text relocations. b/20013628 .
neverallow { domain -untrusted_app_25 } file_type:file execmod; neverallow { domain -untrusted_app_all } file_type:file execmod;
neverallow { domain -init } proc:{ file dir } mounton; neverallow { domain -init } proc:{ file dir } mounton;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment