diff --git a/private/untrusted_app_all.te b/private/untrusted_app_all.te index e28f66c90c07ecec914f43a96dba2255d077ed08..c9bf65fa68e025dcafca0061c6d3fda4ebd69faf 100644 --- a/private/untrusted_app_all.te +++ b/private/untrusted_app_all.te @@ -126,10 +126,6 @@ unix_socket_connect(untrusted_app_all, traced_producer, traced) allow untrusted_app_all system_server:udp_socket { connect getattr read recvfrom sendto write getopt setopt }; -# Allow the allocation and use of ptys -# Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm -create_pty(untrusted_app_all) - # This is allowed for targetSdkVersion <= 25 but disallowed on newer versions. dontaudit untrusted_app_all net_dns_prop:file read; @@ -139,6 +135,10 @@ dontaudit untrusted_app_all proc_stat:file read; dontaudit untrusted_app_all proc_vmstat:file read; dontaudit untrusted_app_all proc_uptime:file read; +# Allow the allocation and use of ptys +# Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm +create_pty(untrusted_app_all) + # /proc/net access. # TODO(b/9496886) Audit access for removal. # VPN apps require access to /proc/net/{tcp,udp} so access will need to be