Skip to content
Snippets Groups Projects
Commit ca8749a0 authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

auditallow app_data_file execute

am: 4738b93d

Change-Id: I4278bd3d4e7786be716324d1817a81b6c19eec2e
parents fed2c09c 4738b93d
No related branches found
No related tags found
No related merge requests found
...@@ -23,6 +23,12 @@ allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ...@@ -23,6 +23,12 @@ allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow ephemeral_app { app_data_file privapp_data_file }:file {r_file_perms execute}; allow ephemeral_app { app_data_file privapp_data_file }:file {r_file_perms execute};
# Executing files from an application home directory violates
# W^X (https://en.wikipedia.org/wiki/W%5EX) constraints (loading executable code
# from a writable file) and is an unsafe application behavior. Test to see if we
# can get rid of it.
auditallow ephemeral_app app_data_file:file execute;
# services # services
allow ephemeral_app audioserver_service:service_manager find; allow ephemeral_app audioserver_service:service_manager find;
allow ephemeral_app cameraserver_service:service_manager find; allow ephemeral_app cameraserver_service:service_manager find;
......
...@@ -24,6 +24,12 @@ ...@@ -24,6 +24,12 @@
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all { app_data_file privapp_data_file }:file { rx_file_perms }; allow untrusted_app_all { app_data_file privapp_data_file }:file { rx_file_perms };
# Executing files from an application home directory violates
# W^X (https://en.wikipedia.org/wiki/W%5EX) constraints (loading executable code
# from a writable file) and is an unsafe application behavior. Test to see if we
# can get rid of it.
auditallow untrusted_app_all app_data_file:file { execute execute_no_trans };
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
allow untrusted_app_all asec_apk_file:dir r_dir_perms; allow untrusted_app_all asec_apk_file:dir r_dir_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment