Skip to content
Snippets Groups Projects
Commit e1adac6e authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Protect apps from ptrace by other system components am: 84a42ead

am: 315f2fb2

Change-Id: I103bfc51a52799a3a4c46e493ae88ce9e985984a
parents f4b21858 315f2fb2
No related branches found
No related tags found
No related merge requests found
......@@ -405,6 +405,14 @@ neverallow appdomain zygote_socket:sock_file write;
# ptrace access to non-app domains.
neverallow appdomain { domain -appdomain }:process ptrace;
# The Android security model guarantees the confidentiality and integrity
# of application data and execution state. Ptrace bypasses those
# confidentiality guarantees. Disallow ptrace access from system components
# to apps. Crash_dump is excluded, as it needs ptrace access to
# produce stack traces.
neverallow { domain -appdomain -crash_dump } appdomain:process ptrace;
# Read or write access to /proc/pid entries for any non-app domain.
# A different form of hidepid=2 like protections
neverallow appdomain { domain -appdomain }:file no_w_file_perms;
......
......@@ -178,6 +178,12 @@ tmpfs_domain($1)
allow $1 $1_tmpfs:file execute;
neverallow { $1 -shell } { domain -$1 }:file no_rw_file_perms;
neverallow { appdomain -shell -$1 } $1:file no_rw_file_perms;
# The Android security model guarantees the confidentiality and integrity
# of application data and execution state. Ptrace bypasses those
# confidentiality guarantees. Disallow ptrace access from system components
# to apps. Crash_dump is excluded, as it needs ptrace access to
# produce stack traces.
neverallow { domain -$1 -crash_dump } $1:process ptrace;
')
#####################################
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment