Skip to content
Snippets Groups Projects
Commit e7f1354c authored by Yabin Cui's avatar Yabin Cui Committed by Gerrit Code Review
Browse files

Merge changes from topic "runas_exec"

* changes:
  Add runas_app domain to allow running app data file via run-as.
  Revert "Revert "Enforce execve() restrictions for API > 28""
parents 5faae3ae ffa2b613
No related branches found
No related tags found
No related merge requests found
...@@ -40,6 +40,17 @@ neverallow { all_untrusted_apps -mediaprovider } property_type:property_service ...@@ -40,6 +40,17 @@ neverallow { all_untrusted_apps -mediaprovider } property_type:property_service
# but otherwise disallow untrusted apps from reading this property. # but otherwise disallow untrusted apps from reading this property.
neverallow { all_untrusted_apps -untrusted_app_25 } net_dns_prop:file read; neverallow { all_untrusted_apps -untrusted_app_25 } net_dns_prop:file read;
# Block calling execve() on files in an apps home directory.
# This is a W^X violation (loading executable code from a writable
# home directory). For compatibility, allow for targetApi <= 28.
# b/112357170
neverallow {
all_untrusted_apps
-untrusted_app_25
-untrusted_app_27
-runas_app
} { app_data_file privapp_data_file }:file execute_no_trans;
# Do not allow untrusted apps to be assigned mlstrustedsubject. # Do not allow untrusted apps to be assigned mlstrustedsubject.
# This would undermine the per-user isolation model being # This would undermine the per-user isolation model being
# enforced via levelFrom=user in seapp_contexts and the mls # enforced via levelFrom=user in seapp_contexts and the mls
......
type runas_app, domain;
typeattribute runas_app coredomain;
app_domain(runas_app)
untrusted_app_domain(runas_app)
net_domain(runas_app)
bluetooth_domain(runas_app)
# The ability to call exec() on files in the apps home directories
# when using run-as on a debuggable app. Needed by simpleperf.
allow runas_app app_data_file:file execute_no_trans;
...@@ -9,6 +9,7 @@ ...@@ -9,6 +9,7 @@
# path (string) # path (string)
# isPrivApp (boolean) # isPrivApp (boolean)
# minTargetSdkVersion (unsigned integer) # minTargetSdkVersion (unsigned integer)
# fromRunAs (boolean)
# isSystemServer=true can only be used once. # isSystemServer=true can only be used once.
# An unspecified isSystemServer defaults to false. # An unspecified isSystemServer defaults to false.
# isEphemeralApp=true will match apps marked by PackageManager as Ephemeral # isEphemeralApp=true will match apps marked by PackageManager as Ephemeral
...@@ -25,6 +26,7 @@ ...@@ -25,6 +26,7 @@
# minTargetSdkVersion will match applications with a targetSdkVersion # minTargetSdkVersion will match applications with a targetSdkVersion
# greater than or equal to the specified value. If unspecified, # greater than or equal to the specified value. If unspecified,
# it has a default value of 0. # it has a default value of 0.
# fromRunAs=true means the setcontext request is from run-as. Default is false.
# All specified input selectors in an entry must match (i.e. logical AND). # All specified input selectors in an entry must match (i.e. logical AND).
# Matching is case-insensitive. # Matching is case-insensitive.
# #
...@@ -43,6 +45,7 @@ ...@@ -43,6 +45,7 @@
# (11) Specified isPrivApp= before unspecified isPrivApp= boolean. # (11) Specified isPrivApp= before unspecified isPrivApp= boolean.
# (12) Higher value of minTargetSdkVersion= before lower value of minTargetSdkVersion= # (12) Higher value of minTargetSdkVersion= before lower value of minTargetSdkVersion=
# integer. Note that minTargetSdkVersion= defaults to 0 if unspecified. # integer. Note that minTargetSdkVersion= defaults to 0 if unspecified.
# (13) fromRunAs=true before fromRunAs=false.
# #
# Outputs: # Outputs:
# domain (string) # domain (string)
...@@ -114,6 +117,8 @@ user=_app seinfo=media domain=mediaprovider name=android.process.media type=app_ ...@@ -114,6 +117,8 @@ user=_app seinfo=media domain=mediaprovider name=android.process.media type=app_
user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user
user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user
user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all user=_app minTargetSdkVersion=29 domain=untrusted_app type=app_data_file levelFrom=all
user=_app minTargetSdkVersion=28 domain=untrusted_app_27 type=app_data_file levelFrom=all
user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user
user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user
user=_app fromRunAs=true domain=runas_app levelFrom=all
...@@ -44,3 +44,8 @@ allow untrusted_app_25 proc_tty_drivers:file r_file_perms; ...@@ -44,3 +44,8 @@ allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
# Text relocation support for API < 23 # Text relocation support for API < 23
# https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23 # https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod; allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod;
# The ability to call exec() on files in the apps home directories
# for targetApi<=25. This is also allowed for targetAPIs 26, 27,
# and 28 in untrusted_app_27.te.
allow untrusted_app_25 app_data_file:file execute_no_trans;
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
### Untrusted_27. ### Untrusted_27.
### ###
### This file defines the rules for untrusted apps running with ### This file defines the rules for untrusted apps running with
### 25 < targetSdkVersion <= 27. ### 25 < targetSdkVersion <= 28.
### ###
### This file defines the rules for untrusted apps. ### This file defines the rules for untrusted apps.
### Apps are labeled based on mac_permissions.xml (maps signer and ### Apps are labeled based on mac_permissions.xml (maps signer and
...@@ -26,3 +26,7 @@ app_domain(untrusted_app_27) ...@@ -26,3 +26,7 @@ app_domain(untrusted_app_27)
untrusted_app_domain(untrusted_app_27) untrusted_app_domain(untrusted_app_27)
net_domain(untrusted_app_27) net_domain(untrusted_app_27)
bluetooth_domain(untrusted_app_27) bluetooth_domain(untrusted_app_27)
# The ability to call exec() on files in the apps home directories
# for targetApi 26, 27, and 28.
allow untrusted_app_27 app_data_file:file execute_no_trans;
...@@ -22,7 +22,7 @@ ...@@ -22,7 +22,7 @@
# Some apps ship with shared libraries and binaries that they write out # Some apps ship with shared libraries and binaries that they write out
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all { app_data_file privapp_data_file }:file { rx_file_perms }; allow untrusted_app_all { app_data_file privapp_data_file }:file { r_file_perms execute };
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
......
...@@ -212,6 +212,7 @@ key_map rules[] = { ...@@ -212,6 +212,7 @@ key_map rules[] = {
{ .name = "path", .dir = dir_in, }, { .name = "path", .dir = dir_in, },
{ .name = "isPrivApp", .dir = dir_in, .fn_validate = validate_bool }, { .name = "isPrivApp", .dir = dir_in, .fn_validate = validate_bool },
{ .name = "minTargetSdkVersion", .dir = dir_in, .fn_validate = validate_uint }, { .name = "minTargetSdkVersion", .dir = dir_in, .fn_validate = validate_uint },
{ .name = "fromRunAs", .dir = dir_in, .fn_validate = validate_bool },
/*Outputs*/ /*Outputs*/
{ .name = "domain", .dir = dir_out, .fn_validate = validate_selinux_type }, { .name = "domain", .dir = dir_out, .fn_validate = validate_selinux_type },
{ .name = "type", .dir = dir_out, .fn_validate = validate_selinux_type }, { .name = "type", .dir = dir_out, .fn_validate = validate_selinux_type },
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment