diff --git a/app.te b/app.te index 48db05d077b62dc6a02c4b2bd4f993a05026c4ba..7a679fdb7bbcbc215fbfbd0d7ba92f80969ac065 100644 --- a/app.te +++ b/app.te @@ -205,6 +205,9 @@ allow appdomain console_device:chr_file { read write }; allow { appdomain -isolated_app } ion_device:chr_file rw_file_perms; +# TODO: switch to meminfo service +allow appdomain proc_meminfo:file r_file_perms; + # For app fuse. allow appdomain app_fuse_file:file { getattr read append write }; diff --git a/isolated_app.te b/isolated_app.te index 34fe41c65c81059f3979852dd2389783865ffdd1..124fde92a0637c014fe0f304b3e44462392e00ae 100644 --- a/isolated_app.te +++ b/isolated_app.te @@ -9,7 +9,7 @@ ### additional following rules: ### -type isolated_app, domain, domain_deprecated; +type isolated_app, domain; app_domain(isolated_app) # Access already open app data files received over Binder or local socket IPC. diff --git a/untrusted_app.te b/untrusted_app.te index 1c17e3091591306b6497665fc2237478ef582416..a61384bb853d82547dd1da927c7ee26692c03f15 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -84,9 +84,6 @@ userdebug_or_eng(` # gdbserver for ndk-gdb ptrace attaches to app process. allow untrusted_app self:process ptrace; -# TODO: switch to meminfo service -allow untrusted_app proc_meminfo:file r_file_perms; - # access /proc/net/xt_qtguid/stats r_dir_file(untrusted_app, proc_net)