Skip to content
Snippets Groups Projects
Commit 38d3eca0 authored by Nick Kralevich's avatar Nick Kralevich
Browse files

Remove execmod support for newer API versions

Drop support for execmod (aka text relocations) for newer API versions.
Retain it for older app APIs versions.

Bug: 30146890
Bug: 20013628
Bug: 35323421
Test: policy compiles.
Change-Id: Ie54fdb385e9c4bb997ad6fcb6cff74f7e32927bb
parent b4f354fd
No related branches found
No related tags found
No related merge requests found
...@@ -42,3 +42,6 @@ allow untrusted_app_25 proc_misc:file r_file_perms; ...@@ -42,3 +42,6 @@ allow untrusted_app_25 proc_misc:file r_file_perms;
# https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java # https://github.com/strazzere/anti-emulator/blob/master/AntiEmulator/src/diff/strazzere/anti/emulator/FindEmulator.java
# This will go away in a future Android release # This will go away in a future Android release
allow untrusted_app_25 proc_tty_drivers:file r_file_perms; allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
# Legacy text relocations
allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod;
...@@ -17,18 +17,15 @@ ...@@ -17,18 +17,15 @@
### seapp_contexts. ### seapp_contexts.
### ###
# Legacy text relocations
allow untrusted_app_all apk_data_file:file execmod;
# Some apps ship with shared libraries and binaries that they write out # Some apps ship with shared libraries and binaries that they write out
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; allow untrusted_app_all app_data_file:file rx_file_perms;
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
allow untrusted_app_all asec_apk_file:dir r_dir_perms; allow untrusted_app_all asec_apk_file:dir r_dir_perms;
# Execute libs in asec containers. # Execute libs in asec containers.
allow untrusted_app_all asec_public_file:file { execute execmod }; allow untrusted_app_all asec_public_file:file execute;
# Used by Finsky / Android "Verify Apps" functionality when # Used by Finsky / Android "Verify Apps" functionality when
# running "adb install foo.apk". # running "adb install foo.apk".
......
...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap }; ...@@ -499,7 +499,7 @@ neverallow * self:process { execstack execheap };
# prohibit non-zygote spawned processes from using shared libraries # prohibit non-zygote spawned processes from using shared libraries
# with text relocations. b/20013628 . # with text relocations. b/20013628 .
neverallow { domain -untrusted_app_all } file_type:file execmod; neverallow { domain -untrusted_app_25 } file_type:file execmod;
neverallow { domain -init } proc:{ file dir } mounton; neverallow { domain -init } proc:{ file dir } mounton;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment