2023-01-18 08:52:43 +01:00
|
|
|
###
|
|
|
|
### Untrusted apps.
|
|
|
|
###
|
|
|
|
### This file defines the rules for untrusted apps running with
|
|
|
|
### 31 < targetSdkVersion <= 33.
|
|
|
|
###
|
|
|
|
### See public/untrusted_app.te for more information about which apps are
|
|
|
|
### placed in this selinux domain.
|
|
|
|
###
|
|
|
|
|
|
|
|
typeattribute untrusted_app_32 coredomain;
|
|
|
|
|
|
|
|
app_domain(untrusted_app_32)
|
|
|
|
untrusted_app_domain(untrusted_app_32)
|
|
|
|
net_domain(untrusted_app_32)
|
|
|
|
bluetooth_domain(untrusted_app_32)
|
|
|
|
|
|
|
|
# Allow webview to access fd shared by sdksandbox for experiments data
|
|
|
|
# TODO(b/229249719): Will not be supported in Android U
|
|
|
|
allow untrusted_app_32 sdk_sandbox_data_file:fd use;
|
|
|
|
allow untrusted_app_32 sdk_sandbox_data_file:file write;
|
|
|
|
|
|
|
|
neverallow untrusted_app_32 sdk_sandbox_data_file:file { open create };
|
|
|
|
|
|
|
|
# Connect to mdnsd via mdnsd socket.
|
|
|
|
unix_socket_connect(untrusted_app_32, mdnsd, mdnsd)
|
|
|
|
userdebug_or_eng(`
|
|
|
|
auditallow untrusted_app_32 mdnsd_socket:sock_file write;
|
|
|
|
auditallow untrusted_app_32 mdnsd:unix_stream_socket connectto;
|
|
|
|
')
|
2023-03-27 12:30:23 +02:00
|
|
|
|
|
|
|
# Allow calling inotify on APKs for backwards compatibility. This is disallowed
|
|
|
|
# for targetSdkVersion>=34 to remove a sidechannel.
|
|
|
|
allow untrusted_app_32 apk_data_file:dir { watch watch_reads };
|
|
|
|
allow untrusted_app_32 apk_data_file:file { watch watch_reads };
|
|
|
|
userdebug_or_eng(`
|
|
|
|
auditallow untrusted_app_32 apk_data_file:dir { watch watch_reads };
|
|
|
|
auditallow untrusted_app_32 apk_data_file:file { watch watch_reads };
|
|
|
|
')
|