Add services and allow app to write to sdk_sandbox
We might want to change this in later android versions. Ignore-AOSP-First: Already merged via aosp/2051365 Bug: b/228159127 Bug: b/227745962 Bug: b/229251344 Test: Manual Change-Id: I8f425cc9f2759a29bdd2e6218ad0a1c40750e4f5 Merged-In: I8f425cc9f2759a29bdd2e6218ad0a1c40750e4f5 Merged-In: I2e308ca9ce58e71ac9d7d9b0fa515bdf2f5dfa1f (cherry picked from commit13bdca21d5
) (cherry picked from commitce2b6da673
)
This commit is contained in:
parent
04a85a1ba0
commit
4aad91d920
4 changed files with 20 additions and 0 deletions
|
@ -33,6 +33,7 @@ allow sdk_sandbox font_service:service_manager find;
|
|||
allow sdk_sandbox game_service:service_manager find;
|
||||
allow sdk_sandbox gpu_service:service_manager find;
|
||||
allow sdk_sandbox graphicsstats_service:service_manager find;
|
||||
allow sdk_sandbox hardware_properties_service:service_manager find;
|
||||
allow sdk_sandbox hint_service:service_manager find;
|
||||
allow sdk_sandbox imms_service:service_manager find;
|
||||
allow sdk_sandbox input_method_service:service_manager find;
|
||||
|
@ -89,6 +90,8 @@ allow sdk_sandbox uimode_service:service_manager find;
|
|||
allow sdk_sandbox vcn_management_service:service_manager find;
|
||||
allow sdk_sandbox webviewupdate_service:service_manager find;
|
||||
|
||||
allow sdk_sandbox system_linker_exec:file execute_no_trans;
|
||||
|
||||
# Write app-specific trace data to the Perfetto traced damon. This requires
|
||||
# connecting to its producer socket and obtaining a (per-process) tmpfs fd.
|
||||
perfetto_producer(sdk_sandbox)
|
||||
|
|
|
@ -14,3 +14,10 @@ app_domain(untrusted_app)
|
|||
untrusted_app_domain(untrusted_app)
|
||||
net_domain(untrusted_app)
|
||||
bluetooth_domain(untrusted_app)
|
||||
|
||||
# Allow webview to access fd shared by sdksandbox for experiments data
|
||||
# TODO(b/229249719): Will not be supported in Android U
|
||||
allow untrusted_app sdk_sandbox_data_file:fd use;
|
||||
allow untrusted_app sdk_sandbox_data_file:file write;
|
||||
|
||||
neverallow untrusted_app sdk_sandbox_data_file:file { open create };
|
||||
|
|
|
@ -33,6 +33,7 @@ allow sdk_sandbox font_service:service_manager find;
|
|||
allow sdk_sandbox game_service:service_manager find;
|
||||
allow sdk_sandbox gpu_service:service_manager find;
|
||||
allow sdk_sandbox graphicsstats_service:service_manager find;
|
||||
allow sdk_sandbox hardware_properties_service:service_manager find;
|
||||
allow sdk_sandbox hint_service:service_manager find;
|
||||
allow sdk_sandbox imms_service:service_manager find;
|
||||
allow sdk_sandbox input_method_service:service_manager find;
|
||||
|
@ -89,6 +90,8 @@ allow sdk_sandbox uimode_service:service_manager find;
|
|||
allow sdk_sandbox vcn_management_service:service_manager find;
|
||||
allow sdk_sandbox webviewupdate_service:service_manager find;
|
||||
|
||||
allow sdk_sandbox system_linker_exec:file execute_no_trans;
|
||||
|
||||
# Write app-specific trace data to the Perfetto traced damon. This requires
|
||||
# connecting to its producer socket and obtaining a (per-process) tmpfs fd.
|
||||
perfetto_producer(sdk_sandbox)
|
||||
|
|
|
@ -14,3 +14,10 @@ app_domain(untrusted_app)
|
|||
untrusted_app_domain(untrusted_app)
|
||||
net_domain(untrusted_app)
|
||||
bluetooth_domain(untrusted_app)
|
||||
|
||||
# Allow webview to access fd shared by sdksandbox for experiments data
|
||||
# TODO(b/229249719): Will not be supported in Android U
|
||||
allow untrusted_app sdk_sandbox_data_file:fd use;
|
||||
allow untrusted_app sdk_sandbox_data_file:file write;
|
||||
|
||||
neverallow untrusted_app sdk_sandbox_data_file:file { open create };
|
||||
|
|
Loading…
Reference in a new issue