Skip to content
Snippets Groups Projects
Commit 25725b63 authored by Jeff Sharkey's avatar Jeff Sharkey
Browse files

Protect runtime storage mount points.

We have a bunch of magic that mounts the correct view of storage
access based on the runtime permissions of an app, but we forgot to
protect the real underlying data sources; oops.

This series of changes just bumps the directory heirarchy one level
to give us /mnt/runtime which we can mask off as 0700 to prevent
people from jumping to the exposed internals.

Also add CTS tests to verify that we're protecting access to
internal mount points like this.

Bug: 22964288
Change-Id: Ic585c4d4381fe51bd764902ef28c38db63b7f2cc
parent e827a8ab
No related branches found
No related tags found
No related merge requests found
......@@ -314,7 +314,5 @@
# external storage
/mnt/media_rw(/.*)? u:object_r:mnt_media_rw_file:s0
/mnt/user(/.*)? u:object_r:mnt_user_file:s0
/mnt/runtime_default(/.*)? u:object_r:storage_file:s0
/mnt/runtime_read(/.*)? u:object_r:storage_file:s0
/mnt/runtime_write(/.*)? u:object_r:storage_file:s0
/mnt/runtime(/.*)? u:object_r:storage_file:s0
/storage(/.*)? u:object_r:storage_file:s0
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment