Skip to content
Snippets Groups Projects
Commit 28c14bdd authored by Max Bires's avatar Max Bires Committed by android-build-merger
Browse files

Merge "Adding permission for traceur to use content provider" am: d312b5fd am: faa8dc01

am: c15d65fa

Change-Id: Ia6ecb8985ac2e06f64e99ac4ee3796090b6a88f7
parents 9ef1dedf c15d65fa
No related branches found
No related tags found
No related merge requests found
...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod }; ...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod };
allow untrusted_app_all shell_data_file:file r_file_perms; allow untrusted_app_all shell_data_file:file r_file_perms;
allow untrusted_app_all shell_data_file:dir r_dir_perms; allow untrusted_app_all shell_data_file:dir r_dir_perms;
# Allow traceur to pass file descriptors through a content provider to untrusted apps
# for the purpose of sharing files through e.g. gmail
allow untrusted_app_all trace_data_file:file { getattr read };
# untrusted apps should not be able to open trace data files, they should depend
# upon traceur to pass a file descriptor
neverallow untrusted_app_all trace_data_file:dir *;
neverallow untrusted_app_all trace_data_file:file { no_w_file_perms open };
# Allow to read staged apks. # Allow to read staged apks.
allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr}; allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment