Skip to content
Snippets Groups Projects
Commit c15d65fa authored by Max Bires's avatar Max Bires Committed by android-build-merger
Browse files

Merge "Adding permission for traceur to use content provider" am: d312b5fd

am: faa8dc01

Change-Id: Idae88a24b6d9e4b5e655171471e9799c1b8df129
parents 799a6326 faa8dc01
Branches
Tags
No related merge requests found
...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod }; ...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod };
allow untrusted_app_all shell_data_file:file r_file_perms; allow untrusted_app_all shell_data_file:file r_file_perms;
allow untrusted_app_all shell_data_file:dir r_dir_perms; allow untrusted_app_all shell_data_file:dir r_dir_perms;
# Allow traceur to pass file descriptors through a content provider to untrusted apps
# for the purpose of sharing files through e.g. gmail
allow untrusted_app_all trace_data_file:file { getattr read };
# untrusted apps should not be able to open trace data files, they should depend
# upon traceur to pass a file descriptor
neverallow untrusted_app_all trace_data_file:dir *;
neverallow untrusted_app_all trace_data_file:file { no_w_file_perms open };
# Allow to read staged apks. # Allow to read staged apks.
allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr}; allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment