Skip to content
Snippets Groups Projects
Commit c5883e52 authored by Chad Brubaker's avatar Chad Brubaker Committed by android-build-merger
Browse files

Merge "Allow ephemeral apps to read/write external storage" am: b7f86a72

am: 2dcb16e6

Change-Id: I218dacfbe93f77345bfcfd0909c6831fb1549565
parents d196a2f7 2dcb16e6
No related branches found
No related tags found
No related merge requests found
...@@ -22,6 +22,9 @@ allow ephemeral_app ephemeral_data_file:{ file sock_file fifo_file } create_file ...@@ -22,6 +22,9 @@ allow ephemeral_app ephemeral_data_file:{ file sock_file fifo_file } create_file
allow ephemeral_app ephemeral_apk_data_file:dir r_dir_perms; allow ephemeral_app ephemeral_apk_data_file:dir r_dir_perms;
allow ephemeral_app ephemeral_apk_data_file:file { r_file_perms execute }; allow ephemeral_app ephemeral_apk_data_file:file { r_file_perms execute };
# Allow ephemeral apps to read/write files in visible storage if provided fds
allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
# services # services
allow ephemeral_app surfaceflinger_service:service_manager find; allow ephemeral_app surfaceflinger_service:service_manager find;
allow ephemeral_app radio_service:service_manager find; allow ephemeral_app radio_service:service_manager find;
...@@ -54,3 +57,7 @@ neverallow ephemeral_app sysfs:file *; ...@@ -54,3 +57,7 @@ neverallow ephemeral_app sysfs:file *;
# Avoid reads from generically labeled /proc files # Avoid reads from generically labeled /proc files
# Create a more specific label if needed # Create a more specific label if needed
neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms }; neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms };
# Directly access external storage
neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create};
neverallow ephemeral_app { sdcard_type media_rw_data_file }:dir search;
...@@ -197,8 +197,8 @@ allow { appdomain -isolated_app -ephemeral_app } media_rw_data_file:file create_ ...@@ -197,8 +197,8 @@ allow { appdomain -isolated_app -ephemeral_app } media_rw_data_file:file create_
# Access OBBs (vfat images) mounted by vold (b/17633509) # Access OBBs (vfat images) mounted by vold (b/17633509)
# File write access allowed for FDs returned through Storage Access Framework # File write access allowed for FDs returned through Storage Access Framework
allow { appdomain -isolated_app } vfat:dir r_dir_perms; allow { appdomain -isolated_app -ephemeral_app } vfat:dir r_dir_perms;
allow { appdomain -isolated_app } vfat:file rw_file_perms; allow { appdomain -isolated_app -ephemeral_app } vfat:file rw_file_perms;
# Allow apps to use the USB Accessory interface. # Allow apps to use the USB Accessory interface.
# http://developer.android.com/guide/topics/connectivity/usb/accessory.html # http://developer.android.com/guide/topics/connectivity/usb/accessory.html
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment