Skip to content
Snippets Groups Projects
Commit faa8dc01 authored by Max Bires's avatar Max Bires Committed by android-build-merger
Browse files

Merge "Adding permission for traceur to use content provider"

am: d312b5fd

Change-Id: Ica55652060d57c0d373995a9d0a87b39b06d4f36
parents 3bd65bc6 d312b5fd
Branches
Tags
No related merge requests found
...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod }; ...@@ -41,6 +41,15 @@ allow untrusted_app_all asec_public_file:file { execute execmod };
allow untrusted_app_all shell_data_file:file r_file_perms; allow untrusted_app_all shell_data_file:file r_file_perms;
allow untrusted_app_all shell_data_file:dir r_dir_perms; allow untrusted_app_all shell_data_file:dir r_dir_perms;
# Allow traceur to pass file descriptors through a content provider to untrusted apps
# for the purpose of sharing files through e.g. gmail
allow untrusted_app_all trace_data_file:file { getattr read };
# untrusted apps should not be able to open trace data files, they should depend
# upon traceur to pass a file descriptor
neverallow untrusted_app_all trace_data_file:dir *;
neverallow untrusted_app_all trace_data_file:file { no_w_file_perms open };
# Allow to read staged apks. # Allow to read staged apks.
allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr}; allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment