Allow heapprofd to read shell_test_data_file.
This is so we can run integrationtests on user. Change-Id: Ie6afad9758968e6cdeb030fbf4d3b75a61813269
This commit is contained in:
parent
9e794114b2
commit
5cefb23c4f
2 changed files with 3 additions and 1 deletions
|
@ -45,6 +45,7 @@ r_dir_file(heapprofd, apex_art_data_file)
|
|||
r_dir_file(heapprofd, apk_data_file)
|
||||
r_dir_file(heapprofd, dalvikcache_data_file)
|
||||
r_dir_file(heapprofd, vendor_file_type)
|
||||
r_dir_file(heapprofd, shell_test_data_file)
|
||||
# Some dex files are not world-readable.
|
||||
# We are still constrained by the SELinux rules above.
|
||||
allow heapprofd self:global_capability_class_set dac_read_search;
|
||||
|
|
|
@ -478,7 +478,8 @@ neverallow { domain userdebug_or_eng(`-shell') } nativetest_data_file:file no_x_
|
|||
|
||||
neverallow { domain -shell -init -adbd } shell_test_data_file:file_class_set no_w_file_perms;
|
||||
neverallow { domain -shell -init -adbd } shell_test_data_file:dir no_w_dir_perms;
|
||||
neverallow { domain -shell -init -adbd } shell_test_data_file:file *;
|
||||
neverallow { domain -shell -init -adbd -heapprofd } shell_test_data_file:file *;
|
||||
neverallow heapprofd shell_test_data_file:file { no_w_file_perms no_x_file_perms };
|
||||
|
||||
# Only the init property service should write to /data/property and /dev/__properties__
|
||||
neverallow { domain -init } property_data_file:dir no_w_dir_perms;
|
||||
|
|
Loading…
Reference in a new issue