* commit '5f34265c5af472042c338780a39145661cca0e09': Remove untrusted_app access to tmp apk files
This commit is contained in:
commit
5d7bd5849a
2 changed files with 4 additions and 4 deletions
4
app.te
4
app.te
|
@ -344,6 +344,10 @@ neverallow appdomain
|
|||
dhcp_data_file:dir_file_class_set
|
||||
{ create write setattr relabelfrom relabelto append unlink link rename };
|
||||
|
||||
# access tmp apk files
|
||||
neverallow { appdomain -platform_app -priv_app }
|
||||
{ apk_tmp_file apk_private_tmp_file }:dir_file_class_set *;
|
||||
|
||||
# Access to factory files.
|
||||
neverallow appdomain efs_file:dir_file_class_set write;
|
||||
neverallow { appdomain -shell } efs_file:dir_file_class_set read;
|
||||
|
|
|
@ -80,10 +80,6 @@ allow untrusted_app radio_service:service_manager find;
|
|||
allow untrusted_app surfaceflinger_service:service_manager find;
|
||||
allow untrusted_app app_api_service:service_manager find;
|
||||
|
||||
# Allow verifier to access staged apks.
|
||||
allow untrusted_app { apk_tmp_file apk_private_tmp_file }:dir r_dir_perms;
|
||||
allow untrusted_app { apk_tmp_file apk_private_tmp_file }:file r_file_perms;
|
||||
|
||||
# only allow unprivileged socket ioctl commands
|
||||
allow untrusted_app self:{ rawip_socket tcp_socket udp_socket } unpriv_sock_ioctls;
|
||||
|
||||
|
|
Loading…
Reference in a new issue