Merge "priv_app: Remove rules allowing a priv-app to ptrace itself" am: 623fb38952
am: 5fc5ebb667
Change-Id: I1143161f6bb4c737320532a5310bf6308149df30
This commit is contained in:
commit
6137fabe74
1 changed files with 0 additions and 7 deletions
|
@ -14,13 +14,6 @@ bluetooth_domain(priv_app)
|
|||
# Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
|
||||
create_pty(priv_app)
|
||||
|
||||
# webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
||||
allow priv_app self:process ptrace;
|
||||
# b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own domain.
|
||||
userdebug_or_eng(`
|
||||
auditallow priv_app self:process ptrace;
|
||||
')
|
||||
|
||||
# Allow loading executable code from writable priv-app home
|
||||
# directories. This is a W^X violation, however, it needs
|
||||
# to be supported for now for the following reasons.
|
||||
|
|
Loading…
Reference in a new issue