On 04/03/2015 09:16 AM, Datta, Souvik wrote:
> Hello Stephen,
> 
> I am using Android 4.4.4 which is distributed by a Silicon Vendor for the 
> embedded target that I am working on. I went ahead and modified 
> <build>/external/sepolicy/untrusted_app.te file by commenting out 
> #permissive untrusted_app; and then did a build. But this did not have any 
> effect.  In other words, the process belonging to untrusted_app domain could 
> still access the database (u:object_r:hm_phonebookaccess_data_file:s0) 
> 
> Is there any other way, this can be handled other than moving to a different 
> version of SEAndroid?

Are you trying to prevent direct access to the file or the ability to
use the ContentProvider?  Two different issues.  The former is
enforceable by SELinux at the kernel level.  The latter is a matter of
Android permissions enforced by the middleware.

_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to