diff --git a/private/file_contexts b/private/file_contexts index 1db5210d941c44a38112c6185218e03cefea3bf0..5c0bc67c628eaedac17dc5cc5a891a11012517bc 100644 --- a/private/file_contexts +++ b/private/file_contexts @@ -44,8 +44,8 @@ /mapping_sepolicy\.cil u:object_r:rootfs:s0 /nonplat_sepolicy\.cil u:object_r:rootfs:s0 /plat_sepolicy\.cil u:object_r:rootfs:s0 -/plat_property_contexts u:object_r:property_contexts:s0 -/nonplat_property_contexts u:object_r:property_contexts:s0 +/plat_property_contexts u:object_r:property_contexts_file:s0 +/nonplat_property_contexts u:object_r:property_contexts_file:s0 /seapp_contexts u:object_r:rootfs:s0 /nonplat_seapp_contexts u:object_r:rootfs:s0 /plat_seapp_contexts u:object_r:rootfs:s0 @@ -249,11 +249,13 @@ /system/bin/virtual_touchpad u:object_r:virtual_touchpad_exec:s0 /system/bin/vr_wm u:object_r:vr_wm_exec:s0 /system/bin/hw/android\.hidl\.allocator@1\.0-service u:object_r:hal_allocator_default_exec:s0 +/system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 ############################# # Vendor files # /vendor(/.*)? u:object_r:system_file:s0 +/vendor/etc/selinux/nonplat_property_contexts u:object_r:property_contexts_file:s0 ############################# # OEM and ODM files diff --git a/public/domain.te b/public/domain.te index 0a3709690844dcb5476f3f446399ac8d842e8b5b..97d6a111fc655cc44f5e4cb278233aa2f9c69db4 100644 --- a/public/domain.te +++ b/public/domain.te @@ -89,7 +89,7 @@ get_prop(domain, core_property_type) # messages to logd. get_prop(domain, log_property_type) dontaudit domain property_type:file audit_access; -allow domain property_contexts:file r_file_perms; +allow domain property_contexts_file:file r_file_perms; allow domain init:key search; allow domain vold:key search; diff --git a/public/file.te b/public/file.te index 92fa4a35fe40f14298838ee2f4d41bdedbb8ccb4..91c02bdacc00aef1d686af4ed29df2c592aea77a 100644 --- a/public/file.te +++ b/public/file.te @@ -257,7 +257,7 @@ type sap_uim_socket, file_type; type gps_control, file_type; # property_contexts file -type property_contexts, file_type; +type property_contexts_file, file_type; # Allow files to be created in their appropriate filesystems. allow fs_type self:filesystem associate;