-
- Downloads
sepolicy: relabel /vendor
The CL splits /vendor labeling from /system. Which was allowing all
processes read, execute access to /vendor.
Following directories will remain world readable
/vendor/etc
/vendor/lib(64)/hw/
Following are currently world readable but their scope
will be minimized to platform processes that require access
/vendor/app
/vendor/framework/
/vendor/overlay
Files labelled with 'same_process_hal_file' are allowed to be
read + executed from by the world. This is for Same process HALs and
their dependencies.
Bug: 36527360
Bug: 36832490
Bug: 36681210
Bug: 36680116
Bug: 36690845
Bug: 36697328
Bug: 36696623
Bug: 36806861
Bug: 36656392
Bug: 36696623
Bug: 36792803
All of the tests were done on sailfish, angler, bullhead, dragon
Test: Boot and connect to wifi
Test: Run chrome and load websites, play video in youtube, load maps w/
current location, take pictures and record video in camera,
playback recorded video.
Test: Connect to BT headset and ensure BT audio playback works.
Test: OTA sideload using recovery
Test: CTS SELinuxHostTest pass
Change-Id: I278435b72f7551a28f3c229f720ca608b77a7029
Signed-off-by:
Sandeep Patil <sspatil@google.com>
Showing
- private/file_contexts 14 additions, 1 deletionprivate/file_contexts
- private/system_server.te 3 additions, 0 deletionsprivate/system_server.te
- public/attributes 3 additions, 0 deletionspublic/attributes
- public/crash_dump.te 3 additions, 0 deletionspublic/crash_dump.te
- public/domain.te 77 additions, 7 deletionspublic/domain.te
- public/file.te 19 additions, 0 deletionspublic/file.te
- public/init.te 8 additions, 2 deletionspublic/init.te
- public/te_macros 4 additions, 0 deletionspublic/te_macros
- public/ueventd.te 3 additions, 0 deletionspublic/ueventd.te
- vendor/file_contexts 7 additions, 0 deletionsvendor/file_contexts
Loading
Please register or sign in to comment