353ad0fd47
This CL adds hand-written SELinux rules to: - define the boringssl_self_test security domain - label the corresponding files at type boringssl_self_test_marker and boringssl_self_test_exec. - define an automatic transition from init to boringssl_self_test domains, plus appropriate access permissions. Bug: 137267623 Test: When run together with the other changes from draft CL topic http://aosp/q/topic:bug137267623_bsslselftest, check that: - both /dev/boringssl/selftest/* marker files are present after the device boots. - Test: after the boringssl_self_test{32,64} binaries have run, no further SELinux denials occur for processes trying to write the marker file. Change-Id: I77de0bccdd8c1e22c354d8ea146e363f4af7e36f |
||
---|---|---|
.. | ||
apex.test-file_contexts | ||
com.android.art.debug-file_contexts | ||
com.android.art.release-file_contexts | ||
com.android.bootanimation-file_contexts | ||
com.android.conscrypt-file_contexts | ||
com.android.i18n-file_contexts | ||
com.android.media-file_contexts | ||
com.android.media.swcodec-file_contexts | ||
com.android.neuralnetworks-file_contexts | ||
com.android.os.statsd-file_contexts | ||
com.android.resolv-file_contexts | ||
com.android.runtime-file_contexts | ||
com.android.tzdata-file_contexts |