Yeah I have ran into this before. In Samsung we just sent an OTA, as it was no big deal. We either need something like relabeld or a way for the kernel to set the security attribute at file open based on the policy, rather than needing to label.... I'm not a huge fan of labeling.
Bill -----Original Message----- From: owner-seandroid-l...@tycho.nsa.gov [mailto:owner-seandroid-l...@tycho.nsa.gov] On Behalf Of Joshua Brindle Sent: Tuesday, August 20, 2013 6:53 AM To: seandroid-list@tycho.nsa.gov Subject: Relabeling on policy reload If I want to use the policy reload functionality to load a policy off /data that has different labels for files on /system there isn't a clean way to apply those labels. For now I have a custom recovery with restorecon, which I call from an update script, but it would be nice if there were something built in to the policy reload mechanism. Has anyone else run in to this? Is this something that should be added to the reload mechanism? -- This message was distributed to subscribers of the seandroid-list mailing list. If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov with the words "unsubscribe seandroid-list" without quotes as the message. -- This message was distributed to subscribers of the seandroid-list mailing list. If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov with the words "unsubscribe seandroid-list" without quotes as the message.