On 04/23/2014 11:20 AM, Tai Nguyen (tainguye) wrote: > CTS test flags these files as world writable files. Is there any reason > why they must have world writable permissions ? Or do we miss some patch? > > shell@android:/data/local/tmp $ ls -Z /sys/fs/selinux > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 access > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 context > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 create > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 member > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 relabel > > -rw-rw-rw- root root u:object_r:selinuxfs:s0 user
Required in order to allow non-root uids, including app UIDs (for the CTS itself) to perform queries using these pseudo files (write query, read response). White-listed in FileSystemPermissionTest by: https://android-review.googlesource.com/#/c/54241/ _______________________________________________ Seandroid-list mailing list [email protected] To unsubscribe, send email to [email protected]. To get help, send an email containing "help" to [email protected].
