Since underlying files are same between userdata and dm-<n>, there is no
need to modify policies for files in userdata partition, right ?

On Tue, Oct 6, 2015 at 1:52 PM, Stephen Smalley <s...@tycho.nsa.gov> wrote:

> On 10/06/2015 03:49 PM, Dinesh Garg wrote:
> > Does anyone know how SEPolicies work for mapped devices?
> >
> > Android encrypts userdata partition using dm-crypt. Original SEPolicies
> would be written for userdata partition but when device is encrypted, block
> device would change from userdata to  /dev/block/dm-<number> where number
> is variable. I wonder how SEPolicies would work when device gets encrypted ?
>
> Presently, all /dev/block/dm-<n> devices are labeled with dm_device, which
> is only accessible
> under AOSP policy by init, ueventd, fsck, blkid (read-only), and vold.
>
> vold could probably take the label of the underlying device and compute a
> derived label
> to assign to the mapped one if you needed to distinguish them from one
> another.
>
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to