On 04/23/2014 11:20 AM, Tai Nguyen (tainguye) wrote:
> CTS test flags these files as world writable files. Is there any reason
> why they must have world writable permissions ? Or do we miss some patch?
> 
> shell@android:/data/local/tmp $ ls -Z /sys/fs/selinux
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 access
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 context
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 create
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 member
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 relabel
> 
> -rw-rw-rw- root     root              u:object_r:selinuxfs:s0 user

Required in order to allow non-root uids, including app UIDs (for the
CTS itself) to perform queries using these pseudo files (write query,
read response).  White-listed in FileSystemPermissionTest by:
https://android-review.googlesource.com/#/c/54241/

_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to