msm8937-common: Add selinux/private/service_contexts.
This makes sure that the remaining binder services for radio end up in plat_service_contexts. That in turn allows us to enforce that servicemanager will only serve services from plat_service_contexts on FULL_TREBLE devices. Bug: 36866029 Test: boot, verify radio services still work Change-Id: Ib67b3a03e5599484c5c4fb27a0f323a37dd51636 Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
This commit is contained in:
parent
5478c86bac
commit
a85558ea52
27 changed files with 4 additions and 1 deletions
|
@ -2,4 +2,7 @@ include device/qcom/sepolicy/sepolicy.mk
|
||||||
|
|
||||||
# SELinux
|
# SELinux
|
||||||
BOARD_SEPOLICY_DIRS += \
|
BOARD_SEPOLICY_DIRS += \
|
||||||
$(VENDOR_PATH)/sepolicy
|
$(VENDOR_PATH)/sepolicy/vendor
|
||||||
|
|
||||||
|
BOARD_PLAT_PRIVATE_SEPOLICY_DIR += \
|
||||||
|
$(VENDOR_PATH)/sepolicy/private
|
||||||
|
|
0
sepolicy/file.te → sepolicy/vendor/file.te
vendored
0
sepolicy/file.te → sepolicy/vendor/file.te
vendored
0
sepolicy/fsck.te → sepolicy/vendor/fsck.te
vendored
0
sepolicy/fsck.te → sepolicy/vendor/fsck.te
vendored
0
sepolicy/ims.te → sepolicy/vendor/ims.te
vendored
0
sepolicy/ims.te → sepolicy/vendor/ims.te
vendored
0
sepolicy/init.te → sepolicy/vendor/init.te
vendored
0
sepolicy/init.te → sepolicy/vendor/init.te
vendored
0
sepolicy/radio.te → sepolicy/vendor/radio.te
vendored
0
sepolicy/radio.te → sepolicy/vendor/radio.te
vendored
0
sepolicy/rild.te → sepolicy/vendor/rild.te
vendored
0
sepolicy/rild.te → sepolicy/vendor/rild.te
vendored
0
sepolicy/tee.te → sepolicy/vendor/tee.te
vendored
0
sepolicy/tee.te → sepolicy/vendor/tee.te
vendored
Loading…
Reference in a new issue