Loading services/core/java/com/android/server/pm/SELinuxMMAC.java +8 −1 Original line number Diff line number Diff line Loading @@ -17,8 +17,8 @@ package com.android.server.pm; import android.content.pm.PackageParser; import android.content.pm.Signature; import android.content.pm.PackageParser.SigningDetails; import android.content.pm.Signature; import android.os.Environment; import android.util.Slog; import android.util.Xml; Loading Loading @@ -81,6 +81,13 @@ public final class SELinuxMMAC { sMacPermissions.add(new File( Environment.getRootDirectory(), "/etc/selinux/plat_mac_permissions.xml")); // Product mac permissions (optional). final File productMacPermission = new File( Environment.getProductDirectory(), "/etc/selinux/product_mac_permissions.xml"); if (productMacPermission.exists()) { sMacPermissions.add(productMacPermission); } // Vendor mac permissions. // The filename has been renamed from nonplat_mac_permissions to // vendor_mac_permissions. Either of them should exist. Loading Loading
services/core/java/com/android/server/pm/SELinuxMMAC.java +8 −1 Original line number Diff line number Diff line Loading @@ -17,8 +17,8 @@ package com.android.server.pm; import android.content.pm.PackageParser; import android.content.pm.Signature; import android.content.pm.PackageParser.SigningDetails; import android.content.pm.Signature; import android.os.Environment; import android.util.Slog; import android.util.Xml; Loading Loading @@ -81,6 +81,13 @@ public final class SELinuxMMAC { sMacPermissions.add(new File( Environment.getRootDirectory(), "/etc/selinux/plat_mac_permissions.xml")); // Product mac permissions (optional). final File productMacPermission = new File( Environment.getProductDirectory(), "/etc/selinux/product_mac_permissions.xml"); if (productMacPermission.exists()) { sMacPermissions.add(productMacPermission); } // Vendor mac permissions. // The filename has been renamed from nonplat_mac_permissions to // vendor_mac_permissions. Either of them should exist. Loading