CtsLogdTestCases#sepolicy_rate_limiter failure

Cts tests can run in appdomain, which have access to /data/backup/
which leads to zero injection of sepolicy signal to check the logd
and kernel rate limiter.  Switch to /data/drm/ as a better choice
to inject a sepolicy denial either due to dac_override or
dac_read_search because owned by the drm uid and gid, or due to
create sepolicy denial to u:object_r:drm_data_file:s0 to all but
select services.

Test: gTest
Bug: 65843095
Change-Id: I2d72b1407a930c270636a206066d2d15fdec2f77
This commit is contained in:
Mark Salyzyn 2017-10-02 10:20:29 -07:00
parent 8b7feee38f
commit b825faeed7
1 changed files with 1 additions and 1 deletions

View File

@ -1099,7 +1099,7 @@ static pid_t sepolicy_rate(unsigned rate, unsigned num) {
// and dac_read_search on every try to get past the message
// de-duper. We will also rotate the file name in the directory
// as another measure.
static const char file[] = "/data/backup/cannot_access_directory_%u";
static const char file[] = "/data/drm/cannot_access_directory_%u";
static const unsigned avc_requests_per_access = 2;
rate /= avc_requests_per_access;