- Previously, /dev/null is used for dummy file mount.
- No error was returned, in case un-privileged app process tried
to access there.
- To create an error, the dummy file which only root processes
can be accessed is used for privacy-mount.
Change-Id: If7a31f66420d1311e278e52911a67e4aa94f7696
PRIVILEGE_GROUP_LIST="/usr/share/security-manager/policy/privilege-group.list"
PRIVILEGE_MOUNT_LIST="/usr/share/security-manager/policy/privilege-mount.list"
DUMMY_DIR="/usr/share/security-manager/dummy"
-DUMMY_FILE="/dev/null"
+DUMMY_FILE="/opt/share/security-config/dummy_file"
# function : check whether this is a sub directory or file of previous ones : To avoid the meaningless cynara check and bind mount
# args : $1 : privilege, $2 : directory
touch /opt/share/askuser_disable
chmod 600 /opt/share/askuser_disable
ln -s %{SECURITY_TEST_DIR} /opt/share/security-config/test
+touch /opt/share/security-config/dummy_file
+chmod 600 /opt/share/security-config/dummy_file
%post profile_mobile
mv %{SECURITY_TEST_DIR}//capability_test/mobile/* %{SECURITY_TEST_DIR}/capability_test/