[Issue#] SSDWSSP-684
[Bug/Feature] A security vulnerability to attacks fixed.
[Cause] Using a floor labeled exec, a malicious process can pollute the floor labeled resources.
[Solution] The floor labeled executables were eliminated.
[Verification] 1) Build, install and run tests.
2) Verify that no executables from the package has the floor label.
Change-Id: I3999cb71c01a29fbe1a2e0e86b0991d21528beb3
Conflicts:
packaging/libprivilege-control.manifest
--- /dev/null
+<manifest>
+ <request>
+ <domain name="_" />
+ </request>
+ <assign>
+ <filesystem path="/usr/bin/api_feature_loader" exec_label="none"/>
+ <filesystem path="/usr/bin/slp-su" exec_label="none"/>
+ <filesystem path="/etc/rc.d/init.d/smack_default_labeling" exec_label="none"/>
+ <filesystem path="/etc/init.d/smack_default_labeling" exec_label="none"/>
+ </assign>
+</manifest>