sepolicy: Add policies for the new superuser sockets.
Change-Id: Ia3e1044616bee95eb4774254fb098487d983b5db
This commit is contained in:
parent
24a971ad42
commit
a7dfa18fd5
@ -22,8 +22,7 @@
|
||||
|
||||
#############
|
||||
# Superuser's control sockets
|
||||
/dev/com.android.settings.daemon(/.*)? u:object_r:superuser_device:s0
|
||||
/dev/com.android.settings(/.*)? u:object_r:superuser_device:s0
|
||||
/dev/socket/su-daemon(/.*)? u:object_r:superuser_device:s0
|
||||
|
||||
# Expansion of these hooks is a bit unconventional
|
||||
/cache/com.cyanogenmod.keyhandler.dex u:object_r:dalvikcache_data_file:s0
|
||||
|
@ -6,6 +6,8 @@ type sudaemon, domain;
|
||||
|
||||
userdebug_or_eng(`
|
||||
domain_trans(init, su_exec, sudaemon)
|
||||
|
||||
type_transition sudaemon socket_device:sock_file superuser_device;
|
||||
# The userspace app uses /dev sockets to control per-app access
|
||||
allow sudaemon superuser_device:dir { create rw_dir_perms setattr unlink };
|
||||
allow sudaemon superuser_device:sock_file { create setattr unlink write };
|
||||
|
Loading…
Reference in New Issue
Block a user