sepolicy: enable tcmd

add socket connect rules for tcmd.

we can enable and disable tcmd feature by setting
persist.vendor.tcmd.feature to 1 and 0.

Change-Id: Ia298e37884d2a3d4626550df1a64dff0e53d14f5
This commit is contained in:
Manoj Basapathi 2021-04-07 11:23:49 +05:30
parent aab05e87df
commit 292ea20060
2 changed files with 2 additions and 1 deletions

View file

@ -27,7 +27,7 @@
#tcmd as domain
type vendor_tcmd,domain;
typeattribute vendor_tcmd mlstrustedsubject;
typeattribute vendor_tcmd coredomain;
type vendor_tcmd_exec, exec_type, system_file_type, file_type;

View file

@ -28,3 +28,4 @@
unix_socket_connect(untrusted_app_all, vendor_dpmtcm, vendor_dpmd)
unix_socket_connect(untrusted_app_all, vendor_qvrd, vendor_qvrd)
allow untrusted_app_all vendor_qvrd:fd use;
unix_socket_connect(untrusted_app_all, vendor_dpmtcm, vendor_tcmd)