Add adbd socket perms to system_server.
Commit 2fdeab3789
added ability to debug
over adbd for zygote-spawned apps, required by removal of domain_deprecated
from untrusted_app. This functionality is a core debugabble component
of the android runtime, so it is needed by system_server as well.
Bug: 26458796
Change-Id: I29f5390122b3644449a5c3dcf4db2d0e969f6a9a
This commit is contained in:
parent
2fdeab3789
commit
b037a6c94b
1 changed files with 6 additions and 0 deletions
|
@ -443,6 +443,12 @@ userdebug_or_eng(`
|
|||
allow system_server vold:fd use;
|
||||
allow system_server fuse_device:chr_file { read write ioctl };
|
||||
|
||||
# Connect to adbd and use a socket transferred from it.
|
||||
# Used for e.g. jdwp.
|
||||
allow system_server adbd:unix_stream_socket connectto;
|
||||
allow system_server adbd:fd use;
|
||||
allow system_server adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
||||
|
||||
###
|
||||
### Neverallow rules
|
||||
###
|
||||
|
|
Loading…
Reference in a new issue