selinux: Workaround for devices with PR_SET_NO_NEW_PRIVS enforcement

PR_SET_NO_NEW_PRIVS blocks domain transitions from within app_process,
unless the new domain is bounded by the app's context. So we can't
switch to a domain that has perms not available to untrusted_app :(

This means any app can talk to the daemon, bypassing the su executable
client. That's not a good thing, and needs to be resolved.

Change-Id: I85b74f90b8737caaa193a0555b5262e7392519b2
1 file changed
tree: 1bf51788fb6e0a2093701513571b6303fca8b70d
  1. config/
  2. overlay/
  3. prebuilt/
  4. proprietary/
  5. sepolicy/
  6. tools/
  7. vendorsetup.sh