diff --git a/file_contexts b/file_contexts index 06b23a62923ec1907e5af75a1a8149d6bfd97af8..f036094ea9f3b4f70be5e59f4d0f13b9426f0cfe 100644 --- a/file_contexts +++ b/file_contexts @@ -186,6 +186,8 @@ /data/misc/systemkeys(/.*)? u:object_r:systemkeys_data_file:s0 /data/misc/vpn(/.*)? u:object_r:vpn_data_file:s0 /data/misc/wifi(/.*)? u:object_r:wifi_data_file:s0 +/data/misc/wifi/sockets(/.*)? u:object_r:wpa_socket:s0 +/data/misc/wifi/sockets/wpa_ctrl.* u:object_r:system_wpa_socket:s0 /data/misc/zoneinfo(/.*)? u:object_r:zoneinfo_data_file:s0 # App sandboxes diff --git a/system_server.te b/system_server.te index ef040d5d5ce52f169112c75074773ff915a9a2e0..27dc52df004a4fe282313ab78efc2a0d9f2ad2e8 100644 --- a/system_server.te +++ b/system_server.te @@ -173,6 +173,8 @@ allow system_server ctl_default_prop:property_service set; # Create a socket for receiving info from wpa. type_transition system_server wifi_data_file:sock_file system_wpa_socket; +type_transition system_server wpa_socket:sock_file system_wpa_socket; +allow system_server wpa_socket:dir rw_dir_perms; allow system_server system_wpa_socket:sock_file create_file_perms; # Remove sockets created by wpa_supplicant diff --git a/wpa_supplicant.te b/wpa_supplicant.te index 38c0fb06b3939e69ec9f01cfba8ea2a67bfd6c37..de1eb5ddbe5fb218d7ccb7c2a8086b34a59c5595 100644 --- a/wpa_supplicant.te +++ b/wpa_supplicant.te @@ -17,4 +17,5 @@ allow wpa random_device:chr_file r_file_perms; # Create a socket for receiving info from wpa type_transition wpa wifi_data_file:sock_file wpa_socket; +allow wpa wpa_socket:dir { rw_dir_perms setattr }; allow wpa wpa_socket:sock_file create_file_perms;