From b4ab72d52a29849778c1e91cd20e954db1dd43ab Mon Sep 17 00:00:00 2001
From: William Luh <williamluh@google.com>
Date: Thu, 2 May 2013 13:43:16 -0700
Subject: [PATCH] Expand permissions for 3 existing allow policies for rild and
 a new one for rild.

Change-Id: Iafe68ac1b742e40c1a23a2f6cfd6373ea89cc07b
---
 rild.te | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/rild.te b/rild.te
index 600ecdb7b..b224baca3 100644
--- a/rild.te
+++ b/rild.te
@@ -4,7 +4,7 @@ type rild_exec, exec_type, file_type;
 
 init_daemon_domain(rild)
 net_domain(rild)
-allow rild self:netlink_route_socket setopt;
+allow rild self:netlink_route_socket { setopt write };
 allow rild kernel:system module_request;
 unix_socket_connect(rild, property, init)
 unix_socket_connect(rild, qemud, qemud)
@@ -20,8 +20,8 @@ allow rild efs_file:file create_file_perms;
 allow rild shell_exec:file rx_file_perms;
 allow rild bluetooth_efs_file:file r_file_perms;
 allow rild bluetooth_efs_file:dir r_dir_perms;
-allow rild radio_data_file:dir r_dir_perms;
-allow rild radio_data_file:file rw_file_perms;
+allow rild radio_data_file:dir rw_dir_perms;
+allow rild radio_data_file:file create_file_perms;
 allow rild sdcard_type:dir r_dir_perms;
 allow rild system_data_file:dir create_dir_perms;
 allow rild system_data_file:file create_file_perms;
@@ -41,3 +41,5 @@ allow rild tty_device:chr_file rw_file_perms;
 
 # Allow rild to create, bind, read, write to itself through a netlink socket
 allow rild self:netlink_socket { create bind read write };
+
+allow rild self:netlink_kobject_uevent_socket { bind create getopt read setopt };
-- 
GitLab