From b4ab72d52a29849778c1e91cd20e954db1dd43ab Mon Sep 17 00:00:00 2001 From: William Luh <williamluh@google.com> Date: Thu, 2 May 2013 13:43:16 -0700 Subject: [PATCH] Expand permissions for 3 existing allow policies for rild and a new one for rild. Change-Id: Iafe68ac1b742e40c1a23a2f6cfd6373ea89cc07b --- rild.te | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/rild.te b/rild.te index 600ecdb7b..b224baca3 100644 --- a/rild.te +++ b/rild.te @@ -4,7 +4,7 @@ type rild_exec, exec_type, file_type; init_daemon_domain(rild) net_domain(rild) -allow rild self:netlink_route_socket setopt; +allow rild self:netlink_route_socket { setopt write }; allow rild kernel:system module_request; unix_socket_connect(rild, property, init) unix_socket_connect(rild, qemud, qemud) @@ -20,8 +20,8 @@ allow rild efs_file:file create_file_perms; allow rild shell_exec:file rx_file_perms; allow rild bluetooth_efs_file:file r_file_perms; allow rild bluetooth_efs_file:dir r_dir_perms; -allow rild radio_data_file:dir r_dir_perms; -allow rild radio_data_file:file rw_file_perms; +allow rild radio_data_file:dir rw_dir_perms; +allow rild radio_data_file:file create_file_perms; allow rild sdcard_type:dir r_dir_perms; allow rild system_data_file:dir create_dir_perms; allow rild system_data_file:file create_file_perms; @@ -41,3 +41,5 @@ allow rild tty_device:chr_file rw_file_perms; # Allow rild to create, bind, read, write to itself through a netlink socket allow rild self:netlink_socket { create bind read write }; + +allow rild self:netlink_kobject_uevent_socket { bind create getopt read setopt }; -- GitLab