- Mar 05, 2018
-
-
Daichi Ueura authored
Update sepolicy permission to allow hostapd to setup socket for socket based control interface. Sepolicy denial for accessing /data/vendor/wifi/hostapd/ctrl: 02-23 12:32:06.186 3068 3068 I hostapd : type=1400 audit(0.0:36): avc: denied { create } for name="ctrl" scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1 02-23 12:32:06.186 3068 3068 I hostapd : type=1400 audit(0.0:37): avc: denied { setattr } for name="ctrl" dev="sda35" ino=131410 scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1 02-23 12:32:06.190 3068 3068 I hostapd : type=1400 audit(0.0:38): avc: denied { create } for name="wlan0" scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1 02-23 12:32:06.190 3068 3068 I hostapd : type=1400 audit(0.0:39): avc: denied { setattr } for name="wlan0" dev="sda35" ino=131411 scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1 Bug: 73419160 Test: Manual check that softAp works Change-Id: I2e733e168feceeab2d557f7704832c143e352375
-
- Jan 12, 2018
-
-
Roshan Pius authored
Change sepolicy permissions to now classify hostapd as a HAL exposing HIDL interface. Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd: 12-27 23:40:55.913 4952 4952 W hostapd : type=1400 audit(0.0:19): avc: denied { write } for name="hostapd" dev="sda13" ino=4587601 scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0 01-02 19:07:16.938 5791 5791 W hostapd : type=1400 audit(0.0:31): avc: denied { search } for name="net" dev="sysfs" ino=30521 scontext=u:r:hal_wifi_hostapd_default:s0 tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0 Bug: 36646171 Test: Device boots up and able to turn on SoftAp. Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
-