aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAleksander Gencel <johnnylittleplanet@gmail.com>2018-12-01 11:36:34 +0100
committerfirebird11 <hbgassel@gmail.com>2019-01-12 13:09:25 +0100
commitd2af6d3dcaa1a20461359f813d98c5918ed984a5 (patch)
treead1dbb4b309dca4eeec09ddcd717482fcf571fb0
parent5d764179b87001b16789b77b751f3fd513c655a5 (diff)
g3-common: address hwaddrs and wcnss_service denials
this resolves MAC addresses not getting set properly [ 7.109659] 1932,7109659;init: starting service 'hwaddrs'... [ 7.133020] 1935,7133020;type=1400 audit(490246.063:655): avc: denied { search } for pid=325 comm="hwaddrs" name="block" dev="tmpfs" ino=7185 scontext=u:r:hwaddrs:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0 [ 7.235218] 1997,7235218;init: Service 'hwaddrs' (pid 325) exited with status 0 [ 7.260354] 2064,7260354;init: processing action (init.svc.hwaddrs=stopped) from (/init.g3.rc:364) [ 7.792336] 2194,7792336;type=1400 audit(490246.063:655): avc: denied { search } for pid=325 comm="hwaddrs" name="block" dev="tmpfs" ino=7185 scontext=u:r:hwaddrs:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0 [ 7.792464] 2195,7792464;type=1400 audit(490246.723:656): avc: denied { search } for pid=444 comm="wcnss_service" name="block" dev="tmpfs" ino=7185 scontext=u:r:wcnss_service:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0 Change-Id: I2c63eaaa4bb423d48c0793287175ff5900be00d3
-rw-r--r--sepolicy/hwaddrs.te2
-rw-r--r--sepolicy/wcnss_service.te1
2 files changed, 3 insertions, 0 deletions
diff --git a/sepolicy/hwaddrs.te b/sepolicy/hwaddrs.te
index 9e3fe42..1f16668 100644
--- a/sepolicy/hwaddrs.te
+++ b/sepolicy/hwaddrs.te
@@ -10,3 +10,5 @@ allow hwaddrs bluetooth_data_file:file create_file_perms;
allow hwaddrs wifi_data_file:dir w_dir_perms;
allow hwaddrs wifi_data_file:file create_file_perms;
+
+allow hwaddrs block_device:dir {search};
diff --git a/sepolicy/wcnss_service.te b/sepolicy/wcnss_service.te
index 86ab523..432c712 100644
--- a/sepolicy/wcnss_service.te
+++ b/sepolicy/wcnss_service.te
@@ -1 +1,2 @@
allow wcnss_service misc_block_device:blk_file r_file_perms;
+allow wcnss_service block_device:dir {search};