diff --git a/file_contexts b/file_contexts index a6b193b8ef4bab9f9ffeafd2f697baf05f5084f3..4b675f587f93da800da1d236a91e9d72d6f1f54c 100644 --- a/file_contexts +++ b/file_contexts @@ -183,6 +183,8 @@ /data/misc/systemkeys(/.*)? u:object_r:systemkeys_data_file:s0 /data/misc/vpn(/.*)? u:object_r:vpn_data_file:s0 /data/misc/wifi(/.*)? u:object_r:wifi_data_file:s0 +/data/misc/wifi/sockets(/.*)? u:object_r:wpa_socket:s0 +/data/misc/wifi/sockets/wpa_ctrl.* u:object_r:system_wpa_socket:s0 /data/misc/zoneinfo(/.*)? u:object_r:zoneinfo_data_file:s0 # App sandboxes diff --git a/system_server.te b/system_server.te index 19719124fe8c5b77fe18eb92339ce63b4e97911a..6ec3af4a2b2b99f1edd6b028647c8caa93c64825 100644 --- a/system_server.te +++ b/system_server.te @@ -173,6 +173,8 @@ allow system_server ctl_default_prop:property_service set; # Create a socket for receiving info from wpa. type_transition system_server wifi_data_file:sock_file system_wpa_socket; +type_transition system_server wpa_socket:sock_file system_wpa_socket; +allow system_server wpa_socket:dir rw_dir_perms; allow system_server system_wpa_socket:sock_file create_file_perms; # Remove sockets created by wpa_supplicant diff --git a/wpa_supplicant.te b/wpa_supplicant.te index 38c0fb06b3939e69ec9f01cfba8ea2a67bfd6c37..de1eb5ddbe5fb218d7ccb7c2a8086b34a59c5595 100644 --- a/wpa_supplicant.te +++ b/wpa_supplicant.te @@ -17,4 +17,5 @@ allow wpa random_device:chr_file r_file_perms; # Create a socket for receiving info from wpa type_transition wpa wifi_data_file:sock_file wpa_socket; +allow wpa wpa_socket:dir { rw_dir_perms setattr }; allow wpa wpa_socket:sock_file create_file_perms;