Skip to content
Snippets Groups Projects
Commit 5bf94caf authored by Jeff Vander Stoep's avatar Jeff Vander Stoep
Browse files

ueventd: Grant write access to all files in /sys

Ueventd needs write access to all files in /sys to generate uevents.

Bug: 63147833
Test: build. Verify no ueventd denials in the logs.
Change-Id: I89d33aab158dd192e761f14eff8afa1c71594bca
parent 4f077656
No related branches found
No related tags found
No related merge requests found
...@@ -8,15 +8,13 @@ allow ueventd kmsg_device:chr_file rw_file_perms; ...@@ -8,15 +8,13 @@ allow ueventd kmsg_device:chr_file rw_file_perms;
allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner }; allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
allow ueventd device:file create_file_perms; allow ueventd device:file create_file_perms;
r_dir_file(ueventd, sysfs_type)
r_dir_file(ueventd, rootfs) r_dir_file(ueventd, rootfs)
allow ueventd sysfs:file w_file_perms;
allow ueventd sysfs_usb:file w_file_perms; # ueventd needs write access to files in /sys to regenerate uevents
allow ueventd sysfs_hwrandom:file w_file_perms; allow ueventd { sysfs_type -usermodehelper }:file w_file_perms;
allow ueventd sysfs_zram_uevent:file w_file_perms; r_dir_file(ueventd, sysfs_type)
allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr getattr }; allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
allow ueventd sysfs_type:dir { relabelfrom relabelto setattr r_dir_perms }; allow ueventd sysfs_type:dir { relabelfrom relabelto setattr };
allow ueventd sysfs_devices_system_cpu:file rw_file_perms;
allow ueventd tmpfs:chr_file rw_file_perms; allow ueventd tmpfs:chr_file rw_file_perms;
allow ueventd dev_type:dir create_dir_perms; allow ueventd dev_type:dir create_dir_perms;
allow ueventd dev_type:lnk_file { create unlink }; allow ueventd dev_type:lnk_file { create unlink };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment