diff --git a/nfc.te b/nfc.te index 72c2d69b7d56e43a74286513b30b076523be0d9c..9a354bb58a1b8216d7ba08a45e70e8f4823bc181 100644 --- a/nfc.te +++ b/nfc.te @@ -10,3 +10,4 @@ allow nfc nfc_data_file:dir create_dir_perms; allow nfc nfc_data_file:notdevfile_class_set create_file_perms; allow nfc sysfs_nfc_power_writable:file rw_file_perms; +allow nfc sysfs:file write; diff --git a/rild.te b/rild.te index e65fc362e4696bd082b64a183e80966690dbbf34..85c85a56aef45fc0d050f02cbbea448cc9ee91cc 100644 --- a/rild.te +++ b/rild.te @@ -12,12 +12,20 @@ allow rild self:capability { setuid net_admin net_raw }; allow rild alarm_device:chr_file rw_file_perms; allow rild cgroup:dir create_dir_perms; allow rild radio_device:chr_file rw_file_perms; +allow rild radio_device:blk_file r_file_perms; allow rild qemu_device:chr_file rw_file_perms; allow rild mtd_device:dir search; allow rild efs_file:dir create_dir_perms; allow rild efs_file:file create_file_perms; allow rild shell_exec:file rx_file_perms; allow rild bluetooth_efs_file:file r_file_perms; +allow rild radio_data_file:dir r_dir_perms; +allow rild radio_data_file:file rw_file_perms; +allow rild radio_device:lnk_file r_file_perms; +allow rild sdcard:dir r_dir_perms; +allow rild system_data_file:dir create_dir_perms; +allow rild system_data_file:file create_file_perms; +allow rild system_file:file x_file_perms; dontaudit rild self:capability sys_admin; # XXX Label sysfs files with a specific type? allow rild sysfs:file rw_file_perms; diff --git a/ueventd.te b/ueventd.te index 5e513322cdeff3830ddbf3b505b90d01075ab059..81a660f8982cedd199fcff23ef16dc32985ab6c9 100644 --- a/ueventd.te +++ b/ueventd.te @@ -5,7 +5,7 @@ tmpfs_domain(ueventd) allow ueventd rootfs:file r_file_perms; allow ueventd rootfs:file entrypoint; allow ueventd init:process sigchld; -allow ueventd self:capability { chown mknod net_admin setgid fsetid }; +allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override }; allow ueventd device:file create_file_perms; allow ueventd device:chr_file rw_file_perms; allow ueventd sysfs:file rw_file_perms; @@ -16,3 +16,5 @@ allow ueventd dev_type:lnk_file { create unlink }; allow ueventd dev_type:chr_file { create setattr unlink }; allow ueventd dev_type:blk_file { create setattr unlink }; allow ueventd self:netlink_kobject_uevent_socket *; +allow ueventd efs_file:dir search; +allow ueventd efs_file:file r_file_perms;