diff options
author | Demon Singur <demonsingur@gmail.com> | 2018-09-20 11:44:35 +0000 |
---|---|---|
committer | Davide Garberi <dade.garberi@gmail.com> | 2019-05-16 17:34:56 +0200 |
commit | 4433226c0be879c88548a92d326bdb138f011075 (patch) | |
tree | 8db024cf1e927d42dbd16f23a6a608b42066725c | |
parent | 78c16642a4539a991189d4cc4106fc326f646a83 (diff) |
msm8996-common: sepolicy: Allow netmgrd to set persist.net.doxlat
* Solves the following denial.
avc: denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1
* We need this again after having switched back to Oreo RIL in 4d1a575a1900797720c957c40898a1bdebecfe55
Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
-rw-r--r-- | sepolicy/netmgrd.te | 2 | ||||
-rw-r--r-- | sepolicy/property_contexts | 3 |
2 files changed, 5 insertions, 0 deletions
diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te index e3a0212..b98e8d9 100644 --- a/sepolicy/netmgrd.te +++ b/sepolicy/netmgrd.te @@ -2,3 +2,5 @@ allow netmgrd sysfs_net:dir search; allow netmgrd sysfs_net:file rw_file_perms; allow netmgrd property_socket:sock_file write; allow netmgrd init:unix_stream_socket connectto; + +set_prop(netmgrd, vendor_xlat_prop) diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts index a472b82..1ae2e9b 100644 --- a/sepolicy/property_contexts +++ b/sepolicy/property_contexts @@ -1,6 +1,9 @@ # Camera persist.camera. u:object_r:camera_prop:s0 +# Netmgrd +persist.net.doxlat u:object_r:vendor_xlat_prop:s0 + # OEM unlocking ro.oem_unlock_supported u:object_r:oem_unlock_prop:s0 |