diff --git a/sepolicy/rmt_storage.te b/sepolicy/rmt_storage.te index b6dcb77b..e2dda92a 100644 --- a/sepolicy/rmt_storage.te +++ b/sepolicy/rmt_storage.te @@ -9,6 +9,7 @@ allow rmt_storage self:capability { net_bind_service setgid setpcap setuid }; allow rmt_storage modem_block_device:blk_file rw_file_perms; allow rmt_storage uio_device:chr_file rw_file_perms; +allow rmt_storage block_device:dir search; allow rmt_storage sysfs_uio:dir r_dir_perms; allow rmt_storage sysfs_uio:lnk_file r_file_perms; diff --git a/sepolicy/sensors.te b/sepolicy/sensors.te index f6c90045..7b9db420 100644 --- a/sepolicy/sensors.te +++ b/sepolicy/sensors.te @@ -4,7 +4,11 @@ type sensors_exec, exec_type, vendor_file_type, file_type; init_daemon_domain(sensors) -allow sensors self:capability { setgid setuid }; +allow sensors self:capability { + setuid + setgid + net_bind_service +}; allow sensors self:socket create_socket_perms; allowxperm sensors self:socket ioctl msm_sock_ipc_ioctls; @@ -12,10 +16,10 @@ allowxperm sensors self:socket ioctl msm_sock_ipc_ioctls; allow sensors persist_sensors_file:dir r_dir_perms; allow sensors persist_sensors_file:file rw_file_perms; allow sensors persist_sensors_file:dir r_dir_perms; -allow sensors persist_file:dir getattr; +allow sensors persist_file:dir { getattr search }; allow sensors system_file:dir r_dir_perms; -allow sensors sensors_device:chr_file r_file_perms; +allow sensors sensors_device:chr_file rw_file_perms; r_dir_file(sensors, sysfs_msm_subsys)