Skip to content

Commit

Permalink
Add additonal ioctl cmd to verizon app.
Browse files Browse the repository at this point in the history
Address following denial:
type=1400 audit(0.0:59): avc: denied { ioctl } for comm=4D6F64656D2041757468 path="socket:[48215]" dev="sockfs" ino=48215 ioctlcmd=c304 scontext=u:r:obdm_app:s0:c109,c256,c512,c768 tcontext=u:r:obdm_app:s0:c109,c256,c512,c768 tclass=socket permissive=0

Which results in:
08-22 17:29:29.417 11617 11655 E QC-QMI  : qmi_client [-1] QMUXD disabled
08-22 17:29:29.418 11617 11655 E QC-QMI  : qmi_qmux_if_pwr_up_init_ex:  Initialization failed, rc = -6
08-22 17:29:29.418 11617 11655 E QMI_FW  : QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-6
08-22 17:29:29.418 11617 11655 D DIAG    : Returned from qmi_client_init_instance: 0

Bug: 29881473
Change-Id: I40c15c46a6915bf8cc15abf15097c68cce2bca47
  • Loading branch information
dcashman committed Aug 22, 2016
1 parent c13961e commit a59b660
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion sepolicy/verizon/obdm_app.te
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ allow obdm_app radio_service:service_manager find;
allow obdm_app surfaceflinger_service:service_manager find;

allow obdm_app self:socket create_socket_perms;
allowxperm obdm_app self:socket ioctl { 0x0000c302 };
allowxperm obdm_app self:socket ioctl { 0x0000c302 0x0000c304 };

allow obdm_app sysfs:dir r_dir_perms;
r_dir_file(obdm_app, sysfs_msm_subsys)

0 comments on commit a59b660

Please sign in to comment.