Skip to content
Snippets Groups Projects
Select Git revision
  • 304d65363724db53348f6ddf0f7160ac2b72be1d
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

file_contexts

Blame
    • Alex Klyubin's avatar
      304d6536
      Move TEE rules to vendor image · 304d6536
      Alex Klyubin authored
      "tee" domain is a vendor domain. Hence its rules should live on the
      vendor image.
      
      What's left as public API is that:
      1. tee domain exists and that it is permitted to sys_rawio capability,
      2. tee_device type exists and apps are not permitted to access
         character devices labeled tee_device.
      
      If you were relying on system/sepolicy automatically labeling
      /dev/tf_driver as tee_device or labeling /system/bin/tf_daemon as
      tee_exec, then you need to add these rules to your device-specific
      file_contexts.
      
      Test: mmm system/sepolicy
      Test: bullhead, angler, and sailfish boot up without new denials
      Bug: 36714625
      Bug: 36714625
      Bug: 36720355
      Change-Id: Ie21619ff3c44ef58675c369061b4afdd7e8501c6
      304d6536
      History
      Move TEE rules to vendor image
      Alex Klyubin authored
      "tee" domain is a vendor domain. Hence its rules should live on the
      vendor image.
      
      What's left as public API is that:
      1. tee domain exists and that it is permitted to sys_rawio capability,
      2. tee_device type exists and apps are not permitted to access
         character devices labeled tee_device.
      
      If you were relying on system/sepolicy automatically labeling
      /dev/tf_driver as tee_device or labeling /system/bin/tf_daemon as
      tee_exec, then you need to add these rules to your device-specific
      file_contexts.
      
      Test: mmm system/sepolicy
      Test: bullhead, angler, and sailfish boot up without new denials
      Bug: 36714625
      Bug: 36714625
      Bug: 36720355
      Change-Id: Ie21619ff3c44ef58675c369061b4afdd7e8501c6
    nfc.te 1023 B
    # nfc subsystem
    type nfc, domain;
    app_domain(nfc)
    net_domain(nfc)
    binder_service(nfc)
    
    # Set NFC properties
    unix_socket_connect(nfc, property, init)
    allow nfc nfc_prop:property_service set;
    
    # NFC device access.
    allow nfc nfc_device:chr_file rw_file_perms;
    
    # Data file accesses.
    allow nfc nfc_data_file:dir create_dir_perms;
    allow nfc nfc_data_file:notdevfile_class_set create_file_perms;
    
    allow nfc sysfs_nfc_power_writable:file rw_file_perms;
    allow nfc sysfs:file write;
    
    allow nfc drmserver_service:service_manager find;
    allow nfc mediaserver_service:service_manager find;
    allow nfc nfc_service:service_manager { add find };
    allow nfc radio_service:service_manager find;
    allow nfc surfaceflinger_service:service_manager find;
    allow nfc app_api_service:service_manager find;
    allow nfc system_api_service:service_manager find;
    
    # already open bugreport file descriptors may be shared with
    # the nfc process, from a file in
    # /data/data/com.android.shell/files/bugreports/bugreport-*.
    allow nfc shell_data_file:file read;