Skip to content
Snippets Groups Projects
Select Git revision
  • 48d68a6486093e03d4d4915980ac15ec67c8c07b
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

ioctl_macros

Blame
    • Jeff Vander Stoep's avatar
      81b7675e
      Whitelist additional unix socket ioctl · 81b7675e
      Jeff Vander Stoep authored
      TIOCGWINSZ = 0x00005413
      
      avc: denied { ioctl } for comm="ls" path="socket:[362628]" dev="sockfs" ino=362628 ioctlcmd=5413 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
      
      Bug: 28171804
      Change-Id: I460e2469730d0cd90d714f30803ef849317d4be7
      81b7675e
      History
      Whitelist additional unix socket ioctl
      Jeff Vander Stoep authored
      TIOCGWINSZ = 0x00005413
      
      avc: denied { ioctl } for comm="ls" path="socket:[362628]" dev="sockfs" ino=362628 ioctlcmd=5413 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
      
      Bug: 28171804
      Change-Id: I460e2469730d0cd90d714f30803ef849317d4be7
    nfc.te 984 B
    # nfc subsystem
    type nfc, domain, domain_deprecated;
    app_domain(nfc)
    net_domain(nfc)
    binder_service(nfc)
    
    # Set NFC properties
    set_prop(nfc, nfc_prop)
    
    # NFC device access.
    allow nfc nfc_device:chr_file rw_file_perms;
    
    # Data file accesses.
    allow nfc nfc_data_file:dir create_dir_perms;
    allow nfc nfc_data_file:notdevfile_class_set create_file_perms;
    
    allow nfc sysfs_nfc_power_writable:file rw_file_perms;
    allow nfc sysfs:file write;
    
    allow nfc drmserver_service:service_manager find;
    allow nfc mediaserver_service:service_manager find;
    allow nfc nfc_service:service_manager { add find };
    allow nfc radio_service:service_manager find;
    allow nfc surfaceflinger_service:service_manager find;
    allow nfc app_api_service:service_manager find;
    allow nfc system_api_service:service_manager find;
    
    # already open bugreport file descriptors may be shared with
    # the nfc process, from a file in
    # /data/data/com.android.shell/files/bugreports/bugreport-*.
    allow nfc shell_data_file:file read;