..
adbd.te
Move adbd policy to private
2017-02-07 09:55:05 -08:00
asan_extract.te
Sepolicy: Add ASAN-Extract
2017-04-05 13:09:29 -07:00
attributes
Add vendor_executes_system_violators attribute
2017-04-14 22:57:30 -07:00
audioserver.te
Move audioserver policy to private
2017-02-07 10:47:18 -08:00
blkid.te
Move blkid policy to private
2017-02-07 23:57:53 +00:00
blkid_untrusted.te
Move blkid policy to private
2017-02-07 23:57:53 +00:00
bluetooth.te
Move bluetooth policy to private
2017-02-06 15:29:10 -08:00
bootanim.te
Allow hals to read hwservicemanager prop. am: d3ce5dc38c
am: d437f0e09d
2017-03-23 03:53:11 +00:00
bootstat.te
bufferhubd.te
Allow hals to read hwservicemanager prop.
2017-03-23 01:50:50 +00:00
cameraserver.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
charger.te
clatd.te
cppreopts.te
crash_dump.te
sepolicy: relabel /vendor
2017-04-05 13:58:32 -07:00
device.te
Define policy for "loop-control" device.
2017-03-25 21:39:03 -06:00
dex2oat.te
Add dex2oat permissions to open and read the tmp apk.
2017-04-19 11:00:34 -07:00
dhcp.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
dnsmasq.te
domain.te
Add default label and mapping for vendor services
2017-04-28 14:56:57 -07:00
domain_deprecated.te
Fix lock logspam and remove domain_deprecated rule
2017-04-04 18:37:28 -07:00
drmserver.te
No access to tee domain over Unix domain sockets
2017-04-03 11:26:01 -07:00
dumpstate.te
Merge "Grant dumpstate hwservermanager list permission" into oc-dev
2017-04-21 19:13:18 +00:00
ephemeral_app.te
file.te
Add selinux rules for additional file contexts in userdebug
2017-04-18 14:33:41 -07:00
fingerprintd.te
fsck.te
fsck: allow stat access on /dev/block files
2017-02-17 12:47:25 -08:00
fsck_untrusted.te
fsck: allow stat access on /dev/block files
2017-02-17 12:47:25 -08:00
gatekeeperd.te
Fix sepolicy for Gatekeeper HAL
2017-03-20 07:39:33 -07:00
global_macros
Remove obsolete netlink_firewall_socket and netlink_ip6fw_socket classes.
2017-02-06 14:24:41 -05:00
hal_allocator.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_audio.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_bluetooth.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_bootctl.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_camera.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_configstore.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_contexthub.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_drm.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_dumpstate.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_fingerprint.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_gatekeeper.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_gnss.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_graphics_allocator.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_graphics_composer.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_health.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_ir.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_keymaster.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_light.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_memtrack.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_neverallows.te
Enforce one HAL per domain.
2017-03-21 12:16:31 -07:00
hal_nfc.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_power.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_sensors.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_telephony.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_thermal.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_tv_cec.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_tv_input.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_usb.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_vibrator.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_vr.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_wifi.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_wifi_supplicant.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
healthd.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hwservice.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hwservicemanager.te
Add hwservice_contexts and support for querying it.
2017-04-12 18:07:12 -07:00
idmap.te
sepolicy: restrict /vendor/overlay from most coredomains
2017-04-06 13:28:16 -07:00
incident.te
Add incident command and incidentd daemon se policy.
2017-02-07 15:52:07 -08:00
incidentd.te
Add incident command and incidentd daemon se policy.
2017-02-07 15:52:07 -08:00
init.te
vendor_shell: add sepolicy for vendor shell
2017-04-14 09:38:51 -07:00
inputflinger.te
install_recovery.te
Fix build time warning
2017-04-21 09:42:50 -07:00
installd.te
sepolicy: restrict /vendor/app from most coredomains
2017-04-06 13:28:12 -07:00
ioctl_defines
ioctl_macros
isolated_app.te
kernel.te
file_context: explicitly label all file context files
2017-03-29 10:17:21 -07:00
keystore.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
lmkd.te
logd.te
logpersist.te
mdnsd.te
Move mdnsd policy to private
2017-02-06 15:02:32 -08:00
mediacodec.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
mediadrmserver.te
grant mediadrmserver permission to read dir from /system/*
2017-04-19 17:58:27 +00:00
mediaextractor.te
Extend mediaextractor file read permissions
2017-04-19 10:05:38 -07:00
mediametrics.te
allow media.metrics to write to file descriptor in /data
2017-04-04 10:30:50 -07:00
mediaserver.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
modprobe.te
allow to load kernel modules from vendor partition
2017-04-11 12:45:12 +09:00
mtp.te
net.te
Move netdomain policy to private
2017-02-06 15:02:00 -08:00
netd.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
netutils_wrapper.te
add netutils_wrappers
2017-04-14 22:57:27 -07:00
neverallow_macros
Ban socket connections between core and vendor
2017-03-27 08:49:13 -07:00
nfc.te
Remove unnecessary rules from NFC HAL clients
2017-03-22 16:22:33 -07:00
otapreopt_chroot.te
otapreopt_slot.te
Sepolicy: Give otapreopt_slot read on A/B artifact links
2017-04-07 20:19:41 -07:00
performanced.te
Add SELinux policies for vr_window_manager
2017-02-15 14:56:49 -08:00
perfprofd.te
Ban vendor components access to core data types
2017-03-28 15:44:39 -07:00
platform_app.te
postinstall.te
postinstall_dexopt.te
sepolicy: Allow postinstall_dexopt /vendor/app access
2017-04-11 20:39:47 -07:00
ppp.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
preopt2cachename.te
priv_app.te
profman.te
Allow profman to analyze profiles for the secondary dex files
2017-03-15 18:47:13 -07:00
property.te
Sepolicy: Add ASAN-Extract
2017-04-05 13:09:29 -07:00
racoon.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
radio.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
recovery.te
Allow access to /proc/config.gz for priv_app and recovery
2017-04-19 12:48:08 -07:00
recovery_persist.te
recovery_refresh.te
rild.te
Remove unnecessary attributes
2017-04-14 09:39:19 -07:00
roles
runas.te
runas: Grant access to seapp_contexts_file
2017-03-30 13:21:49 -07:00
sdcardd.te
Remove logspam
2017-02-10 12:06:38 -08:00
sensord.te
Allow hals to read hwservicemanager prop.
2017-03-23 01:50:50 +00:00
service.te
Merge "SE Linux policies for OemLockService" into oc-dev
2017-04-14 11:31:09 +00:00
servicemanager.te
Add target for vndservice_contexts.
2017-04-03 15:39:42 -07:00
sgdisk.te
shared_relro.te
shell.te
Let shell and bugreport read logging related properties.
2017-04-21 16:24:45 +01:00
slideshow.te
su.te
Remove vndservice_manager object classes.
2017-04-18 12:40:44 -07:00
surfaceflinger.te
Move surfaceflinger policy to private
2017-02-07 10:06:12 -08:00
system_app.te
system_server.te
Move system_server policy to private
2017-02-07 20:24:05 +00:00
te_macros
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
tee.te
Move TEE rules to vendor image
2017-04-03 11:11:48 -07:00
tombstoned.te
toolbox.te
tzdatacheck.te
ueventd.te
sepolicy: relabel /vendor
2017-04-05 13:58:32 -07:00
uncrypt.te
untrusted_app.te
untrusted_app_25.te
untrusted_app: policy versioning based on targetSdkVersion
2017-02-14 13:30:12 -08:00
untrusted_v2_app.te
Add new untrusted_v2_app domain
2017-02-21 12:39:55 -08:00
update_engine.te
Ban vendor components access to core data types
2017-03-28 15:44:39 -07:00
update_engine_common.te
Allow update_engine to kill postinstall process.
2017-03-22 21:01:08 -07:00
update_verifier.te
Allow update_verifier to reboot the device
2017-04-04 21:07:48 +00:00
vdc.te
Grant vdc access to kmsg
2017-03-31 20:48:36 +00:00
vendor_shell.te
vendor_shell: add sepolicy for vendor shell
2017-04-14 09:38:51 -07:00
vendor_toolbox.te
toolbox: add sepolicy for vendor toybox
2017-04-13 16:32:34 -07:00
virtual_touchpad.te
Add SELinux policies for vr_window_manager
2017-02-15 14:56:49 -08:00
vndservice.te
Add default label and mapping for vendor services
2017-04-28 14:56:57 -07:00
vndservicemanager.te
Initial sepolicy for vndservicemanager.
2017-03-23 00:20:43 +00:00
vold.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
vr_hwc.te
VR: Add sepolicy for VR HWC service
2017-03-31 10:25:53 -04:00
vr_wm.te
VR: Add sepolicy for VR HWC service
2017-03-31 10:25:53 -04:00
watchdogd.te
webview_zygote.te
wificond.te
Allow wificond to find permission
2017-04-04 16:52:25 -07:00
zygote.te