platform_system_sepolicy/public
Nick Kralevich 41b21ee96a Delete untrusted_v2_app
As of https://android-review.googlesource.com/c/platform/system/sepolicy/+/536356 ,
the untrusted_v2_app domain is no longer used.

Bug: 112233317
Test: policy compiles, device boots, and no problems
Change-Id: I5a47c8305bef374b7fea06cd789e06cd48b847e6
2018-08-06 12:52:37 -07:00
..
adbd.te Revert "Revert "Reduce the number of processes that can start adbd"" 2018-06-26 19:52:21 +00:00
app.te Delete untrusted_v2_app 2018-08-06 12:52:37 -07:00
asan_extract.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
attributes add extended_core_property_type 2018-06-01 13:27:54 +09:00
audioserver.te
blkid.te
blkid_untrusted.te
bluetooth.te
bootanim.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
bootstat.te Remove bootstat access to proc label. 2017-09-18 10:29:24 -07:00
bufferhubd.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
cameraserver.te Add shell:fifo_file permission for cameraserver 2018-02-28 16:12:40 -08:00
charger.te charger: allow to read /sys/class/power_supply 2018-01-18 16:46:17 -08:00
clatd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
cppreopts.te Grant cppreopts.sh permissions to cleanup if it fails 2017-08-23 16:00:23 +00:00
crash_dump.te Widen crash_dump dontaudit. 2018-04-10 09:55:11 -07:00
device.te Add secure_element_device 2018-03-07 16:37:24 +00:00
dex2oat.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
dhcp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
display_service_server.te Add fwk_display_hwservice. 2017-05-17 11:00:28 -07:00
dnsmasq.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
domain.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
drmserver.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
dumpstate.te access to /proc/slabinfo 2018-06-14 10:18:45 -07:00
e2fs.te Allow vendor_init and e2fs to enable metadata encryption 2018-02-01 13:25:34 -08:00
ephemeral_app.te
file.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
fingerprintd.te Remove fingerprintd access to sysfs_type and cgroup label. 2017-09-19 17:12:14 -07:00
fsck.te Allow access to the metadata partition for metadata encryption. 2018-01-19 14:45:08 -08:00
fsck_untrusted.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
gatekeeperd.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
global_macros sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_allocator.te Make hal_allocator use hal_attribute_hwservice. 2018-06-11 14:44:12 -07:00
hal_audio.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_audiocontrol.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_authsecret.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_bluetooth.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_bootctl.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_broadcastradio.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_camera.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_cas.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_configstore.te Make hal_configstore consistent. 2018-06-06 13:01:17 -07:00
hal_confirmationui.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_contexthub.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_drm.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_dumpstate.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_evs.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hal_fingerprint.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_gatekeeper.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_gnss.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_graphics_allocator.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_graphics_composer.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_health.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_ir.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_keymaster.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_light.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_lowpan.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_memtrack.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_neuralnetworks.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_neverallows.te Allow to use sockets from hal server for auto 2018-05-15 14:38:00 -07:00
hal_nfc.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_oemlock.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_omx.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_power.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_secure_element.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_sensors.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_telephony.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tetheroffload.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_thermal.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tv_cec.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tv_input.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_usb.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_usb_gadget.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vehicle.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vibrator.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vr.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_weaver.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_hostapd.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_offload.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_supplicant.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
healthd.te Fix aosp healthd. 2018-03-27 15:18:30 -07:00
hwservice.te remove thermalcallback_hwservice 2018-06-29 23:01:43 +00:00
hwservicemanager.te
idmap.te Suppress denials from idmap reading installd's files. 2018-01-25 10:07:19 -08:00
incident.te
incident_helper.te Selinux permissions for incidentd project 2018-01-23 19:08:49 +00:00
incidentd.te
init.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
inputflinger.te
install_recovery.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
installd.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
ioctl_defines Fix TIOCSCTTY ioctl definition for mips 2017-08-31 18:16:46 +02:00
ioctl_macros
isolated_app.te
kernel.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
keystore.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
llkd.te llkd: add live-lock daemon 2018-05-10 17:19:16 +00:00
lmkd.te Selinux: Give lmkd read access to /proc/meminfo 2018-04-13 21:35:52 +00:00
logd.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
logpersist.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
mdnsd.te
mediadrmserver.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
mediaextractor.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
mediametrics.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
mediaprovider.te Split mediaprovider from priv_app. 2017-07-10 11:17:18 -07:00
mediaserver.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
modprobe.te modprobe: shouldn't load kernel modules from /system 2018-03-20 14:17:28 -07:00
mtp.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
net.te
netd.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
netutils_wrapper.te
neverallow_macros
nfc.te
otapreopt_chroot.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
otapreopt_slot.te
performanced.te Suppress noisy performanced denials in permissive mode. 2018-02-27 10:42:12 +00:00
perfprofd.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
platform_app.te
postinstall.te
postinstall_dexopt.te Sepolicy: Modify postinstall_dexopt 2018-04-30 09:52:54 -07:00
ppp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
preopt2cachename.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
priv_app.te
profman.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
property.te Revert "Revert "Reduce the number of processes that can start adbd"" 2018-06-26 19:52:21 +00:00
property_contexts sepolicy: create rules for system properties 2018-07-03 08:54:04 -07:00
racoon.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
radio.te sepolicy entries for time zone detector service 2018-06-19 21:13:57 +01:00
recovery.te Revert "Revert "Reduce the number of processes that can start adbd"" 2018-06-26 19:52:21 +00:00
recovery_persist.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
recovery_refresh.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
roles
runas.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
sdcardd.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
secure_element.te SE Policy for Secure Element app and Secure Element HAL 2018-01-29 21:31:42 +00:00
service.te Added sepolicy for uri_grants service 2018-07-23 15:31:40 -07:00
servicemanager.te Prevent vendor_init from using binder or sockets 2018-02-09 19:32:59 +00:00
sgdisk.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
shared_relro.te Allow shared_relro to connect to activity_service. 2017-07-24 17:38:40 -04:00
shell.te access to /proc/slabinfo 2018-06-14 10:18:45 -07:00
slideshow.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
su.te sepolicy(hostapd): Add a HIDL interface for hostapd 2018-05-04 21:36:24 +00:00
surfaceflinger.te
system_app.te
system_server.te
te_macros Protect apps from ptrace by other system components 2018-07-25 23:49:30 -07:00
tee.te Fingerprint data is now stored in one of two ways depending on the 2018-05-16 14:22:14 -07:00
thermalserviced.te remove thermalcallback_hwservice 2018-06-29 23:01:43 +00:00
tombstoned.te tombstoned: allow linking tombstones. 2018-04-18 18:41:21 -07:00
toolbox.te
traced_probes.te Make traced_probes mlstrustedsubject. 2018-04-17 18:12:28 +00:00
traceur_app.te Enable Traceur on user builds. 2018-02-02 12:46:36 -08:00
tzdatacheck.te
ueventd.te Allow ueventd to insert modules 2018-08-01 13:21:20 -07:00
uncrypt.te Improve tests protecting private app data 2018-05-29 13:47:49 -07:00
untrusted_app.te Add untrusted_app_27 2018-04-03 12:25:51 -07:00
update_engine.te Hide sys_rawio SELinux denials. 2018-04-10 14:23:25 -07:00
update_engine_common.te Make /proc/sys/kernel/random available to everyone 2017-11-20 21:02:21 +00:00
update_verifier.te Create sysfs_dm label. 2017-10-10 14:42:24 -07:00
usbd.te Revert "Revert "Reduce the number of processes that can start adbd"" 2018-06-26 19:52:21 +00:00
vdc.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
vendor_init.te Start partitioning off privapp_data_file from app_data_file 2018-08-02 16:29:02 -07:00
vendor_shell.te Allow shell to start vendor shell 2018-01-16 18:28:51 +00:00
vendor_toolbox.te Allow init to run vendor toybox for modprobe 2017-05-24 15:01:20 -07:00
virtual_touchpad.te Allow vr_hwc and virtual_touchpad to query for permissions 2017-04-21 17:15:03 -04:00
vndservice.te Add default label and mapping for vendor services 2017-04-28 14:56:57 -07:00
vndservicemanager.te
vold.te Allow vold to mount at /mnt/user/.* 2018-08-03 12:55:09 -07:00
vold_prepare_subdirs.te Move most of public/vold_prepare_subdirs.te to private 2017-10-25 13:06:25 -07:00
vr_hwc.te Selinux changes for vr flinger vsync service 2018-07-13 17:17:01 -07:00
watchdogd.te Move watchdogd out of init and into its own domain 2018-08-03 19:28:05 +00:00
webview_zygote.te
wificond.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
wpantund.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
zygote.te