platform_system_sepolicy/public
Jeff Vander Stoep 0f5ad4e593 Allow AOSP processes to read pm_prop
Exclude vendor processes.

Bug: 69309298
Test: cts-tradefed run cts -m CtsCompilationTestCases
    completed in 33s. 5 passed, 0 failed
Test: runtest frameworks-services -c \
    com.android.server.pm.dex.DexoptOptionsTests \
    --install=".*FrameworksServicesTests.apk"
    OK (5 tests)

Change-Id: Ic02caf373e2214b4b931a724ca8d4f4effbc0741
2017-11-17 13:08:45 -08:00
..
adbd.te Moving adbd from rootdir to system/bin 2017-08-28 17:38:13 +08:00
asan_extract.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
attributes Start tracking platform/vendor data access violations 2017-10-17 13:07:54 -07:00
audioserver.te Move audioserver policy to private 2017-02-07 10:47:18 -08:00
blkid.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
blkid_untrusted.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
bluetooth.te Move bluetooth policy to private 2017-02-06 15:29:10 -08:00
bootanim.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
bootstat.te Remove bootstat access to proc label. 2017-09-18 10:29:24 -07:00
bufferhubd.te SELinux policies for PDX services 2017-05-15 10:07:05 -07:00
cameraserver.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
charger.te charger: read permissions to /sys/power/state 2017-11-14 17:43:09 -08:00
clatd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
cppreopts.te Grant cppreopts.sh permissions to cleanup if it fails 2017-08-23 16:00:23 +00:00
crash_dump.te Add /dev/kmsg_debug. 2017-08-11 22:54:15 +00:00
device.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
dex2oat.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
dhcp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
display_service_server.te Add fwk_display_hwservice. 2017-05-17 11:00:28 -07:00
dnsmasq.te
domain.te Allow AOSP processes to read pm_prop 2017-11-17 13:08:45 -08:00
drmserver.te No access to tee domain over Unix domain sockets 2017-04-03 11:26:01 -07:00
dumpstate.te system_server: access to /proc/sys/fs/pipe-max-size 2017-11-16 12:30:53 -08:00
e2fs.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
ephemeral_app.te Move ephemeral_app policy to private 2017-01-09 15:34:27 -08:00
file.te system_server: access to /proc/sys/fs/pipe-max-size 2017-11-16 12:30:53 -08:00
fingerprintd.te Remove fingerprintd access to sysfs_type and cgroup label. 2017-09-19 17:12:14 -07:00
fsck.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
fsck_untrusted.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
gatekeeperd.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
global_macros sepolicy: Define and allow map permission 2017-07-10 16:31:23 -04:00
hal_allocator.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_audio.te hal_audio: remove access to audiohal_data_file 2017-10-21 03:29:36 +00:00
hal_bluetooth.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_bootctl.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_broadcastradio.te Move Broadcast Radio HAL to a separate binary. 2017-09-15 10:16:48 -07:00
hal_camera.te hal_camera: Don't allow access to /data/misc/camera 2017-11-10 14:15:04 -08:00
hal_cas.te Remove unnecessary HAL permissions 2017-10-09 15:50:10 -07:00
hal_configstore.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_contexthub.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_drm.te Remove unnecessary HAL permissions 2017-10-09 15:50:10 -07:00
hal_dumpstate.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_fingerprint.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_gatekeeper.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_gnss.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_graphics_allocator.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_graphics_composer.te Fix graphics composer denial. 2017-05-19 14:14:35 -07:00
hal_health.te hal_health_default: permissions for default impl 2017-10-31 15:11:23 -07:00
hal_ir.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_keymaster.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_light.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_lowpan.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_memtrack.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_neuralnetworks.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_neverallows.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_nfc.te Remove access to sock_file for hal_nfc 2017-04-27 09:05:27 -07:00
hal_oemlock.te Add missing sepolicies for OemLock HAL. 2017-05-31 15:22:05 +01:00
hal_power.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_sensors.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_telephony.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tetheroffload.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_thermal.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tv_cec.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tv_input.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_usb.te Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid 2017-11-08 01:39:28 +00:00
hal_vibrator.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_vr.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_weaver.te Add missing sepolicies for the Weaver HAL. 2017-05-31 15:17:11 +01:00
hal_wifi.te Merge "Add sepolicy for hal_wifi to access /proc/modules" am: 6acd70b918 2017-06-22 15:45:20 +00:00
hal_wifi_offload.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_wifi_supplicant.te wifi_supplicant: refactor permissions 2017-11-08 14:34:18 -08:00
healthd.te Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid 2017-11-08 01:39:28 +00:00
hwservice.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hwservicemanager.te Add hwservice_contexts and support for querying it. 2017-04-12 18:07:12 -07:00
idmap.te sepolicy: restrict /vendor/overlay from most coredomains 2017-04-06 13:28:16 -07:00
incident.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
incidentd.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
init.te init: label /proc dependencies and remove access to proc 2017-11-08 14:46:09 -08:00
inputflinger.te te_macros: introduce add_service() macro 2017-01-26 04:43:16 +00:00
install_recovery.te Fix build time warning 2017-04-21 09:42:50 -07:00
installd.te Allow installd to read system_data_file:lnk_file 2017-10-26 18:34:18 -07:00
ioctl_defines Fix TIOCSCTTY ioctl definition for mips 2017-08-31 18:16:46 +02:00
ioctl_macros
isolated_app.te Move isolated_app policy to private 2017-01-05 16:06:54 -08:00
kernel.te Remove proc label access from kernel domain. 2017-10-09 13:19:31 -07:00
keystore.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
lmkd.te Restrict lmkd read access from sysfs_type to sysfs_lowmemorykiller. 2017-09-20 16:29:25 -07:00
logd.te Explicitly label logd's dependencies in /proc. 2017-09-14 15:09:33 -07:00
logpersist.te logpersist: do not permit dynamic transition to domain 2016-12-29 09:29:36 -08:00
mdnsd.te Move mdnsd policy to private 2017-02-06 15:02:32 -08:00
mediacodec.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediadrmserver.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediaextractor.te mediaextractor: ensure no direct open()s 2017-10-07 15:01:24 +00:00
mediametrics.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediaprovider.te Split mediaprovider as a separate domain from priv_app 2017-04-17 15:30:35 -07:00
mediaserver.te mediaserver: remove access to 'sysfs' type. 2017-11-16 17:34:14 -08:00
modprobe.te Fix coredomain violation for modprobe 2017-06-05 08:09:18 -07:00
mtp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
net.te Move netdomain policy to private 2017-02-06 15:02:00 -08:00
netd.te Allow netd to read the /dev/xt_qtaguid 2017-11-15 13:36:00 -08:00
netutils_wrapper.te add netutils_wrappers 2017-04-14 22:57:27 -07:00
neverallow_macros Ban socket connections between core and vendor 2017-03-27 08:49:13 -07:00
nfc.te Remove unnecessary rules from NFC HAL clients 2017-03-22 16:22:33 -07:00
otapreopt_chroot.te
otapreopt_slot.te Sepolicy: Give otapreopt_slot read on A/B artifact links 2017-04-07 20:19:41 -07:00
performanced.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
perfprofd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
platform_app.te Move platform_app policy to private 2017-01-09 14:52:59 -08:00
postinstall.te
postinstall_dexopt.te /proc, /sys access from uncrypt, update_engine, postinstall_dexopt 2017-10-24 16:40:45 +00:00
ppp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
preopt2cachename.te
priv_app.te Move priv_app policy to private 2017-01-05 15:44:32 -08:00
profman.te Allow profman to analyze profiles for the secondary dex files 2017-03-15 18:47:13 -07:00
property.te Revert "Revert "Put pm.* property in new pm_prop context"" 2017-11-16 05:28:14 +00:00
racoon.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
radio.te Allow vendor apps to use surfaceflinger_service 2017-11-09 15:41:37 +00:00
recovery.te Recovery: remove sysfs access 2017-10-26 22:04:44 +00:00
recovery_persist.te
recovery_refresh.te
rild.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
roles
runas.te Selinux: Give runas permission to read system_data_file links 2017-09-20 21:34:55 -07:00
sdcardd.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
service.te Allow vendor apps to use surfaceflinger_service 2017-11-09 15:41:37 +00:00
servicemanager.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
sgdisk.te
shared_relro.te Allow shared_relro to connect to activity_service. 2017-07-24 17:38:40 -04:00
shell.te shell: neverallow access to 'proc' label. 2017-11-17 18:39:07 +00:00
slideshow.te
su.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
surfaceflinger.te Move surfaceflinger policy to private 2017-02-07 10:06:12 -08:00
system_app.te Move system_app policy to private 2017-01-05 17:20:28 -08:00
system_server.te Move system_server policy to private 2017-02-07 20:24:05 +00:00
te_macros te_macros: add map to tpmfs_domain 2017-11-06 22:36:29 +00:00
tee.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
thermalserviced.te PowerUI access to thermalservice 2017-10-14 01:05:58 +00:00
tombstoned.te SEPolicy: Changes for new stack dumping scheme. 2017-05-31 10:01:48 +00:00
toolbox.te
tzdatacheck.te Allow the shell user to run tzdatacheck 2017-04-20 09:31:36 +00:00
ueventd.te Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid 2017-11-08 01:39:28 +00:00
uncrypt.te /proc, /sys access from uncrypt, update_engine, postinstall_dexopt 2017-10-24 16:40:45 +00:00
untrusted_app.te Move untrusted_app policy to private 2017-01-05 14:39:52 -08:00
untrusted_app_25.te untrusted_app: policy versioning based on targetSdkVersion 2017-02-14 13:30:12 -08:00
untrusted_v2_app.te Add new untrusted_v2_app domain 2017-02-21 12:39:55 -08:00
update_engine.te Do not audit the fsetid capability for update engine 2017-11-14 13:52:48 -08:00
update_engine_common.te /proc, /sys access from uncrypt, update_engine, postinstall_dexopt 2017-10-24 16:40:45 +00:00
update_verifier.te Create sysfs_dm label. 2017-10-10 14:42:24 -07:00
vdc.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
vendor_init.te add vendor_init.te 2017-10-25 09:21:30 -07:00
vendor_shell.te vendor_shell: add sepolicy for vendor shell 2017-04-14 09:38:51 -07:00
vendor_toolbox.te Allow init to run vendor toybox for modprobe 2017-05-24 15:01:20 -07:00
virtual_touchpad.te Allow vr_hwc and virtual_touchpad to query for permissions 2017-04-21 17:15:03 -04:00
vndservice.te Add default label and mapping for vendor services 2017-04-28 14:56:57 -07:00
vndservicemanager.te Initial sepolicy for vndservicemanager. 2017-03-23 00:20:43 +00:00
vold.te Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid 2017-11-08 01:39:28 +00:00
vold_prepare_subdirs.te Move most of public/vold_prepare_subdirs.te to private 2017-10-25 13:06:25 -07:00
vr_hwc.te SELinux policies for PDX services 2017-05-10 16:39:19 -07:00
watchdogd.te
webview_zygote.te Move webview_zygote policy to private 2017-01-27 17:01:43 +00:00
wificond.te Allow wificond to find permission 2017-04-04 16:52:25 -07:00
wpantund.te wpantund: Allow wpantund to call callbacks 2017-10-16 14:10:40 -07:00
zygote.te Move zygote policy to private 2017-01-26 13:31:16 -08:00