platform_system_sepolicy/public
Alex Klyubin 632bc494f1 Restrict access to hwservicemanager
This adds fine-grained policy about who can register and find which
HwBinder services in hwservicemanager.

Test: Play movie in Netflix and Google Play Movies
Test: Play video in YouTube app and YouTube web page
Test: In Google Camera app, take photo (HDR+ and conventional),
      record video (slow motion and normal), and check that photos
      look fine and videos play back with sound.
Test: Cast screen to a Google Cast device
Test: Get location fix in Google Maps
Test: Make and receive a phone call, check that sound works both ways
      and that disconnecting the call frome either end works fine.
Test: Run RsHelloCompute RenderScript demo app
Test: Run fast subset of media CTS tests:
      make and install CtsMediaTestCases.apk
      adb shell am instrument -e size small \
          -w 'android.media.cts/android.support.test.runner.AndroidJUnitRunner'
Test: Play music using Google Play music
Test: Adjust screen brightness via the slider in Quick Settings
Test: adb bugreport
Test: Enroll in fingerprint screen unlock, unlock screen using
      fingerprint
Test: Apply OTA update:
      Make some visible change, e.g., rename Settings app.
      make otatools && \
      make dist
      Ensure device has network connectivity
      ota_call.py -s <serial here> --file out/dist/sailfish-ota-*.zip
      Confirm the change is now live on the device
Bug: 34454312
Change-Id: Iecf74000e6c68f01299667486f3c767912c076d3
2017-04-20 14:45:21 -07:00
..
adbd.te Move adbd policy to private 2017-02-07 09:55:05 -08:00
asan_extract.te Sepolicy: Give asan_extract access to powerctl 2017-04-19 18:32:27 -07:00
attributes Merge "Add vendor_executes_system_violators attribute" into oc-dev am: 80cab7dea8 2017-04-16 06:53:32 +00:00
audioserver.te Move audioserver policy to private 2017-02-07 10:47:18 -08:00
blkid.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
blkid_untrusted.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
bluetooth.te Move bluetooth policy to private 2017-02-06 15:29:10 -08:00
bootanim.te Allow hals to read hwservicemanager prop. am: d3ce5dc38c am: d437f0e09d 2017-03-23 03:53:11 +00:00
bootstat.te logd: restrict access to /dev/event-log-tags 2017-01-31 15:50:15 +00:00
bufferhubd.te Allow hals to read hwservicemanager prop. 2017-03-23 01:50:50 +00:00
cameraserver.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
charger.te healthd: create SEPolicy for 'charger' and reduce healthd's scope 2016-12-15 18:17:13 -08:00
clatd.te
cppreopts.te
crash_dump.te Merge "Add /dev/kmsg_debug." am: b7cb45f0d2 am: 84a1cd0d87 2017-04-10 21:13:11 +00:00
device.te remove /dev/log 2017-04-11 21:35:32 +00:00
dex2oat.te Add dex2oat permissions to open and read the tmp apk. 2017-04-19 11:00:34 -07:00
dhcp.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
dnsmasq.te remove more domain_deprecated 2016-12-09 19:57:43 -08:00
domain.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
domain_deprecated.te Merge "bluetooth: Remove domain_deprecated" am: e453801d66 am: f169d6a325 2017-04-14 01:43:52 +00:00
drmserver.te No access to tee domain over Unix domain sockets 2017-04-03 11:26:01 -07:00
dumpstate.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
ephemeral_app.te Move ephemeral_app policy to private 2017-01-09 15:34:27 -08:00
file.te Sepolicy: Fix asanwrapper 2017-04-19 16:33:45 -07:00
fingerprintd.te te_macros: introduce add_service() macro 2017-01-26 04:43:16 +00:00
fsck.te fsck: allow stat access on /dev/block files 2017-02-17 12:47:25 -08:00
fsck_untrusted.te fsck: allow stat access on /dev/block files 2017-02-17 12:47:25 -08:00
gatekeeperd.te Fix sepolicy for Gatekeeper HAL 2017-03-20 07:39:33 -07:00
global_macros Remove obsolete netlink_firewall_socket and netlink_ip6fw_socket classes. 2017-02-06 14:24:41 -05:00
hal_allocator.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_audio.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_bluetooth.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_bootctl.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_camera.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_configstore.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_contexthub.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_drm.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_dumpstate.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_fingerprint.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_gatekeeper.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_gnss.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_graphics_allocator.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_graphics_composer.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_health.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_ir.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_keymaster.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_light.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_memtrack.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_neverallows.te Enforce one HAL per domain. 2017-03-21 12:16:31 -07:00
hal_nfc.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_oemlock.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_power.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_sensors.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_telephony.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_thermal.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_tv_cec.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_tv_input.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_usb.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_vibrator.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_vr.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_weaver.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_wifi.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_wifi_offload.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hal_wifi_supplicant.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
healthd.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hwservice.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
hwservicemanager.te Add hwservice_contexts and support for querying it. 2017-04-12 18:07:12 -07:00
idmap.te sepolicy: restrict /vendor/overlay from most coredomains 2017-04-06 13:28:16 -07:00
incident.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
incidentd.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
init.te Merge changes from topic 'add_vendor_shell_toybox' into oc-dev 2017-04-14 21:00:40 +00:00
inputflinger.te te_macros: introduce add_service() macro 2017-01-26 04:43:16 +00:00
install_recovery.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
installd.te sepolicy: restrict /vendor/app from most coredomains 2017-04-06 13:28:12 -07:00
ioctl_defines
ioctl_macros Add TCSETS to unpriv_tty_ioctls 2016-12-07 15:59:34 -08:00
isolated_app.te Move isolated_app policy to private 2017-01-05 16:06:54 -08:00
kernel.te Merge commit '24d3a1cc3fd0705d4dc8c7484e55c7107dc8b928' into manual_merge_24d3a1cc 2017-04-17 20:14:33 -07:00
keystore.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
lmkd.te more ephemeral_app cleanup 2017-01-20 14:35:17 +00:00
logd.te logd: add getEventTag command and service 2017-01-31 15:50:42 +00:00
logpersist.te logpersist: do not permit dynamic transition to domain 2016-12-29 09:29:36 -08:00
mdnsd.te Move mdnsd policy to private 2017-02-06 15:02:32 -08:00
mediacodec.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
mediadrmserver.te grant mediadrmserver permission to read dir from /system/* 2017-04-19 17:58:27 +00:00
mediaextractor.te Allow MediaExtractor to create FileSource 2017-03-29 17:54:49 +00:00
mediametrics.te allow media.metrics to write to file descriptor in /data 2017-04-04 10:30:50 -07:00
mediaprovider.te Split mediaprovider from priv_app. 2017-04-17 16:57:00 -07:00
mediaserver.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
modprobe.te allow to load kernel modules from vendor partition 2017-04-11 12:45:12 +09:00
mtp.te
net.te Move netdomain policy to private 2017-02-06 15:02:00 -08:00
netd.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
netutils_wrapper.te add netutils_wrappers 2017-04-14 22:57:27 -07:00
neverallow_macros Ban socket connections between core and vendor 2017-03-27 08:49:13 -07:00
nfc.te Remove unnecessary rules from NFC HAL clients 2017-03-22 16:22:33 -07:00
otapreopt_chroot.te
otapreopt_slot.te Sepolicy: Give otapreopt_slot read on A/B artifact links 2017-04-07 20:19:41 -07:00
performanced.te Add SELinux policies for vr_window_manager 2017-02-15 14:56:49 -08:00
perfprofd.te Ban vendor components access to core data types 2017-03-28 15:44:39 -07:00
platform_app.te Move platform_app policy to private 2017-01-09 14:52:59 -08:00
postinstall.te
postinstall_dexopt.te sepolicy: Allow postinstall_dexopt /vendor/app access 2017-04-11 20:39:47 -07:00
ppp.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
preopt2cachename.te
priv_app.te Move priv_app policy to private 2017-01-05 15:44:32 -08:00
profman.te Allow profman to analyze profiles for the secondary dex files 2017-03-15 18:47:13 -07:00
property.te Sepolicy: Give asan_extract access to powerctl 2017-04-19 18:32:27 -07:00
racoon.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
radio.te Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
recovery.te Allow access to /proc/config.gz for priv_app and recovery 2017-04-19 12:48:08 -07:00
recovery_persist.te sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
recovery_refresh.te sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
rild.te Remove unnecessary attributes 2017-04-14 09:39:19 -07:00
roles sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
runas.te runas: Grant access to seapp_contexts_file 2017-03-30 13:21:49 -07:00
sdcardd.te Remove logspam 2017-02-10 12:06:38 -08:00
sensord.te Allow hals to read hwservicemanager prop. 2017-03-23 01:50:50 +00:00
service.te Merge "SE Linux policies for OemLockService" into oc-dev 2017-04-14 11:31:09 +00:00
servicemanager.te Add target for vndservice_contexts. 2017-04-03 15:39:42 -07:00
sgdisk.te remove more domain_deprecated 2016-12-09 19:57:43 -08:00
shared_relro.te Restore app_domain macro and move to private use. 2016-12-08 14:42:43 -08:00
shell.te Add hwservice_contexts and support for querying it. 2017-04-12 18:07:12 -07:00
slideshow.te
su.te Remove vndservice_manager object classes. 2017-04-19 16:49:33 +00:00
surfaceflinger.te Move surfaceflinger policy to private 2017-02-07 10:06:12 -08:00
system_app.te Move system_app policy to private 2017-01-05 17:20:28 -08:00
system_server.te Move system_server policy to private 2017-02-07 20:24:05 +00:00
te_macros Restrict access to hwservicemanager 2017-04-20 14:45:21 -07:00
tee.te Move TEE rules to vendor image 2017-04-03 11:11:48 -07:00
tombstoned.te tombstoned: temporarily allow write to anr_data_file. 2017-01-23 12:54:03 -08:00
toolbox.te
tzdatacheck.te remove more domain_deprecated 2016-12-09 19:57:43 -08:00
ueventd.te sepolicy: relabel /vendor 2017-04-05 13:58:32 -07:00
uncrypt.te
untrusted_app.te Move untrusted_app policy to private 2017-01-05 14:39:52 -08:00
untrusted_app_25.te untrusted_app: policy versioning based on targetSdkVersion 2017-02-14 13:30:12 -08:00
untrusted_v2_app.te Add new untrusted_v2_app domain 2017-02-21 12:39:55 -08:00
update_engine.te Ban vendor components access to core data types 2017-03-28 15:44:39 -07:00
update_engine_common.te Allow update_engine to kill postinstall process. 2017-03-22 21:01:08 -07:00
update_verifier.te Allow update_verifier to reboot the device 2017-04-04 21:07:48 +00:00
vdc.te Grant vdc access to kmsg 2017-03-31 20:48:36 +00:00
vendor_shell.te vendor_shell: add sepolicy for vendor shell 2017-04-14 09:38:51 -07:00
vendor_toolbox.te toolbox: add sepolicy for vendor toybox 2017-04-13 16:32:34 -07:00
virtual_touchpad.te Add SELinux policies for vr_window_manager 2017-02-15 14:56:49 -08:00
vndservicemanager.te Initial sepolicy for vndservicemanager. 2017-03-23 00:20:43 +00:00
vold.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
vr_hwc.te VR: Add sepolicy for VR HWC service 2017-03-31 10:25:53 -04:00
vr_wm.te VR: Add sepolicy for VR HWC service 2017-03-31 10:25:53 -04:00
watchdogd.te
webview_zygote.te Move webview_zygote policy to private 2017-01-27 17:01:43 +00:00
wificond.te Allow wificond to find permission 2017-04-04 16:52:25 -07:00
zygote.te Move zygote policy to private 2017-01-26 13:31:16 -08:00