..
adbd.te
Moving adbd from rootdir to system/bin
2017-08-28 17:38:13 +08:00
asan_extract.te
Sepolicy: Add ASAN-Extract
2017-04-05 13:09:29 -07:00
attributes
Move Broadcast Radio HAL to a separate binary.
2017-09-15 10:16:48 -07:00
audioserver.te
Move audioserver policy to private
2017-02-07 10:47:18 -08:00
blkid.te
Move blkid policy to private
2017-02-07 23:57:53 +00:00
blkid_untrusted.te
Move blkid policy to private
2017-02-07 23:57:53 +00:00
bluetooth.te
Move bluetooth policy to private
2017-02-06 15:29:10 -08:00
bootanim.te
Remove bootanim access to sysfs and cgroup label.
2017-09-19 10:55:54 -07:00
bootstat.te
Remove bootstat access to proc label.
2017-09-18 10:29:24 -07:00
bufferhubd.te
SELinux policies for PDX services
2017-05-15 10:07:05 -07:00
cameraserver.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
charger.te
healthd: create SEPolicy for 'charger' and reduce healthd's scope
2016-12-15 18:17:13 -08:00
clatd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
cppreopts.te
Grant cppreopts.sh permissions to cleanup if it fails
2017-08-23 16:00:23 +00:00
crash_dump.te
Add /dev/kmsg_debug.
2017-08-11 22:54:15 +00:00
device.te
Add /dev/kmsg_debug.
2017-08-11 13:25:43 -07:00
dex2oat.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
dhcp.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
display_service_server.te
Add fwk_display_hwservice.
2017-05-17 11:00:28 -07:00
dnsmasq.te
domain.te
Allow sepolicies granting bootanim exec on /oem.
2017-08-29 16:58:20 +00:00
drmserver.te
No access to tee domain over Unix domain sockets
2017-04-03 11:26:01 -07:00
dumpstate.te
Revert "Add screencap domain."
2017-09-05 10:08:09 -07:00
e2fs.te
allow init to run mke2fs tools to format partitions
2017-09-11 18:34:10 +00:00
ephemeral_app.te
Move ephemeral_app policy to private
2017-01-09 15:34:27 -08:00
file.te
Explicitly label logd's dependencies in /proc.
2017-09-14 15:09:33 -07:00
fingerprintd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
fsck.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
fsck_untrusted.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
gatekeeperd.te
Fix sepolicy for Gatekeeper HAL
2017-03-20 07:39:33 -07:00
global_macros
sepolicy: Define and allow map permission
2017-07-10 16:31:23 -04:00
hal_allocator.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_audio.te
hal_audio: Allow writing dump info into pipes when capturing BR am: 9686cbcdbf
am: 4aac6fdbac
2017-05-08 18:38:52 +00:00
hal_bluetooth.te
Grant CAP_SYS_NICE to processes that need it.
2017-05-09 09:53:46 -07:00
hal_bootctl.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_broadcastradio.te
Move Broadcast Radio HAL to a separate binary.
2017-09-15 10:16:48 -07:00
hal_camera.te
hal_camera: remove video_device restriction
2017-05-16 09:42:09 -07:00
hal_configstore.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_contexthub.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_drm.te
Merge "Allow DRM hal to access fd allocated by mediaserver" into oc-dev
2017-04-25 23:54:48 +00:00
hal_dumpstate.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_fingerprint.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_gatekeeper.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_gnss.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_graphics_allocator.te
Grant CAP_SYS_NICE to processes that need it.
2017-05-09 09:53:46 -07:00
hal_graphics_composer.te
Fix graphics composer denial.
2017-05-19 14:14:35 -07:00
hal_health.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_ir.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_keymaster.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_light.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_memtrack.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_neverallows.te
Add another extraneous neverallow rule to force attribute inclusion
2017-06-26 10:32:18 -07:00
hal_nfc.te
Remove access to sock_file for hal_nfc
2017-04-27 09:05:27 -07:00
hal_oemlock.te
Add missing sepolicies for OemLock HAL.
2017-05-31 15:22:05 +01:00
hal_power.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_sensors.te
Grant CAP_SYS_NICE to processes that need it.
2017-05-09 09:53:46 -07:00
hal_telephony.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_tetheroffload.te
SE Policy for Tether Offload HAL
2017-05-23 23:00:23 +00:00
hal_thermal.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_tv_cec.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_tv_input.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_usb.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_vibrator.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_vr.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hal_weaver.te
Add missing sepolicies for the Weaver HAL.
2017-05-31 15:17:11 +01:00
hal_wifi.te
Merge "Add sepolicy for hal_wifi to access /proc/modules" am: 6acd70b918
2017-06-22 15:45:20 +00:00
hal_wifi_offload.te
SE Policy for Wifi Offload HAL
2017-05-18 09:49:55 -07:00
hal_wifi_supplicant.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
healthd.te
Restrict access to hwservicemanager
2017-04-21 09:54:53 -07:00
hwservice.te
Move Broadcast Radio HAL to a separate binary.
2017-09-15 10:16:48 -07:00
hwservicemanager.te
Add hwservice_contexts and support for querying it.
2017-04-12 18:07:12 -07:00
idmap.te
sepolicy: restrict /vendor/overlay from most coredomains
2017-04-06 13:28:16 -07:00
incident.te
Add incident command and incidentd daemon se policy.
2017-02-07 15:52:07 -08:00
incidentd.te
Add incident command and incidentd daemon se policy.
2017-02-07 15:52:07 -08:00
init.te
Allow init to relabelto to misc_block_device.
2017-09-06 14:32:10 -07:00
inputflinger.te
te_macros: introduce add_service() macro
2017-01-26 04:43:16 +00:00
install_recovery.te
Fix build time warning
2017-04-21 09:42:50 -07:00
installd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
ioctl_defines
Fix TIOCSCTTY ioctl definition for mips
2017-08-31 18:16:46 +02:00
ioctl_macros
isolated_app.te
Move isolated_app policy to private
2017-01-05 16:06:54 -08:00
kernel.te
Merge "Add drm and kernel permissions to mediaprovider" am: 224b4eace9
am: 34b7684401
2017-04-26 21:27:39 +00:00
keystore.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
lmkd.te
Allow lmkd read memcg stats.
2017-08-30 14:02:38 -07:00
logd.te
Explicitly label logd's dependencies in /proc.
2017-09-14 15:09:33 -07:00
logpersist.te
logpersist: do not permit dynamic transition to domain
2016-12-29 09:29:36 -08:00
mdnsd.te
Move mdnsd policy to private
2017-02-06 15:02:32 -08:00
mediacodec.te
SELinux policies for PDX services
2017-05-15 10:07:05 -07:00
mediadrmserver.te
grant mediadrmserver permission to read dir from /system/*
2017-04-19 17:58:27 +00:00
mediaextractor.te
MediaExtractor: Allow reading of app data files.
2017-05-24 14:18:38 -07:00
mediametrics.te
allow media.metrics to write to file descriptor in /data
2017-04-04 10:30:50 -07:00
mediaprovider.te
Split mediaprovider as a separate domain from priv_app
2017-04-17 15:30:35 -07:00
mediaserver.te
Allow mediaserver to access fd allocated by hal_graphics_composer
2017-04-28 17:55:20 -07:00
modprobe.te
Fix coredomain violation for modprobe
2017-06-05 08:09:18 -07:00
mtp.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
net.te
Move netdomain policy to private
2017-02-06 15:02:00 -08:00
netd.te
Merge "netd: relax binder neverallow rules for hwservices"
2017-07-27 19:38:15 +00:00
netutils_wrapper.te
add netutils_wrappers
2017-04-14 22:57:27 -07:00
neverallow_macros
Ban socket connections between core and vendor
2017-03-27 08:49:13 -07:00
nfc.te
Remove unnecessary rules from NFC HAL clients
2017-03-22 16:22:33 -07:00
otapreopt_chroot.te
otapreopt_slot.te
Sepolicy: Give otapreopt_slot read on A/B artifact links
2017-04-07 20:19:41 -07:00
performanced.te
SELinux policies for PDX services
2017-05-15 10:07:05 -07:00
perfprofd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
platform_app.te
Move platform_app policy to private
2017-01-09 14:52:59 -08:00
postinstall.te
postinstall_dexopt.te
Sepolicy: Fix new access from the linker for postinstall
2017-04-28 17:34:41 -07:00
ppp.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
preopt2cachename.te
priv_app.te
Move priv_app policy to private
2017-01-05 15:44:32 -08:00
profman.te
Allow profman to analyze profiles for the secondary dex files
2017-03-15 18:47:13 -07:00
property.te
Switch /data/misc/reboot/last_reboot_reason to persistent property
2017-08-24 15:19:30 -07:00
racoon.te
restore permissions to /vendor for non-treble devices
2017-04-14 10:01:14 -07:00
radio.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
recovery.te
Switch /data/misc/reboot/last_reboot_reason to persistent property
2017-08-24 15:19:30 -07:00
recovery_persist.te
recovery_refresh.te
rild.te
Remove rild access to proc label.
2017-09-18 16:16:01 -07:00
roles
runas.te
Selinux: Give runas permission to read system_data_file links
2017-09-20 21:34:55 -07:00
sdcardd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
service.te
Merge "Add SEPolicy for new Java-based Broadcast Radio service."
2017-07-03 02:46:45 +00:00
servicemanager.te
Assert ban on framework <-> vendor comms over VndBinder
2017-04-25 14:15:52 -07:00
sgdisk.te
shared_relro.te
Allow shared_relro to connect to activity_service.
2017-07-24 17:38:40 -04:00
shell.te
Switch /data/misc/reboot/last_reboot_reason to persistent property
2017-08-24 15:19:30 -07:00
slideshow.te
su.te
Make sure all public types are defined regardless of build variants
2017-07-24 07:27:01 -07:00
surfaceflinger.te
Move surfaceflinger policy to private
2017-02-07 10:06:12 -08:00
system_app.te
Move system_app policy to private
2017-01-05 17:20:28 -08:00
system_server.te
Move system_server policy to private
2017-02-07 20:24:05 +00:00
te_macros
sepolicy: Define and allow map permission for vendor dir
2017-08-23 05:41:36 +00:00
tee.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
tombstoned.te
SEPolicy: Changes for new stack dumping scheme.
2017-05-31 10:01:48 +00:00
toolbox.te
tzdatacheck.te
Allow the shell user to run tzdatacheck
2017-04-20 09:31:36 +00:00
ueventd.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
uncrypt.te
domain_deprecated: remove sysfs rules
2017-07-27 20:03:16 +00:00
untrusted_app.te
Move untrusted_app policy to private
2017-01-05 14:39:52 -08:00
untrusted_app_25.te
untrusted_app: policy versioning based on targetSdkVersion
2017-02-14 13:30:12 -08:00
untrusted_v2_app.te
Add new untrusted_v2_app domain
2017-02-21 12:39:55 -08:00
update_engine.te
Move domain_deprecated into private policy
2017-07-24 07:39:54 -07:00
update_engine_common.te
domain_deprecated: remove sysfs rules
2017-07-27 20:03:16 +00:00
update_verifier.te
Allow update_verifier to write to kmsg
2017-08-16 13:09:56 -07:00
vdc.te
Grant vdc access to kmsg
2017-03-31 20:48:36 +00:00
vendor_shell.te
vendor_shell: add sepolicy for vendor shell
2017-04-14 09:38:51 -07:00
vendor_toolbox.te
Allow init to run vendor toybox for modprobe
2017-05-24 15:01:20 -07:00
virtual_touchpad.te
Allow vr_hwc and virtual_touchpad to query for permissions
2017-04-21 17:15:03 -04:00
vndservice.te
Add default label and mapping for vendor services
2017-04-28 14:56:57 -07:00
vndservicemanager.te
Initial sepolicy for vndservicemanager.
2017-03-23 00:20:43 +00:00
vold.te
Restrict functions for vold
2017-09-05 16:27:58 +02:00
vr_hwc.te
SELinux policies for PDX services
2017-05-10 16:39:19 -07:00
watchdogd.te
webview_zygote.te
Move webview_zygote policy to private
2017-01-27 17:01:43 +00:00
wificond.te
Allow wificond to find permission
2017-04-04 16:52:25 -07:00
zygote.te
Move zygote policy to private
2017-01-26 13:31:16 -08:00