No description
Find a file
2012-07-27 15:10:47 -04:00
access_vectors Add policy for property service. 2012-04-04 10:11:16 -04:00
adbd.te Allow adbd to access the qemu device and label /dev/eac correctly. 2012-04-03 15:30:28 -04:00
Android.mk Support for ocontexts per device. 2012-07-12 10:02:45 -04:00
app.te Platform app domain sdcard accesses 2012-07-27 15:10:47 -04:00
attributes Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. 2012-07-27 11:07:09 -04:00
bluetooth.te SE Android policy. 2012-01-04 12:33:27 -05:00
bluetoothd.te SE Android policy. 2012-01-04 12:33:27 -05:00
cts.te SE Android policy. 2012-01-04 12:33:27 -05:00
dbusd.te SE Android policy. 2012-01-04 12:33:27 -05:00
debuggerd.te Policy changes to support running the latest CTS. 2012-03-07 14:59:01 -05:00
device.te Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. 2012-07-19 16:11:24 -04:00
domain.te Policy changes to support running the latest CTS. 2012-03-07 14:59:01 -05:00
drmserver.te Policy changes to support running the latest CTS. 2012-03-07 14:59:01 -05:00
file.te Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. 2012-07-27 11:07:09 -04:00
file_contexts Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. 2012-07-19 16:11:24 -04:00
fs_use Support for ocontexts per device. 2012-07-12 10:02:45 -04:00
genfs_contexts Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. 2012-07-19 16:11:24 -04:00
global_macros Add key_socket class to socket_class_set macro. Allow system to trigger module auto-loading and to write to sockets created under /dev. 2012-06-28 14:28:24 -04:00
gpsd.te SE Android policy. 2012-01-04 12:33:27 -05:00
hci_attach.te Policy for hci_attach service. 2012-05-31 09:40:12 -04:00
init.te SE Android policy. 2012-01-04 12:33:27 -05:00
initial_sid_contexts Restore devnull initial sid context. 2012-07-12 10:14:38 -04:00
initial_sids SE Android policy. 2012-01-04 12:33:27 -05:00
installd.te external/sepolicy: install daemon unlink application data files 2012-07-24 08:59:27 -04:00
kernel.te SE Android policy. 2012-01-04 12:33:27 -05:00
keystore.te SE Android policy. 2012-01-04 12:33:27 -05:00
mediaserver.te external/sepolicy: mediaserver open application data files 2012-07-24 09:01:02 -04:00
mls Rewrite MLS constraints to only constrain open for app_data_file, not read/write. 2012-03-19 10:32:24 -04:00
mls_macros SE Android policy. 2012-01-04 12:33:27 -05:00
net.te SE Android policy. 2012-01-04 12:33:27 -05:00
netd.te Further policy for Motorola Xoom. 2012-01-06 10:25:53 -05:00
nfc.te Remove all denials caused by rild on tuna devices. 2012-06-07 11:52:51 -04:00
NOTICE Public domain notice 2012-06-19 07:29:55 -04:00
policy_capabilities SE Android policy. 2012-01-04 12:33:27 -05:00
port_contexts Support for ocontexts per device. 2012-07-12 10:02:45 -04:00
property.te Add policy for property service. 2012-04-04 10:11:16 -04:00
property_contexts Add persist.mac_enforcing_mode context 2012-06-28 10:51:25 -04:00
qemud.te SE Android policy. 2012-01-04 12:33:27 -05:00
radio.te Add policy for property service. 2012-04-04 10:11:16 -04:00
rild.te Corrected denials for LocationManager when accessing gps over uart. 2012-07-12 09:27:40 -04:00
roles Add explicit role declaration for newer checkpolicy versions. 2012-01-12 09:58:37 -05:00
sdcardd.te Address various denials introduced by JB/4.1. 2012-07-12 13:26:15 -04:00
seapp_contexts Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. 2012-07-27 11:07:09 -04:00
security_classes Add policy for property service. 2012-04-04 10:11:16 -04:00
selinux-network.sh Add selinux network script to policy 2012-06-21 09:19:43 -04:00
servicemanager.te SE Android policy. 2012-01-04 12:33:27 -05:00
shell.te Add policy for property service. 2012-04-04 10:11:16 -04:00
su.te SE Android policy. 2012-01-04 12:33:27 -05:00
surfaceflinger.te Address various denials introduced by JB/4.1. 2012-07-12 13:26:15 -04:00
system.te external/sepolicy: system r/w udp_socket of appdomain 2012-07-24 09:00:32 -04:00
te_macros Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. 2012-07-27 11:07:09 -04:00
ueventd.te Remove all denials caused by rild on tuna devices. 2012-06-07 11:52:51 -04:00
unconfined.te Add policy for property service. 2012-04-04 10:11:16 -04:00
users SE Android policy. 2012-01-04 12:33:27 -05:00
vold.te Address various denials introduced by JB/4.1. 2012-07-12 13:26:15 -04:00
wpa_supplicant.te SE Android policy. 2012-01-04 12:33:27 -05:00
zygote.te SE Android policy. 2012-01-04 12:33:27 -05:00