platform_system_sepolicy/private
Henrik Baard 8c94186ca5 app_zygote need access to oem partition
app_zygote used by for example Google Chrome needs access
to at least search /oem partition.

Google chrome version: 76.0.3809.132 is running in app_zygote
and the following access is blocked by selinux causing Chrome
to hang.

avc:  denied  { search } for  pid=813 comm="d.chrome_zygote"
name="/" dev="sda42" ino=2 scontext=u:r:app_zygote:s0:c214,c256,c512,c768
tcontext=u:object_r:oemfs:s0 tclass=dir permissive=0 ppid=798
pcomm="d.chrome_zygote" pgid=798 pgcomm="d.chrome_zygote"

Change-Id: Idcce1a5ad1a8be3d7bd057c12ec477baa9669235
2019-09-11 13:31:12 +02:00
..
compat Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
access_vectors update sepolicy for fs notification hooks 2019-08-27 15:31:59 -07:00
adbd.te Allow adb forward to traced consumer socket 2019-09-05 10:12:47 +00:00
apex_test_prepostinstall.te Sepolicy: Initial Apexd pre-/postinstall rules 2019-01-24 15:06:17 -08:00
apexd.te Allow apexd to stop itself 2019-06-13 09:45:05 +09:00
app.te revert ipmemorystore selinux policy. 2019-04-01 16:37:25 +09:00
app_neverallows.te Access to HALs from untrusted apps is blacklist-based 2019-09-06 14:10:38 +09:00
app_zygote.te app_zygote need access to oem partition 2019-09-11 13:31:12 +02:00
art_apex_boot_integrity.te Sepolicy: Allow everyone to search keyrings 2019-03-14 13:21:07 -07:00
art_apex_postinstall.te Sepolicy: Fix comment on apexd:fd use 2019-03-15 11:26:05 -07:00
art_apex_preinstall.te Sepolicy: Fix comment on apexd:fd use 2019-03-15 11:26:05 -07:00
asan_extract.te
ashmemd.te sepolicy for ashmemd 2019-02-05 21:38:14 +00:00
atrace.te atrace: allow tracing of vibrator hal 2019-06-17 12:25:05 +09:00
audioserver.te Add rules for accessing the related bluetooth_audio_hal_prop am: e55a74bdff am: dd367bd058 2019-03-20 01:53:39 -07:00
auditctl.te Add policy for /system/bin/auditctl 2019-04-09 20:55:30 -07:00
binder_in_vendor_violators.te
binderservicedomain.te
blank_screen.te Introduce system_file_type 2018-09-27 12:52:09 -07:00
blkid.te Introduce system_file_type 2018-09-27 12:52:09 -07:00
blkid_untrusted.te
bluetooth.te Add rules for accessing the related bluetooth_audio_hal_prop 2019-03-20 03:12:25 +00:00
bluetoothdomain.te
bootanim.te Dontaudit denials caused by race with labeling. 2018-02-14 17:07:13 -08:00
bootstat.te
boringssl_self_test.te Tweak boringssl_self_test.te 2019-09-07 16:52:15 -07:00
bpfloader.te selinux - netd - tighten down bpf policy 2019-05-10 05:52:30 +00:00
bufferhubd.te Remove unused bufferhub sepolicy 2018-12-10 13:36:11 -08:00
bug_map Revert "Track usbd SELinux denial." 2019-07-14 21:05:41 -07:00
cameraserver.te Abstract use of cameraserver behind an attribute 2019-03-01 14:02:59 -08:00
charger.te
clatd.te sepolicy - move public clatd to private 2019-05-11 17:47:25 -07:00
coredomain.te Remove perfprofd references. 2019-07-19 11:15:12 -07:00
cppreopts.te Sepolicy: Clean up moved files 2019-02-22 08:36:41 -08:00
crash_dump.te crash_dump: suppress devpts denials 2019-03-19 04:05:51 +00:00
dex2oat.te Allow otapreopt_chroot to use a flattened Runtime APEX package. 2019-03-19 14:44:22 +00:00
dexoptanalyzer.te Allow dexoptanalyzer to mmap files with Linux 4.14+ that it can already access. 2019-08-16 20:02:32 +01:00
dhcp.te
dnsmasq.te
domain.te Merge "SEPolicy for boringssl_self_test." 2019-09-07 23:46:00 +00:00
drmserver.te
dumpstate.te Give dumpstate access to run lpdump. 2019-09-09 17:33:20 -07:00
ephemeral_app.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
fastbootd.te Add sepolicy for fastbootd 2018-08-15 08:45:22 -07:00
file.te Add linker config generator and output file to sepolicy 2019-07-12 12:32:19 +09:00
file_contexts Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
file_contexts_asan fix data/asan/product/lib(64) can't access by platform_app issue 2019-07-19 03:23:47 +00:00
file_contexts_overlayfs fs_mgr: add /mnt/scratch to possible overlayfs support directories 2018-10-08 14:23:01 +00:00
fingerprintd.te
flags_health_check.te sepolicy for server configurable flags 2018-11-01 03:28:56 +00:00
fs_use fs_mgr: add overlayfs handling for squashfs system filesystems 2018-08-08 07:33:10 -07:00
fsck.te Allow access to the metadata partition for metadata encryption. 2018-01-19 14:45:08 -08:00
fsck_untrusted.te
fsverity_init.te sepolicy: dontaudit cap_sys_admin on userdebug/eng 2019-08-29 09:39:31 -07:00
fwk_bufferhub.te Allow bufferhub service to allocate buffer 2018-11-07 13:57:55 -08:00
gatekeeperd.te
genfs_contexts Allow Traceur to record the suspend_resume trace event 2019-08-09 10:56:15 -07:00
gpuservice.te Allow dumpstate to dumpsys gpu 2019-05-09 23:15:49 -07:00
gsid.te Allow gsid to create and access loop devices. 2019-07-11 16:36:25 -07:00
hal_allocator_default.te sepolicy for ashmemd 2019-02-05 21:38:14 +00:00
halclientdomain.te
halserverdomain.te
healthd.te
heapprofd.te Relabel /proc/kpageflags and grant access to heapprofd. 2019-05-20 20:18:10 +01:00
hwservice_contexts Tuner Hal 1.0 Enable ITuner service 2019-08-14 11:22:09 -07:00
hwservicemanager.te Finer grained permissions for ctl. properties 2018-05-22 13:47:16 -07:00
idmap.te Add idmap2 and idmap2d 2018-11-15 14:42:10 +00:00
incident.te Introduce system_file_type 2018-09-27 12:52:09 -07:00
incident_helper.te Allow dumpstate to dump incidentd 2018-12-04 15:42:56 -08:00
incidentd.te Add rules to dump hal traces 2019-06-20 00:31:03 +00:00
init.te Move /sbin/charger to /system/bin/charger. 2019-03-14 09:44:03 -07:00
initial_sid_contexts
initial_sids
inputflinger.te
install_recovery.te
installd.te Merge "Move layout_version to /data/misc/installd" 2019-08-28 13:35:17 -07:00
iorapd.te iorapd: add tmpfs type 2019-01-26 12:55:13 -08:00
isolated_app.te Allow global read access to /sys/kernel/mm/transparent_hugepage/ 2019-03-13 23:47:25 +00:00
iw.te Allow iw to be run at init phase. 2018-11-14 19:10:12 +00:00
kernel.te Sepolicy: Move otapreopt_chroot to private 2019-03-18 10:54:42 -07:00
keys.conf Add MAINLINE_SEPOLICY_DEV_CERTIFICATES to keys.conf 2019-08-07 18:23:47 +09:00
keystore.te Allow Keystore to check security logging property. 2018-01-24 19:49:18 +00:00
linkerconfig.te Enable Kernel log from linkerconfig 2019-07-23 13:42:55 +09:00
llkd.te Add policy for apexd. 2018-10-04 07:06:45 +00:00
lmkd.te
logd.te sepolicy: Permission changes for new wifi mainline module 2019-07-16 13:30:15 -07:00
logpersist.te Allow dumpstate to read /data/misc/logd always 2019-07-08 13:20:10 -07:00
lpdumpd.te super_block_device -> super_block_device_type 2019-03-28 18:08:19 +00:00
mac_permissions.xml sepolicy change for NetworkStack signature 2019-02-14 07:58:13 +09:00
mdnsd.te Introduce system_file_type 2018-09-27 12:52:09 -07:00
mediadrmserver.te
mediaextractor.te Initial selinux policy support for memfd 2019-01-30 19:11:49 +00:00
mediametrics.te
mediaprovider.te Allow MediaProvider to host FUSE devices. 2019-08-07 19:00:15 +01:00
mediaserver.te Properly define hal_codec2 and related policies 2019-05-23 03:53:47 -07:00
mediaswcodec.te add mediaswcodec service 2018-10-11 15:10:17 -07:00
migrate_legacy_obb_data.te sepolicy: Adjust policy for migrate_legacy_obb_data.sh 2019-07-16 02:55:25 +00:00
mls Initial selinux policy support for memfd 2019-01-30 19:11:49 +00:00
mls_decl
mls_macros
modprobe.te
mtp.te
netd.te sepolicy - move public clatd to private 2019-05-11 17:47:25 -07:00
netutils_wrapper.te Sepolicy for netutils_wrapper to use binder call 2019-04-26 02:46:39 +00:00
network_stack.te Allow the netowrk stack to access its own data files. 2019-03-19 11:42:11 +09:00
nfc.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
notify_traceur.te Allow the init process to execute the notify_traceur.sh script 2019-02-07 00:28:40 +00:00
otapreopt_chroot.te Sepolicy: Allow otapreopt to mount logical partitions 2019-03-22 12:13:05 -07:00
otapreopt_slot.te Sepolicy: Clean up moved files 2019-02-22 08:36:41 -08:00
perfetto.te Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
performanced.te
platform_app.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
policy_capabilities Add nnp_nosuid_transition policycap and related class/perm definitions. 2018-09-07 10:52:31 -07:00
port_contexts
postinstall.te
postinstall_dexopt.te Sepolicy: Allow otapreopt access to vendor overlay files 2019-03-22 12:13:53 -07:00
ppp.te
preloads_copy.te Add sepolicy for preloads_copy script 2018-10-23 17:11:36 +01:00
preopt2cachename.te Sepolicy: Clean up moved files 2019-02-22 08:36:41 -08:00
priv_app.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
profman.te
property_contexts Define sepolicy with property for linker 2019-08-14 12:35:15 +09:00
racoon.te
radio.te Add uce service to core policy. 2019-08-19 12:42:56 -07:00
recovery.te
recovery_persist.te In native coverage builds, allow all domains to access /data/misc/trace 2019-06-19 16:27:17 -07:00
recovery_refresh.te In native coverage builds, allow all domains to access /data/misc/trace 2019-06-19 16:27:17 -07:00
roles_decl
rs.te rs.te: Allow ephemeral_app FD use 2019-04-02 13:59:39 -07:00
rss_hwm_reset.te SELinux policy for rss_hwm_reset 2018-12-15 10:13:03 +00:00
runas.te
runas_app.te allow runas_app untrusted_app_all:unix_stream_socket connectto 2019-02-08 11:35:50 -08:00
sdcardd.te
seapp_contexts sepolicy: Permission changes for new wifi mainline module 2019-07-16 13:30:15 -07:00
secure_element.te SE Policy for Secure Element app and Secure Element HAL 2018-01-29 21:31:42 +00:00
security_classes Update access_vectors 2018-11-01 19:53:50 -07:00
service.te Add uce service to core policy. 2019-08-19 12:42:56 -07:00
service_contexts Merge "Remove mediacodec_service." 2019-08-26 21:32:47 +00:00
servicemanager.te Allow servicemanager to start processes 2019-08-02 00:23:16 +00:00
sgdisk.te
shared_relro.te
shell.te Define sepolicy with property for linker 2019-08-14 12:35:15 +09:00
simpleperf_app_runner.te Add sepolicy for simpleperf_app_runner. 2019-01-23 23:23:09 +00:00
slideshow.te
stats.te Allowing sysui to access statsd. 2019-02-11 14:09:42 -08:00
statsd.te Allows StatsCompanionService to pipe data to statsd. 2019-05-23 20:35:34 +00:00
storaged.te Relabel /data/system/packages.list to new type. 2019-03-28 10:27:43 +00:00
su.te SELinux policies for Perfetto cmdline client (/system/bin/perfetto) 2018-01-29 11:06:00 +00:00
surfaceflinger.te Merge "Give surfaceflinger permission to write perfetto traces" 2019-07-09 14:36:15 -07:00
system_app.te system_app: neverallow /data/local/tmp access 2019-09-05 09:24:41 -07:00
system_server.te Merge "Remove mediacodec_service." 2019-08-26 21:32:47 +00:00
system_server_startup.te system_server_startup: allow SIGCHLD to zygote 2019-06-14 16:56:05 -07:00
system_suspend.te system_suspend: remove /sys/power/wake_lock permissions 2019-07-26 11:13:05 -07:00
technical_debt.cil Properly define hal_codec2 and related policies 2019-05-23 03:53:47 -07:00
tombstoned.te
toolbox.te
traced.te Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
traced_probes.te Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
traceur_app.te Allow the Traceur app to start Perfetto. 2018-12-10 18:51:29 -08:00
tzdatacheck.te
ueventd.te
uncrypt.te
untrusted_app.te Add untrusted_app_27 2018-04-03 12:25:51 -07:00
untrusted_app_25.te Deprecate /mnt/sdcard -> /storage/self/primary symlink. 2019-04-12 03:15:52 +00:00
untrusted_app_27.te Deprecate /mnt/sdcard -> /storage/self/primary symlink. 2019-04-12 03:15:52 +00:00
untrusted_app_all.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
update_engine.te
update_engine_common.te
update_verifier.te
usbd.te usbd sepolicy 2018-01-20 03:41:21 +00:00
users
vdc.te
vendor_init.te Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
viewcompiler.te Give map permission to viewcompiler 2019-08-27 10:43:55 -07:00
virtual_touchpad.te
vold.te Abolish calls to shell in vold 2018-11-30 16:02:04 -08:00
vold_prepare_subdirs.te sepolicy: Permission changes for new wifi mainline module 2019-07-16 13:30:15 -07:00
vr_hwc.te
wait_for_keymaster.te Introduce system_file_type 2018-09-27 12:52:09 -07:00
watchdogd.te Move watchdogd out of init and into its own domain 2018-08-03 19:28:05 +00:00
webview_zygote.te Allow webview_zygote to read the /data/user/0 symlink. 2019-04-12 11:35:43 -04:00
wifi_stack.te sepolicy: Permission changes for new wifi mainline module 2019-07-16 13:30:15 -07:00
wificond.te
wpantund.te
zygote.te Allow zygote to create fds and map executable. 2019-06-17 20:18:23 +01:00