platform_system_sepolicy/public
Pavel Maltsev 8d7f503336 Allow to use sockets from hal server for auto
Add an exemption to neverallow rule to use sockets from HAL servers only
for automotive build

Bug: 78901167
Test: assign this attribute to hal_vehicle_default and try to open
socket from HAL implementation
Test: verify that new CTS test will fail for non-automotive build with
this attribute buing used
Test: make cts && cts-tradefed run singleCommand cts --skip-device-info
 --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases
 -t android.security.cts.SELinuxHostTest

Merged-In: I27976443dad4fc5b7425c089512cac65bb54d6d9

(cherry picked from commit 4cafae77a4)

Change-Id: I58e25a0f86579073aa568379b10b6599212134c6
2018-05-15 14:38:00 -07:00
..
adbd.te Moving adbd from rootdir to system/bin 2017-08-28 17:38:13 +08:00
app.te Put in sepolicies for Codec2.0 services 2018-05-04 21:36:41 +00:00
asan_extract.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
attributes Allow to use sockets from hal server for auto 2018-05-15 14:38:00 -07:00
audioserver.te
blkid.te
blkid_untrusted.te
bluetooth.te
bootanim.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
bootstat.te Remove bootstat access to proc label. 2017-09-18 10:29:24 -07:00
bufferhubd.te
cameraserver.te Add shell:fifo_file permission for cameraserver 2018-02-28 16:12:40 -08:00
charger.te charger: allow to read /sys/class/power_supply 2018-01-18 16:46:17 -08:00
clatd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
cppreopts.te Grant cppreopts.sh permissions to cleanup if it fails 2017-08-23 16:00:23 +00:00
crash_dump.te Widen crash_dump dontaudit. 2018-04-10 09:55:11 -07:00
device.te Add secure_element_device 2018-03-07 16:37:24 +00:00
dex2oat.te Reland "Allow dexopt to follow /odm/lib(64) symlinks."" 2018-04-02 10:43:22 +09:00
dhcp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
display_service_server.te Add fwk_display_hwservice. 2017-05-17 11:00:28 -07:00
dnsmasq.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
domain.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
drmserver.te
dumpstate.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
e2fs.te Allow vendor_init and e2fs to enable metadata encryption 2018-02-01 13:25:34 -08:00
ephemeral_app.te
file.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
fingerprintd.te Remove fingerprintd access to sysfs_type and cgroup label. 2017-09-19 17:12:14 -07:00
fsck.te Allow access to the metadata partition for metadata encryption. 2018-01-19 14:45:08 -08:00
fsck_untrusted.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
gatekeeperd.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
global_macros sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_allocator.te
hal_audio.te Whitelist vendor-init-settable bluetooth_prop and wifi_prop 2018-04-13 09:25:06 +09:00
hal_audiocontrol.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hal_authsecret.te authsecret HAL policies. 2018-02-05 11:19:46 +00:00
hal_bluetooth.te Whitelist vendor-init-settable bluetooth_prop and wifi_prop 2018-04-13 09:25:06 +09:00
hal_bootctl.te Hide sys_rawio SELinux denials. 2018-04-10 14:23:25 -07:00
hal_broadcastradio.te Move Broadcast Radio HAL to a separate binary. 2017-09-15 10:16:48 -07:00
hal_camera.te hal_camera: Allow writing dump info into pipes 2018-02-26 14:53:39 -08:00
hal_cas.te Fix CTS regressions 2017-11-22 04:54:41 +00:00
hal_configstore.te Add exFAT support; unify behind "sdcard_type". 2018-04-13 14:08:10 -06:00
hal_confirmationui.te Added default policy for Confirmation UI HAL 2018-01-24 10:22:40 -08:00
hal_contexthub.te
hal_drm.te Fix CTS regressions 2017-11-22 04:54:41 +00:00
hal_dumpstate.te
hal_evs.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hal_fingerprint.te Move platform/vendor data violations to device policy 2017-11-20 17:18:56 +00:00
hal_gatekeeper.te
hal_gnss.te
hal_graphics_allocator.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_graphics_composer.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_health.te hal_health: allow to write kernel logs. 2018-04-06 10:24:48 -07:00
hal_ir.te
hal_keymaster.te
hal_light.te
hal_lowpan.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
hal_memtrack.te
hal_neuralnetworks.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_neverallows.te Allow to use sockets from hal server for auto 2018-05-15 14:38:00 -07:00
hal_nfc.te Move platform/vendor data violations to device policy 2017-11-20 17:18:56 +00:00
hal_oemlock.te Add missing sepolicies for OemLock HAL. 2017-05-31 15:22:05 +01:00
hal_power.te
hal_secure_element.te SE Policy for Secure Element app and Secure Element HAL 2018-01-29 21:31:42 +00:00
hal_sensors.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_telephony.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
hal_tetheroffload.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
hal_thermal.te
hal_tv_cec.te
hal_tv_input.te
hal_usb.te Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid" 2018-01-08 13:09:34 -08:00
hal_usb_gadget.te Grant create_file_perms to hal_usb_gadget_server 2018-01-25 00:25:50 +00:00
hal_vehicle.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hal_vibrator.te Allow hal_vibrator access to sysfs_vibrator files. 2018-03-01 14:30:52 +00:00
hal_vr.te
hal_weaver.te Add missing sepolicies for the Weaver HAL. 2017-05-31 15:17:11 +01:00
hal_wifi.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
hal_wifi_hostapd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
hal_wifi_offload.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
hal_wifi_supplicant.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
healthd.te Fix aosp healthd. 2018-03-27 15:18:30 -07:00
hwservice.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hwservicemanager.te
idmap.te Suppress denials from idmap reading installd's files. 2018-01-25 10:07:19 -08:00
incident.te
incident_helper.te Selinux permissions for incidentd project 2018-01-23 19:08:49 +00:00
incidentd.te
init.te init: support /dev/input 2018-05-07 14:28:24 +00:00
inputflinger.te
install_recovery.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
installd.te Installd doesn't need to create cgroup files. 2018-04-09 13:49:13 +01:00
ioctl_defines Fix TIOCSCTTY ioctl definition for mips 2017-08-31 18:16:46 +02:00
ioctl_macros
isolated_app.te
kernel.te Add label for kernel test files and executables 2018-02-22 12:55:30 -08:00
keystore.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
llkd.te llkd: add live-lock daemon 2018-05-10 17:19:16 +00:00
lmkd.te Selinux: Give lmkd read access to /proc/meminfo 2018-04-13 21:35:52 +00:00
logd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
logpersist.te
mdnsd.te
mediacodec.te Put in sepolicies for Codec2.0 services 2018-05-04 21:36:41 +00:00
mediadrmserver.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediaextractor.te Allow sdcardfs:file read access on mediaextractor 2018-05-01 14:03:55 -07:00
mediametrics.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediaprovider.te Split mediaprovider from priv_app. 2017-07-10 11:17:18 -07:00
mediaserver.te Allow mediaserver to access vendor_app_file 2018-04-25 06:00:59 +00:00
modprobe.te modprobe: shouldn't load kernel modules from /system 2018-03-20 14:17:28 -07:00
mtp.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
net.te
netd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
netutils_wrapper.te
neverallow_macros
nfc.te
otapreopt_chroot.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
otapreopt_slot.te
performanced.te Suppress noisy performanced denials in permissive mode. 2018-02-27 10:42:12 +00:00
perfprofd.te Selinux: Fix perfprofd policy 2018-04-02 08:10:09 -07:00
platform_app.te
postinstall.te
postinstall_dexopt.te Sepolicy: Modify postinstall_dexopt 2018-04-30 09:52:54 -07:00
ppp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
preopt2cachename.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
priv_app.te
profman.te Allow profman to resolve symlinks on dirs 2018-04-30 17:38:15 -07:00
property.te FrameworksServicesTests: allow access to test.sys.boot.reason property 2018-05-04 07:33:56 -07:00
property_contexts Allow vendor-init-settable for properties used in Android TV 2018-04-30 08:49:57 +09:00
racoon.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
radio.te Allow vendor-init-settable to persist.radio.multisim.config 2018-03-27 13:41:47 +09:00
recovery.te Whitelist exported platform properties 2018-01-10 16:15:25 +00:00
recovery_persist.te
recovery_refresh.te
roles
runas.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
sdcardd.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
secure_element.te SE Policy for Secure Element app and Secure Element HAL 2018-01-29 21:31:42 +00:00
service.te Added SELinux policy for BinderCallsStatsService 2018-03-20 21:51:17 +00:00
servicemanager.te Prevent vendor_init from using binder or sockets 2018-02-09 19:32:59 +00:00
sgdisk.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
shared_relro.te Allow shared_relro to connect to activity_service. 2017-07-24 17:38:40 -04:00
shell.te Allow system server to write profile snapshots in /data/misc/profman 2018-05-09 14:42:59 -07:00
slideshow.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
su.te sepolicy(hostapd): Add a HIDL interface for hostapd 2018-05-04 21:36:24 +00:00
surfaceflinger.te
system_app.te
system_server.te
te_macros Enforce parent hal attribute hierarchy. 2018-04-26 20:52:21 +00:00
tee.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
thermalserviced.te PowerUI access to thermalservice 2017-10-14 01:05:58 +00:00
tombstoned.te tombstoned: allow linking tombstones. 2018-04-18 18:41:21 -07:00
toolbox.te
traced_probes.te Make traced_probes mlstrustedsubject. 2018-04-17 18:12:28 +00:00
traceur_app.te Enable Traceur on user builds. 2018-02-02 12:46:36 -08:00
tzdatacheck.te
ueventd.te Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid" 2018-01-08 13:09:34 -08:00
uncrypt.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
untrusted_app.te Add untrusted_app_27 2018-04-03 12:25:51 -07:00
untrusted_v2_app.te
update_engine.te Hide sys_rawio SELinux denials. 2018-04-10 14:23:25 -07:00
update_engine_common.te Make /proc/sys/kernel/random available to everyone 2017-11-20 21:02:21 +00:00
update_verifier.te Create sysfs_dm label. 2017-10-10 14:42:24 -07:00
usbd.te usbd sepolicy 2018-01-20 03:41:21 +00:00
vdc.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
vendor_init.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
vendor_shell.te Allow shell to start vendor shell 2018-01-16 18:28:51 +00:00
vendor_toolbox.te Allow init to run vendor toybox for modprobe 2017-05-24 15:01:20 -07:00
virtual_touchpad.te
vndservice.te
vndservicemanager.te
vold.te Allow vendor_init to getattr vold_metadata_file. 2018-05-15 08:03:41 -07:00
vold_prepare_subdirs.te Move most of public/vold_prepare_subdirs.te to private 2017-10-25 13:06:25 -07:00
vr_hwc.te
watchdogd.te
webview_zygote.te
wificond.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
wpantund.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
zygote.te