platform_system_sepolicy/private
Treehugger Robot 8d7fb4281c Merge "Create surfaceflinger_prop and migrate props" am: 15ac2abfd7 am: 895a086ff7
Change-Id: Id961ae39aaa54eadd1266cd883b425df5425f54f
2020-04-02 23:16:39 +00:00
..
compat Merge "Create surfaceflinger_prop and migrate props" am: 15ac2abfd7 am: 895a086ff7 2020-04-02 23:16:39 +00:00
access_vectors access_vectors: add lockdown class 2020-02-13 13:05:54 -08:00
adbd.te perfetto: minor quality of life tweaks 2020-03-24 21:39:41 +00:00
aidl_lazy_test_server.te Add aidl_lazy_test_server 2020-01-07 15:11:03 -08:00
apex_test_prepostinstall.te
apexd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
app.te Reduce graphics logspam 2020-04-02 13:43:26 +02:00
app_neverallows.te Allow mediaprovider_app access to /proc/filesystems. 2020-02-19 17:24:24 +01:00
app_zygote.te debug builds: allow perf profiling of most domains 2020-01-22 22:04:02 +00:00
art_apex_boot_integrity.te
art_apex_postinstall.te
art_apex_preinstall.te
asan_extract.te Move system property rules to private 2020-03-18 16:46:04 +00:00
atrace.te More neverallows for default_android_service. 2020-01-21 11:13:22 -08:00
attributes Add rules for hidl_lazy_test* 2020-03-24 18:34:58 -07:00
audioserver.te Allow audio_server to access soundtrigger_middleware service 2019-12-12 10:56:35 -08:00
auditctl.te
automotive_display_service.te Update automotive display service rules 2020-02-29 11:01:26 -08:00
binder_in_vendor_violators.te
binderservicedomain.te
blank_screen.te Allow blank_screen to make binder calls to the servicemanager 2020-04-02 18:40:11 +02:00
blkid.te
blkid_untrusted.te
bluetooth.te Support for more binder caches 2020-01-22 08:21:08 -08:00
bluetoothdomain.te
bootanim.te Reduce graphics logspam 2020-04-02 13:43:26 +02:00
bootstat.te Move system property rules to private 2020-03-18 16:46:04 +00:00
boringssl_self_test.te SEPolicy changes to allow vendor BoringSSL self test. 2019-10-01 14:14:36 +01:00
bpfloader.te cut down bpf related privileges 2020-02-22 11:28:36 +00:00
bufferhubd.te
bug_map Track another instance of b/77870037 2020-04-02 10:17:22 +02:00
cameraserver.te
charger.te Move system property rules to private 2020-03-18 16:46:04 +00:00
clatd.te
coredomain.te sepolicy: policies for iorap.inode2filename 2020-02-20 16:38:17 -08:00
cppreopts.te Ignore the denial when system_other is erased 2020-03-31 13:58:11 +08:00
crash_dump.te
credstore.te Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL. 2020-02-19 13:46:45 -05:00
derive_sdk.te Rename sdkext sepolicy to sdkextensions 2020-01-08 11:41:18 +00:00
dex2oat.te
dexoptanalyzer.te Allow dexoptanalyzer to mmap files with Linux 4.14+ that it can already access. 2019-09-13 13:45:40 +01:00
dhcp.te Move system property rules to private 2020-03-18 16:46:04 +00:00
dnsmasq.te
domain.te Rename exported2_config_prop to systemsound_config_prop 2020-04-01 18:23:39 +09:00
drmserver.te
dumpstate.te Move system property rules to private 2020-03-18 16:46:04 +00:00
ephemeral_app.te initial policy for traced_perf daemon (perf profiler) 2020-01-22 22:04:01 +00:00
fastbootd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
file.te Move linker config under /linkerconfig 2019-12-05 12:42:29 +09:00
file_contexts Merge "Update sepolicy to account for crash_dump move." 2020-03-30 19:03:42 +00:00
file_contexts_asan
file_contexts_overlayfs
fingerprintd.te
flags_health_check.te Move system property rules to private 2020-03-18 16:46:04 +00:00
fs_use private/fs_use: Enable selinux for virtiofs 2020-03-06 17:19:04 +09:00
fsck.te
fsck_untrusted.te
fsverity_init.te Merge "Revert "sepolicy: dontaudit cap_sys_admin on userdebug/eng"" 2019-11-21 22:27:37 +00:00
fwk_bufferhub.te
gatekeeperd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
genfs_contexts Allow Traceur record the mm_event trace event. 2020-03-30 16:23:32 -07:00
gmscore_app.te gmscore_app: suppress denials on /mnt 2020-03-11 16:20:07 +08:00
gpuservice.te GpuService binder call StatsManagerService 2020-02-06 11:54:33 -08:00
gsid.te Allow gsid to callback system server for oneway method 2020-03-04 18:23:08 +08:00
hal_allocator_default.te sepolicy: remove ashmemd 2019-09-27 17:43:53 +00:00
hal_lazy_test.te Add rules for hidl_lazy_test* 2020-03-24 18:34:58 -07:00
halclientdomain.te
halserverdomain.te
healthd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
heapprofd.te Allow Java domains to be Perfetto producers. 2019-10-10 10:40:26 +01:00
hidl_lazy_test_server.te Add rules for hidl_lazy_test* 2020-03-24 18:34:58 -07:00
hwservice.te Add rules for hidl_lazy_test* 2020-03-24 18:34:58 -07:00
hwservice_contexts Merge "Add rules for hidl_lazy_test*" am: 91acf22c62 am: 9e5db884fe 2020-03-25 18:06:44 +00:00
hwservicemanager.te Move system property rules to private 2020-03-18 16:46:04 +00:00
idmap.te
incident.te Allow dumpstate to call incident CLI 2019-08-21 16:10:39 -07:00
incident_helper.te
incidentd.te Allow incidentd to attach perfetto traces on user. 2020-04-01 10:41:14 +02:00
init.te Add userspace_reboot_log_prop 2020-02-07 01:57:55 +00:00
initial_sid_contexts
initial_sids
inputflinger.te
installd.te sepolicy: allow rules for apk verify system property 2019-12-03 10:09:35 -08:00
iorap_inode2filename.te sepolicy: policies for iorap.inode2filename 2020-02-20 16:38:17 -08:00
iorap_prefecherd.te sepolicy: Add iorap_prefetcherd rules 2019-10-22 12:45:46 -07:00
iorapd.te sepolicy: policies for iorap.inode2filename 2020-02-20 16:38:17 -08:00
isolated_app.te initial policy for traced_perf daemon (perf profiler) 2020-01-22 22:04:01 +00:00
iw.te
kernel.te
keys.conf Don't require seinfo for priv-apps 2019-11-06 08:37:03 -08:00
keystore.te sepolicy: Move wifi keystore HAL service to wificond 2019-10-28 14:06:17 -07:00
linkerconfig.te Update linkerconfig to generate APEX binary config 2020-01-20 13:40:08 +09:00
llkd.te llkd: requires sys_admin permissions 2020-01-15 08:08:59 -08:00
lmkd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
logd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
logpersist.te Allow incidentd to parse persisted log 2020-01-18 16:18:18 -08:00
lpdumpd.te binder_use: Allow servicemanager callbacks 2019-12-19 23:07:14 +00:00
mac_permissions.xml Don't require seinfo for priv-apps 2019-11-06 08:37:03 -08:00
mdnsd.te
mediadrmserver.te
mediaextractor.te Move system property rules to private 2020-03-18 16:46:04 +00:00
mediametrics.te
mediaprovider.te Merge "Revert "Allow MediaProvider to host FUSE devices."" 2020-01-10 21:17:15 +00:00
mediaprovider_app.te Grant MediaProvider access to /mnt/media_rw 2020-03-25 13:36:06 +00:00
mediaserver.te Move system property rules to private 2020-03-18 16:46:04 +00:00
mediaswcodec.te Move system property rules to private 2020-03-18 16:46:04 +00:00
mediatranscoding.te MediaTranscodingService: Add sepolicy for MediaTranscodingService. 2019-12-02 13:57:28 -08:00
migrate_legacy_obb_data.te
mls
mls_decl
mls_macros
modprobe.te
mtp.te
netd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
netutils_wrapper.te
network_stack.te Allow tethering find netork stack service 2019-12-12 12:54:57 +08:00
nfc.te Remove mediacodec_service. 2019-08-21 01:19:20 +00:00
notify_traceur.te
otapreopt_chroot.te
otapreopt_slot.te
perfetto.te Allow incidentd to attach perfetto traces on user. 2020-04-01 10:41:14 +02:00
performanced.te
permissioncontroller_app.te Don't run permissioncontroller_app in permissive mode 2020-01-06 09:41:22 -08:00
platform_app.te Make platform_compat discoverable everywhere 2020-02-06 12:11:37 +00:00
policy_capabilities
port_contexts
postinstall.te
postinstall_dexopt.te
ppp.te
preloads_copy.te Ignore the denial when system_other is erased 2020-03-31 13:58:11 +08:00
preopt2cachename.te
priv_app.te [selinux] permissions on new ioctls for filling blocks 2020-03-19 16:31:52 -07:00
profman.te
property.te Rename exported2_config_prop to systemsound_config_prop 2020-04-01 18:23:39 +09:00
property_contexts Merge "Create surfaceflinger_prop and migrate props" am: 15ac2abfd7 am: 895a086ff7 2020-04-02 23:16:39 +00:00
racoon.te
radio.te Merge "Allow radio to send pulled atoms to statsd." 2020-03-19 21:32:21 +00:00
recovery.te Move system property rules to private 2020-03-18 16:46:04 +00:00
recovery_persist.te
recovery_refresh.te
roles_decl
rs.te
rss_hwm_reset.te
runas.te
runas_app.te perf_event: rules for system and simpleperf domain 2020-01-15 16:56:41 +00:00
sdcardd.te
seapp_contexts Create new mediaprovider_app domain. 2020-02-04 16:53:18 +01:00
secure_element.te
security_classes access_vectors: add lockdown class 2020-02-13 13:05:54 -08:00
service.te system_server: create StatsManagerService 2019-12-16 11:50:16 -08:00
service_contexts [incremental] remove legacy service name from sepolicy 2020-03-20 17:16:38 -07:00
servicemanager.te
sgdisk.te
shared_relro.te
shell.te Move system property rules to private 2020-03-18 16:46:04 +00:00
simpleperf.te perf_event: rules for system and simpleperf domain 2020-01-15 16:56:41 +00:00
simpleperf_app_runner.te
slideshow.te
snapshotctl.te snapshotctl: allow to write stats 2020-02-14 20:51:53 +00:00
stats.te GpuStats: sepolicy change for using new statsd puller api 2020-02-04 15:55:59 -08:00
statsd.te Allow system server to add StatsHal 2020-02-05 17:24:48 -08:00
storaged.te Allow GMS core to call dumpsys storaged 2019-12-11 12:49:04 -08:00
su.te
surfaceflinger.te Merge "Create surfaceflinger_prop and migrate props" 2020-04-02 22:38:42 +00:00
system_app.te Allow developer settings to query gsid status 2020-03-20 07:57:09 +00:00
system_server.te Merge "Update core sepolicy with neuralnetwork hal" into rvc-dev 2020-03-26 23:53:23 +00:00
system_server_startup.te Revert "Sepolicy: Allow system_server_startup to load dalvikcache artifacts" 2020-03-16 16:44:55 +00:00
system_suspend.te system_suspend: sysfs path resolution 2019-11-12 13:47:26 -08:00
technical_debt.cil Allow apps to access hal_drm 2019-09-30 04:51:24 +00:00
tombstoned.te
toolbox.te
traced.te perfetto: allow producers to supply shared memory 2020-02-04 13:47:42 +00:00
traced_perf.te traced_perf sepolicy tweaks 2020-02-28 15:04:43 +00:00
traced_probes.te perfetto: allow producers to supply shared memory 2020-02-04 13:47:42 +00:00
traceur_app.te Move system property rules to private 2020-03-18 16:46:04 +00:00
tzdatacheck.te
ueventd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
uncrypt.te Move system property rules to private 2020-03-18 16:46:04 +00:00
untrusted_app.te reland: untrusted_app_29: add new targetSdk domain 2020-01-22 09:47:53 +00:00
untrusted_app_25.te reland: untrusted_app_29: add new targetSdk domain 2020-01-22 09:47:53 +00:00
untrusted_app_27.te reland: untrusted_app_29: add new targetSdk domain 2020-01-22 09:47:53 +00:00
untrusted_app_29.te reland: untrusted_app_29: add new targetSdk domain 2020-01-22 09:47:53 +00:00
untrusted_app_all.te initial policy for traced_perf daemon (perf profiler) 2020-01-22 22:04:01 +00:00
update_engine.te Move system property rules to private 2020-03-18 16:46:04 +00:00
update_engine_common.te
update_verifier.te Move system property rules to private 2020-03-18 16:46:04 +00:00
usbd.te Move system property rules to private 2020-03-18 16:46:04 +00:00
users
vdc.te
vendor_init.te Root of /data belongs to init (re-landing) 2019-09-09 14:42:01 -07:00
viewcompiler.te Give map permission to viewcompiler 2019-08-27 10:43:55 -07:00
virtual_touchpad.te
vold.te Move system property rules to private 2020-03-18 16:46:04 +00:00
vold_prepare_subdirs.te sepolicy(wifi): Allow wifi service access to wifi apex directories 2020-02-22 09:33:07 -08:00
vr_hwc.te
vzwomatrigger_app.te Don't run vzwomatrigger_app in permissive mode 2019-12-02 09:41:54 -08:00
wait_for_keymaster.te
watchdogd.te
webview_zygote.te Add getattr access on tmpfs_zygote files for webview_zygote. 2020-01-30 21:29:19 +00:00
wificond.te Move system property rules to private 2020-03-18 16:46:04 +00:00
wpantund.te
zygote.te Merge "Ignore errors that zygote tries to setattr media_rw_data_file dir" into rvc-dev 2020-03-24 17:53:07 +00:00