platform_system_sepolicy/public
Steven Moreland 9234e00daf hal_attribute_hwservice_client drop '_client'
Since this attribute just associates a hal_attribute
with a given hwservice in the standard way.

Bug: 80319537
Test: boot + sanity + test for denials
Change-Id: I545de165515387317e6920ce8f5e8c491f9ab24e
2018-06-06 09:30:18 -07:00
..
adbd.te Moving adbd from rootdir to system/bin 2017-08-28 17:38:13 +08:00
app.te Find hal_foo_hwservice -> you are hal_foo_client. 2018-05-30 16:46:57 -07:00
asan_extract.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
attributes Use hal_attribute for all HALs. 2018-05-30 18:18:07 -07:00
audioserver.te
blkid.te
blkid_untrusted.te
bluetooth.te
bootanim.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
bootstat.te Remove bootstat access to proc label. 2017-09-18 10:29:24 -07:00
bufferhubd.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
cameraserver.te Add shell:fifo_file permission for cameraserver 2018-02-28 16:12:40 -08:00
charger.te charger: allow to read /sys/class/power_supply 2018-01-18 16:46:17 -08:00
clatd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
cppreopts.te Grant cppreopts.sh permissions to cleanup if it fails 2017-08-23 16:00:23 +00:00
crash_dump.te Widen crash_dump dontaudit. 2018-04-10 09:55:11 -07:00
device.te Add secure_element_device 2018-03-07 16:37:24 +00:00
dex2oat.te Reland "Allow dexopt to follow /odm/lib(64) symlinks."" 2018-04-02 10:43:22 +09:00
dhcp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
display_service_server.te Add fwk_display_hwservice. 2017-05-17 11:00:28 -07:00
dnsmasq.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
domain.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
drmserver.te No access to tee domain over Unix domain sockets 2017-04-03 11:26:01 -07:00
dumpstate.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
e2fs.te Allow vendor_init and e2fs to enable metadata encryption 2018-02-01 13:25:34 -08:00
ephemeral_app.te
file.te Fingerprint data is now stored in one of two ways depending on the 2018-05-16 14:22:14 -07:00
fingerprintd.te Remove fingerprintd access to sysfs_type and cgroup label. 2017-09-19 17:12:14 -07:00
fsck.te Allow access to the metadata partition for metadata encryption. 2018-01-19 14:45:08 -08:00
fsck_untrusted.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
gatekeeperd.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
global_macros sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
hal_allocator.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_audio.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_audiocontrol.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_authsecret.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_bluetooth.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_bootctl.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_broadcastradio.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_camera.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_cas.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_configstore.te Add exFAT support; unify behind "sdcard_type". 2018-04-13 14:08:10 -06:00
hal_confirmationui.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_contexthub.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_drm.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_dumpstate.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_evs.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hal_fingerprint.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_gatekeeper.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_gnss.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_graphics_allocator.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_graphics_composer.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_health.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_ir.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_keymaster.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_light.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_lowpan.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_memtrack.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_neuralnetworks.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_neverallows.te Allow to use sockets from hal server for auto 2018-05-15 14:38:00 -07:00
hal_nfc.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_oemlock.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_omx.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_power.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_secure_element.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_sensors.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_telephony.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tetheroffload.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_thermal.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tv_cec.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_tv_input.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_usb.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_usb_gadget.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vehicle.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vibrator.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_vr.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_weaver.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_hostapd.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_offload.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
hal_wifi_supplicant.te hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
healthd.te Fix aosp healthd. 2018-03-27 15:18:30 -07:00
hwservice.te Move automotive HALs sepolicy to system/ 2018-05-04 21:36:48 +00:00
hwservicemanager.te Add hwservice_contexts and support for querying it. 2017-04-12 18:07:12 -07:00
idmap.te Suppress denials from idmap reading installd's files. 2018-01-25 10:07:19 -08:00
incident.te
incident_helper.te Selinux permissions for incidentd project 2018-01-23 19:08:49 +00:00
incidentd.te
init.te Improve tests protecting private app data 2018-05-29 13:47:49 -07:00
inputflinger.te
install_recovery.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
installd.te Installd doesn't need to create cgroup files. 2018-04-09 13:49:13 +01:00
ioctl_defines Fix TIOCSCTTY ioctl definition for mips 2017-08-31 18:16:46 +02:00
ioctl_macros
isolated_app.te
kernel.te domain.te & kernel.te: allow kernel to write nativetest_data_file 2018-05-15 19:19:05 +00:00
keystore.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
llkd.te llkd: add live-lock daemon 2018-05-10 17:19:16 +00:00
lmkd.te Selinux: Give lmkd read access to /proc/meminfo 2018-04-13 21:35:52 +00:00
logd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
logpersist.te
mdnsd.te
mediadrmserver.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
mediaextractor.te Allow sdcardfs:file read access on mediaextractor 2018-05-01 14:03:55 -07:00
mediametrics.te Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
mediaprovider.te Split mediaprovider from priv_app. 2017-07-10 11:17:18 -07:00
mediaserver.te mediacodec->mediacodec+hal_omx{,_server,_client} 2018-05-30 18:12:32 +00:00
modprobe.te modprobe: shouldn't load kernel modules from /system 2018-03-20 14:17:28 -07:00
mtp.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
net.te
netd.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
netutils_wrapper.te add netutils_wrappers 2017-04-14 22:57:27 -07:00
neverallow_macros Ban socket connections between core and vendor 2017-03-27 08:49:13 -07:00
nfc.te
otapreopt_chroot.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
otapreopt_slot.te Sepolicy: Give otapreopt_slot read on A/B artifact links 2017-04-07 20:19:41 -07:00
performanced.te Suppress noisy performanced denials in permissive mode. 2018-02-27 10:42:12 +00:00
perfprofd.te Selinux: Fix perfprofd policy 2018-04-02 08:10:09 -07:00
platform_app.te
postinstall.te
postinstall_dexopt.te Sepolicy: Modify postinstall_dexopt 2018-04-30 09:52:54 -07:00
ppp.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
preopt2cachename.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
priv_app.te
profman.te Allow profman to resolve symlinks on dirs 2018-04-30 17:38:15 -07:00
property.te Finer grained permissions for ctl. properties 2018-05-22 13:47:16 -07:00
property_contexts Add context for ro.boot.product.hardware.sku. 2018-06-04 12:38:52 -07:00
racoon.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
radio.te Allow vendor-init-settable to persist.radio.multisim.config 2018-03-27 13:41:47 +09:00
recovery.te Whitelist exported platform properties 2018-01-10 16:15:25 +00:00
recovery_persist.te
recovery_refresh.te
roles
runas.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
sdcardd.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
secure_element.te SE Policy for Secure Element app and Secure Element HAL 2018-01-29 21:31:42 +00:00
service.te Added sepolicy for activity_task service 2018-06-05 14:13:45 +00:00
servicemanager.te Prevent vendor_init from using binder or sockets 2018-02-09 19:32:59 +00:00
sgdisk.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
shared_relro.te Allow shared_relro to connect to activity_service. 2017-07-24 17:38:40 -04:00
shell.te Allow system server to write profile snapshots in /data/misc/profman 2018-05-09 14:42:59 -07:00
slideshow.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
su.te sepolicy(hostapd): Add a HIDL interface for hostapd 2018-05-04 21:36:24 +00:00
surfaceflinger.te
system_app.te
system_server.te
te_macros hal_attribute_hwservice_client drop '_client' 2018-06-06 09:30:18 -07:00
tee.te Fingerprint data is now stored in one of two ways depending on the 2018-05-16 14:22:14 -07:00
thermalserviced.te PowerUI access to thermalservice 2017-10-14 01:05:58 +00:00
tombstoned.te tombstoned: allow linking tombstones. 2018-04-18 18:41:21 -07:00
toolbox.te
traced_probes.te Make traced_probes mlstrustedsubject. 2018-04-17 18:12:28 +00:00
traceur_app.te Enable Traceur on user builds. 2018-02-02 12:46:36 -08:00
tzdatacheck.te Allow the shell user to run tzdatacheck 2017-04-20 09:31:36 +00:00
ueventd.te ueventd: allow reading kernel cmdline 2018-05-17 18:47:42 +08:00
uncrypt.te Improve tests protecting private app data 2018-05-29 13:47:49 -07:00
untrusted_app.te Add untrusted_app_27 2018-04-03 12:25:51 -07:00
untrusted_v2_app.te
update_engine.te Hide sys_rawio SELinux denials. 2018-04-10 14:23:25 -07:00
update_engine_common.te Make /proc/sys/kernel/random available to everyone 2017-11-20 21:02:21 +00:00
update_verifier.te Create sysfs_dm label. 2017-10-10 14:42:24 -07:00
usbd.te usbd sepolicy 2018-01-20 03:41:21 +00:00
vdc.te Sync internal master and AOSP sepolicy. 2017-09-27 18:55:47 -07:00
vendor_init.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
vendor_shell.te Allow shell to start vendor shell 2018-01-16 18:28:51 +00:00
vendor_toolbox.te Allow init to run vendor toybox for modprobe 2017-05-24 15:01:20 -07:00
virtual_touchpad.te Allow vr_hwc and virtual_touchpad to query for permissions 2017-04-21 17:15:03 -04:00
vndservice.te Add default label and mapping for vendor services 2017-04-28 14:56:57 -07:00
vndservicemanager.te
vold.te Improve tests protecting private app data 2018-05-29 13:47:49 -07:00
vold_prepare_subdirs.te Move most of public/vold_prepare_subdirs.te to private 2017-10-25 13:06:25 -07:00
vr_hwc.te SELinux policies for PDX services 2017-05-10 16:39:19 -07:00
watchdogd.te
webview_zygote.te
wificond.te Start the process of locking down proc/net 2018-05-04 21:36:33 +00:00
wpantund.te sepolicy: Add rules for non-init namespaces 2017-11-21 08:34:32 -07:00
zygote.te