platform_system_sepolicy/private
2022-08-17 12:34:24 +00:00
..
compat Merge "Disallow untrusted apps to read ro.debuggable and ro.secure" 2022-08-17 12:34:24 +00:00
access_vectors Remove key migration related changes 2022-07-20 15:19:37 +10:00
adbd.te Adds GPU sepolicy to support devices with DRM gralloc/rendering 2022-04-18 17:30:56 -07:00
aidl_lazy_test_server.te
apex_test_prepostinstall.te
apexd.te Added properties for rebootless apex install 2022-07-08 12:12:45 +09:00
apexd_derive_classpath.te Allow apexd to call derive_classpath binary 2021-10-28 16:27:09 +01:00
app.te Merge "Allow all Apps to Recv UDP Sockets from SystemServer" am: c37a39c26d 2022-07-04 08:30:12 +00:00
app_neverallows.te Disallow untrusted apps to read ro.debuggable and ro.secure 2022-08-16 14:24:27 +00:00
app_zygote.te Add userfaultfd selinux policy for app_zygote 2022-03-09 21:50:52 -08:00
artd.te Update SELinux policy for app compilation CUJ. 2022-07-29 14:07:52 +00:00
asan_extract.te
atrace.te Iorapd and friends have been removed 2022-05-18 12:07:39 +02:00
attributes
audioserver.te Add SELinux policy for accessing the AudioService 2022-07-27 12:11:50 +00:00
auditctl.te
automotive_display_service.te Revert^2 "Updates sepolicy for EVS HAL" 2022-02-10 17:21:54 +00:00
binderservicedomain.te
blank_screen.te
blkid.te
blkid_untrusted.te
bluetooth.te Allow Bluetooth stack to read security log sysprop 2022-05-25 21:05:02 +00:00
bluetoothdomain.te
bootanim.te Label /data/bootanim with bootanim_data_file. 2021-12-23 15:00:31 -08:00
bootstat.te
boringssl_self_test.te
bpfdomain.te allow bpfloader to create symbolic links in /sys/fs/bpf 2022-07-18 05:14:44 -07:00
bpfloader.te allow bpfloader to create symbolic links in /sys/fs/bpf 2022-07-18 05:14:44 -07:00
bufferhubd.te
bug_map Track sys_module permission for system_server 2022-04-13 10:48:13 +10:00
cameraserver.te Adds GPU sepolicy to support devices with DRM gralloc/rendering 2022-04-18 17:30:56 -07:00
canhalconfigurator.te
charger.te Add charger_type. 2021-11-05 18:44:04 -07:00
charger_type.te Add charger_vendor type 2021-12-07 16:24:23 -08:00
clatd.te Grants clatd privs since forked by system server 2022-01-21 18:17:45 +00:00
compos_fd_server.te Delete more unused policies by CompOS 2022-01-25 08:40:46 -08:00
compos_verify.te Allow compos_verify to write VM logs 2022-06-17 13:41:51 +01:00
composd.te Allow composd to pass some system properties to CompOS 2022-05-11 09:05:12 -07:00
coredomain.te Merge "Update SELinux policy for app compilation CUJ." 2022-07-29 17:22:44 +00:00
cppreopts.te
crash_dump.te Remove inapplicable comment. 2022-08-02 11:01:25 -07:00
credstore.te Add remotely provisioned key pool se policy 2022-02-02 15:07:26 -08:00
crosvm.te Revert "crosvm: netlink perms for acpi" 2022-05-17 00:56:17 +00:00
derive_classpath.te
derive_sdk.te
dex2oat.te Update SELinux policy for app compilation CUJ. 2022-07-29 14:07:52 +00:00
dexoptanalyzer.te
dhcp.te
diced.te Dice HAL: Add policy for dice HAL. 2021-11-17 13:36:18 -08:00
dmesgd.te dmesgd: sepolicies 2022-02-10 17:42:52 +00:00
dnsmasq.te
domain.te Merge "SELinux configuration for memory safety device configs." am: 13b939a91a am: c0866fe311 2022-06-16 07:10:04 +00:00
drmserver.te
dumpstate.te Merge "system_dlkm: allow dumpstate/bugreport to getattr" 2022-03-13 22:22:54 +00:00
ephemeral_app.te
evsmanagerd.te Revert^2 "Adds a sepolicy for EVS manager service" 2022-02-10 17:21:14 +00:00
extra_free_kbytes.te
fastbootd.te
file.te Update SELinux policy for app compilation CUJ. 2022-07-29 14:07:52 +00:00
file_contexts Set up sepolicy for mediaserver64 2022-07-11 16:18:55 +08:00
file_contexts_asan
file_contexts_overlayfs
fingerprintd.te
flags_health_check.te sepolicy: allow vendor system native boot experiments property 2022-08-11 08:03:42 +00:00
fs_use
fsck.te
fsck_untrusted.te
fsverity_init.te
fwk_bufferhub.te Remove bufferhub HAL policy. 2021-10-27 10:54:45 -07:00
gatekeeperd.te
genfs_contexts much more finegrained bpf selinux privs for networking mainline 2022-06-22 16:07:42 -07:00
gki_apex_prepostinstall.te
gmscore_app.te Merge "Revert system app/process profileability on user builds" am: 829acbee3a 2022-07-04 15:56:18 +00:00
gpuservice.te Add search in bpf directory for bpfdomains 2022-03-21 17:31:17 -07:00
gsid.te Add proc_cmdline read permission to read_fstab 2022-03-20 16:35:19 +08:00
hal_allocator_default.te
hal_lazy_test.te
halclientdomain.te
halserverdomain.te
healthd.te Remove healthd. 2021-10-20 18:47:41 -07:00
heapprofd.te
hidl_lazy_test_server.te
hwservice.te
hwservice_contexts
hwservicemanager.te Allow (hw)servicemanager use bootstrap bionic 2022-07-14 11:31:03 +09:00
idmap.te
incident.te
incident_helper.te
incidentd.te
init.te Allow the remote provisioner app to set rkp_only properties 2022-04-20 17:15:20 -07:00
initial_sid_contexts
initial_sids
inputflinger.te
installd.te Create a separate label for sandbox root directory 2022-05-19 16:01:15 +01:00
isolated_app.te Add ThermalService and file access to SdkSandbox 2022-03-25 12:20:07 +00:00
iw.te
kernel.te Policy for using Apex sepolicy 2021-12-14 13:54:03 +01:00
keys.conf Changing selinux policy for privapps for new certs. 2022-04-05 17:31:49 -07:00
keystore.te Add ro.remote_provisioning.*.rkp_only properties. 2022-04-04 11:23:12 -07:00
keystore2_key_contexts
keystore_keys.te
linkerconfig.te
llkd.te Diced: Add policy for diced the DICE daemon. 2021-11-17 13:36:18 -08:00
lmkd.te Add search in bpf directory for bpfdomains 2022-03-21 17:31:17 -07:00
logd.te Add sepolicy for logd and logcat services 2022-01-13 11:38:43 -08:00
logpersist.te Add logd.ready 2021-11-30 15:10:53 +09:00
lpdumpd.te
mac_permissions.xml Changing selinux policy for privapps for new certs. 2022-04-05 17:31:49 -07:00
mdnsd.te
mediadrmserver.te
mediaextractor.te
mediametrics.te
mediaprovider.te
mediaprovider_app.te Restrict creating per-user encrypted directories 2022-05-05 04:12:46 +00:00
mediaserver.te
mediaswcodec.te
mediatranscoding.te Adds GPU sepolicy to support devices with DRM gralloc/rendering 2022-04-18 17:30:56 -07:00
mediatuner.te
migrate_legacy_obb_data.te
mls
mls_decl
mls_macros
mlstrustedsubject.te Iorapd and friends have been removed 2022-05-18 12:07:39 +02:00
mm_events.te
modprobe.te
mtectrl.te Move mtectrl to private 2022-01-26 08:59:55 +09:00
mtp.te
net.te Merge "Enforce MAC address restrictions for priv apps." am: 6b2fefbf46 am: a9723095c7 2022-05-18 13:56:49 +00:00
netd.te much more finegrained bpf selinux privs for networking mainline 2022-06-22 16:07:42 -07:00
netutils_wrapper.te much more finegrained bpf selinux privs for networking mainline 2022-06-22 16:07:42 -07:00
network_stack.te much more finegrained bpf selinux privs for networking mainline 2022-06-22 16:07:42 -07:00
nfc.te
odrefresh.te Remove odrefresh privileges no longer needed for CompOS 2022-01-18 12:56:27 -08:00
odsign.te Selinux setup for /data/misc/odsign/metrics/ 2022-04-07 14:18:37 +00:00
otapreopt_chroot.te
otapreopt_slot.te
perfetto.te Remove TZUvA feature. 2022-06-13 11:45:50 +00:00
performanced.te
permissioncontroller_app.te
platform_app.te Revert system app/process profileability on user builds 2022-07-01 12:41:01 +00:00
policy_capabilities
port_contexts
postinstall.te
postinstall_dexopt.te
ppp.te
preloads_copy.te
preopt2cachename.te
priv_app.te Allow priv-app to report off body events to keystore. 2022-02-07 22:42:51 +00:00
profcollectd.te profcollectd: allow to request wakelock from system_suspend. 2022-02-17 10:20:08 -08:00
profman.te Update SELinux policy for app compilation CUJ. 2022-07-29 14:07:52 +00:00
property.te Added properties for rebootless apex install 2022-07-08 12:12:45 +09:00
property_contexts Merge "Disallow untrusted apps to read ro.debuggable and ro.secure" 2022-08-17 12:34:24 +00:00
racoon.te
radio.te
recovery.te
recovery_persist.te
recovery_refresh.te
remote_prov_app.te Allow remote_prov_app to find mediametrics. 2022-06-15 13:42:32 -07:00
remount.te Add remount.te to allow adb remount-related operations 2021-11-02 22:10:05 +08:00
roles_decl
rs.te
rss_hwm_reset.te
runas.te
runas_app.te
sdcardd.te
sdk_sandbox.te Stop auditing sdk_sandbox access to audio_service 2022-08-15 10:18:50 +00:00
seapp_contexts Changing selinux policy for privapps for new certs. 2022-04-05 17:31:49 -07:00
secure_element.te Added sepolicy rule for vendor uuid mapping config 2021-11-20 01:08:11 +00:00
security_classes Diced: Add policy for diced the DICE daemon. 2021-11-17 13:36:18 -08:00
service.te Merge "SELinux policy changes for AmbientContext system API." am: 7bb9120ba7 am: 49527e07b6 am: f46b2a87dd am: ad1efe3c75 2022-01-21 22:54:30 +00:00
service_contexts Merge tm-dev-plus-aosp-without-vendor@8763363 2022-06-27 23:40:18 +00:00
servicemanager.te servicemanager started property 2022-07-28 17:09:14 +00:00
sgdisk.te
shared_relro.te
shell.te Merge "[GWP-ASan] Add sysprop, allow shell and system apps to set it." 2022-04-21 18:12:43 +00:00
simpleperf.te Revert "Revert "allow simpleperf to profile more app types."" 2021-10-27 11:05:01 -07:00
simpleperf_app_runner.te Revert "Revert "allow simpleperf to profile more app types."" 2021-10-27 11:05:01 -07:00
simpleperf_boot.te Add sepolicy for simpleperf_boot. 2022-01-15 16:12:51 -08:00
slideshow.te
snapshotctl.te
snapuserd.te New property to control Async I/O for snapuserd 2022-01-13 06:27:46 +00:00
stats.te
statsd.te Allow statsd to write to priv app FDs 2021-10-28 13:07:19 -07:00
storaged.te
su.te Add property for MTE permissive mode. 2022-06-14 10:21:25 -07:00
surfaceflinger.te Revert system app/process profileability on user builds 2022-07-01 12:41:01 +00:00
system_app.te Revert system app/process profileability on user builds 2022-07-01 12:41:01 +00:00
system_server.te Merge "sepolicy: allow vendor system native boot experiments property" 2022-08-17 06:29:30 +00:00
system_server_startup.te
system_suspend.te
technical_debt.cil Restrict sandbox access to drmservice 2022-03-24 14:09:46 +01:00
tombstoned.te
toolbox.te Dontaudit chmod of virtualizationsevice_data_file 2022-06-15 17:25:20 +01:00
traced.te Remove TZUvA feature. 2022-06-13 11:45:50 +00:00
traced_perf.te
traced_probes.te traced_probes: allow perfetto to read buddyinfo proc entry 2022-08-04 20:21:37 +00:00
traceur_app.te
ueventd.te
uncrypt.te
untrusted_app.te Add services and allow app to write to sdk_sandbox 2022-05-11 15:52:51 +00:00
untrusted_app_25.te Disallow untrusted apps to read ro.debuggable and ro.secure 2022-08-16 14:24:27 +00:00
untrusted_app_27.te Disallow untrusted apps to read ro.debuggable and ro.secure 2022-08-16 14:24:27 +00:00
untrusted_app_29.te Disallow untrusted apps to read ro.debuggable and ro.secure 2022-08-16 14:24:27 +00:00
untrusted_app_30.te Disallow untrusted apps to read ro.debuggable and ro.secure 2022-08-16 14:24:27 +00:00
untrusted_app_all.te Allow untrusted app to use virtualizationservice - even on user builds 2022-05-03 14:38:28 +09:00
update_engine.te Add sepolicy for IBootControl AIDL 2022-06-07 16:26:19 -07:00
update_engine_common.te
update_verifier.te Allow update_verifier to connect to snapuserd daemon 2022-06-08 20:26:18 +00:00
usbd.te
users
vdc.te
vehicle_binding_util.te Revert "Revert "Allow vehicle_binding_util to access AIDL VHAL. am: d5af7b7cea am: 565699bc61 am: e4ddf119a1 am: 54e7d19e1d am: 3686a43f8f"" 2022-05-11 18:14:06 +00:00
vendor_init.te
viewcompiler.te
virtual_touchpad.te
virtualizationservice.te Selinux configs for enabling tombstones be passed to host 2022-04-05 13:09:04 +00:00
vold.te Remove init's write access to /data/user and /data/media 2022-05-12 00:19:29 +00:00
vold_prepare_subdirs.te Create a separate label for sandbox root directory 2022-05-19 16:01:15 +01:00
vzwomatrigger_app.te
wait_for_keymaster.te
watchdogd.te
webview_zygote.te
wificond.te
wpantund.te
zygote.te Allow zygote to read persist.wm.debug.* prop 2022-08-04 14:48:06 -07:00