Skip to content
Snippets Groups Projects
Select Git revision
  • e8acd7695b96434cde84c8bc16b364d39856857d
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

hal_graphics_allocator_default.te

Blame
    • Alex Klyubin's avatar
      f41d89eb
      Group all HAL impls using haldomain attribute · f41d89eb
      Alex Klyubin authored
      This marks all HAL domain implementations with the haldomain attribute
      so that rules can be written which apply to all HAL implementations.
      
      This follows the pattern used for appdomain, netdomain and
      bluetoothdomain.
      
      Test: No change to policy according to sesearch.
      Bug: 34180936
      Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
      f41d89eb
      History
      Group all HAL impls using haldomain attribute
      Alex Klyubin authored
      This marks all HAL domain implementations with the haldomain attribute
      so that rules can be written which apply to all HAL implementations.
      
      This follows the pattern used for appdomain, netdomain and
      bluetoothdomain.
      
      Test: No change to policy according to sesearch.
      Bug: 34180936
      Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
    security_classes 1.94 KiB
    # FLASK
    
    #
    # Define the security object classes
    #
    
    # Classes marked as userspace are classes
    # for userspace object managers
    
    class security
    class process
    class system
    class capability
    
    # file-related classes
    class filesystem
    class file
    class dir
    class fd
    class lnk_file
    class chr_file
    class blk_file
    class sock_file
    class fifo_file
    
    # network-related classes
    class socket
    class tcp_socket
    class udp_socket
    class rawip_socket
    class node
    class netif
    class netlink_socket
    class packet_socket
    class key_socket
    class unix_stream_socket
    class unix_dgram_socket
    
    # sysv-ipc-related classes
    class sem
    class msg
    class msgq
    class shm
    class ipc
    
    # extended netlink sockets
    class netlink_route_socket
    class netlink_firewall_socket
    class netlink_tcpdiag_socket
    class netlink_nflog_socket
    class netlink_xfrm_socket
    class netlink_selinux_socket
    class netlink_audit_socket
    class netlink_ip6fw_socket
    class netlink_dnrt_socket
    
    # IPSec association
    class association
    
    # Updated Netlink class for KOBJECT_UEVENT family.
    class netlink_kobject_uevent_socket
    
    class appletalk_socket
    
    class packet
    
    # Kernel access key retention
    class key
    
    class dccp_socket
    
    class memprotect
    
    # network peer labels
    class peer
    
    # Capabilities >= 32
    class capability2
    
    # kernel services that need to override task security, e.g. cachefiles
    class kernel_service
    
    class tun_socket
    
    class binder
    
    # Updated netlink classes for more recent netlink protocols.
    class netlink_iscsi_socket
    class netlink_fib_lookup_socket
    class netlink_connector_socket
    class netlink_netfilter_socket
    class netlink_generic_socket
    class netlink_scsitransport_socket
    class netlink_rdma_socket
    class netlink_crypto_socket
    
    # Capability checks when on a non-init user namespace
    class cap_userns
    class cap2_userns
    
    # Property service
    class property_service          # userspace
    
    # Service manager
    class service_manager           # userspace
    
    # Keystore Key
    class keystore_key              # userspace
    
    class drmservice                # userspace
    # FLASK