Gitiles
Code Review
Sign In
gerrit.omnirom.org
/
android_system_sepolicy
/
refs/heads/android-15
/
public
/
healthd.te
09b27c7
Add "DO NOT ADD statements" comments to public
by Inseob Kim
· 1 year, 5 months ago
aabea20
Remove healthd.
by Yifan Hong
· 3 years, 11 months ago
aa4ce95
sepolicy: rules for uid/pid cgroups v2 hierarchy
by Marco Ballesio
· 4 years, 7 months ago
aa8bb3a
Revert^3 "sepolicy: rules for uid/pid cgroups v2 hierarchy"
by Marco Ballesio
· 4 years, 7 months ago
a54bed6
Revert^2 "sepolicy: rules for uid/pid cgroups v2 hierarchy"
by Marco Ballesio
· 4 years, 7 months ago
51c04ac
Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"
by Jonglin Lee
· 4 years, 9 months ago
f46d7a2
sepolicy: rules for uid/pid cgroups v2 hierarchy
by Marco Ballesio
· 4 years, 10 months ago
55e5c9b
Move system property rules to private
by Inseob Kim
· 6 years ago
b192f0e
drop "allow healthd self:process execmem;"
by Nick Kralevich
· 6 years ago
d3aed93
Hide denial seen during boot.
by Joel Galenson
· 7 years ago
5e37271
Introduce system_file_type
by Nick Kralevich
· 7 years ago
5c1fe61
More granular vendor access to /system files.
by Tri Vo
· 7 years ago
27e978d
Fix aosp healthd. am: dd7d5a7038 am: c8abbaecbd
by Tri Vo
· 7 years ago
dd7d5a7
Fix aosp healthd.
by Tri Vo
· 7 years ago
e0909f4
Merge "Whitelist exported platform properties" am: 70d2bb432a am: 42f8d7b27a
by Jaekyun Seok
· 8 years ago
e497145
Whitelist exported platform properties
by Jaekyun Seok
· 8 years ago
9c72ef8
Merge "Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid"" am: 3ec0dbf7d1 am: df624b3479
by Luis Hector Chavez
· 8 years ago
7ae939e
Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid"
by Luis Hector Chavez
· 8 years ago
5765af8
Merge "Remove access to 'sysfs' files from healtd and charger." am: 1fc08a299c am: b10d2964b3
by Tri Vo
· 8 years ago
d276b43
Remove access to 'sysfs' files from healtd and charger.
by Tri Vo
· 8 years ago
65214c6
Merge "sepolicy: Add rules for non-init namespaces" am: b9ea282c65 am: d41e616199
by Benjamin Gordon
· 8 years ago
9b2e0cb
sepolicy: Add rules for non-init namespaces
by Benjamin Gordon
· 8 years ago
ba872bb
Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid am: 640e595a68 am: fe5554828e
by Luis Hector Chavez
· 8 years ago
640e595
Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid
by Luis Hector Chavez
· 8 years ago
b9aa010
healthd provides health@2.0 service.
by Yifan Hong
· 8 years ago
53656c1
Restrict access to hwservicemanager
by Alex Klyubin
· 8 years ago
632bc49
Restrict access to hwservicemanager
by Alex Klyubin
· 8 years ago
9e6b24c
Annotate most remaining HALs with _client/_server
by Alex Klyubin
· 8 years ago
606d2fd
te_macros: introduce add_service() macro
by William Roberts
· 9 years ago
18410d1
Remove 'net_admin' capability from healthd
by Sandeep Patil
· 9 years ago
137a13d
healthd: restore healthd sepolicy for charger mode
by Sandeep Patil
· 9 years ago
60e8886
health: add sepolicy for health hal service
by Sandeep Patil
· 9 years ago
82467a9
health: allow rules for passthrough health HAL
by Sandeep Patil
· 9 years ago
dc08245
healthd: create SEPolicy for 'charger' and reduce healthd's scope
by Sandeep Patil
· 9 years ago
cc39f63
Split general policy into public and private components.
by dcashman
· 9 years ago
[Renamed from healthd.te]
bff9801
Enforce ioctl command whitelisting on all sockets
by Jeff Vander Stoep
· 9 years ago
7ef8073
audit domain_deprecated perms for removal
by Jeff Vander Stoep
· 9 years ago
17cfd3f
Keep pre-existing sysfs write permissions.
by dcashman
· 9 years ago
027ec20
Mark batteryproperties service as app_api_service.
by dcashman
· 9 years ago
12401b8
healthd: grant perms from domain_deprecated
by Jeff Vander Stoep
· 10 years ago
a31755f
Add sysfs_batteryinfo label.
by dcashman
· 10 years ago
d22987b
Create attribute for moving perms out of domain
by Jeff Vander Stoep
· 10 years ago
e265197
Allow /dev/klog access, drop mknod and __null__ access
by Nick Kralevich
· 10 years ago
2f5a6a9
Replace unix_socket_connect() and explicit property sets with macro
by William Roberts
· 10 years ago
cd82557
Restrict service_manager find and list access.
by dcashman
· 11 years ago
bb96bff
sepolicy: allow charger to read /sys/fs/pstore/console-ramoops
by Colin Cross
· 11 years ago
b8511e0
Add access control for each service_manager action.
by Riley Spahn
· 11 years ago
a7c04dc
Remove domain:process from unconfined
by Nick Kralevich
· 11 years ago
51df227
Give healthd permission to write sys properties to allow quick boot from charger mode.
by Riley Andrews
· 11 years ago
f90c41f
Add SELinux rules for service_manager.
by Riley Spahn
· 11 years ago
84ed890
Merge adf_device into graphics_device
by Nick Kralevich
· 11 years ago
8599e34
Introduce wakelock_use()
by Nick Kralevich
· 11 years ago
7004789
Add policies for Atomic Display Framework
by Greg Hackmann
· 11 years ago
9ada894
Fix broken halt while in healthd charger mode
by Nick Kralevich
· 11 years ago
c801215
Allow healthd sys_tty_config
by Nick Kralevich
· 11 years ago
ebc08e8
Address healthd denials.
by Stephen Smalley
· 11 years ago
0352393
fix healthd charger mode.
by Nick Kralevich
· 12 years ago
fed8a2a
Remove transition / dyntransition from unconfined
by Nick Kralevich
· 12 years ago
2c1a0ad
Make healthd enforcing.
by Stephen Smalley
· 12 years ago
190c704
Allow healthd to read/write /dev/__null_.
by Stephen Smalley
· 12 years ago
09e6abd
initial dumpstate domain
by Nick Kralevich
· 12 years ago
2a604ad
Confine healthd, but leave it permissive for now.
by Stephen Smalley
· 12 years ago
353c72e
Move unconfined domains out of permissive mode.
by Nick Kralevich
· 12 years ago
758d033
quash SELinux denial for healthd
by dcashman
· 12 years ago
b2b87d9
healthd: add sepolicy
by Todd Poynor
· 12 years ago