device_google_tangorpro/vendor
Rock Huang 5d140bdb98 Use SELinux rules from private instead of tangorpro for MediaDrm plugin
* Private mediadrm: ag/29478046, ag/29547376
* MediaDrm SELinux rules are on ag/29567026

Bug: 367906184
Bug: 366426322
Flag: EXEMPT castauth enabled
Test: b/364190751#comment27
Change-Id: If98279ba8b6310206971069d064831fa5f053515
2024-10-12 02:37:50 +08:00
..
device.te Initial device tangorpro sepolicy 2022-03-09 15:50:55 +08:00
file.te Use SELinux rules from private instead of tangorpro for MediaDrm plugin 2024-10-12 02:37:50 +08:00
file_contexts Use SELinux rules from private instead of tangorpro for MediaDrm plugin 2024-10-12 02:37:50 +08:00
genfs_contexts selinux: add sysfs_wake label for USI pen battery 2024-05-28 06:01:42 +00:00
grilservice_app.te Add binder call for grilservice and hal_bluetooth 2022-09-21 08:47:27 +00:00
hal_health_default.te SELinux: fix avc denials 2024-05-15 02:50:41 +00:00
hal_lights.te Add sepolicy to allow lights to access display 2023-01-04 03:52:30 +00:00
hal_power_stats_default.te sepolicy: allow binder call for hal_power_stats and hal_bluetooth 2022-12-14 07:23:00 +00:00
hal_sensors_default.te Allow sensor hal to access uhid devices. 2023-01-31 17:30:19 +08:00
hal_usb_impl.te Port pogo sepolicy for target 2022-08-24 21:05:19 +00:00
hal_wifi_ext.te Initial device tangorpro sepolicy 2022-03-09 15:50:55 +08:00
README.txt Initial device tangorpro sepolicy 2022-03-09 15:50:55 +08:00
system_server.te rename sysfs_touch 2022-12-02 13:08:28 +08:00
vendor_init.te Allow vendor_init to read gesture_prop. 2022-07-18 10:26:10 +08:00

This folder holds sepolicy exclusively for one device. For example, genfs_contexts
paths that are affected by device tree.