aboutsummaryrefslogtreecommitdiffstats
path: root/vold.te
Commit message (Expand)AuthorAgeFilesLines
* sepolicy: Fixup neverallows for non-shipping builds..Adnan Begovic2015-10-161-5/+13
* Merge remote-tracking branch 'upstream/marshmallow-release', tag 'android-6.0...Adnan Begovic2015-10-151-18/+94
|\
| * Let's reinvent storage, yet again!Jeff Sharkey2015-06-251-0/+4
| * Allow vold to change priority when benchmarking.Jeff Sharkey2015-06-111-0/+3
| * New "selinux.restorecon" control property.Jeff Sharkey2015-06-091-0/+2
| * Allow /dev/klog access, drop mknod and __null__ accessNick Kralevich2015-06-081-1/+1
| * DO NOT MERGE New ext4enc kernel switching from xattrs to ioctlPaul Lawrence2015-05-291-1/+1
| * DO NOT MERGE Securely encrypt the master keyPaul Lawrence2015-05-291-2/+6
| * drop_caches label, vold scratch space on expanded.Jeff Sharkey2015-05-141-1/+4
| * Replace unix_socket_connect() and explicit property sets with macroWilliam Roberts2015-05-071-6/+3
| * Allow vold to move FUSE backing files directly.Jeff Sharkey2015-04-241-1/+4
| * Initial policy for expanded storage.Jeff Sharkey2015-04-061-2/+8
| * Different blkid and fsck execution domains.Jeff Sharkey2015-04-011-5/+13
| * Directory for vold to store private data.Jeff Sharkey2015-04-011-0/+9
| * Separate fsck domains to protect userdata.Jeff Sharkey2015-03-311-1/+1
| * Updated policy for external storage.Jeff Sharkey2015-03-301-6/+30
| * Adding e4crypt supportPaul Lawrence2015-03-271-0/+4
| * Label block devices created or accessed by vold with specific types.Stephen Smalley2014-10-021-2/+8
| * Fix fsck-related denials with encrypted userdata.Stephen Smalley2014-09-301-0/+3
| * Define types for userdata and cache block devices.Stephen Smalley2014-09-191-0/+3
* | Define types for userdata and cache block devices.Stephen Smalley2015-06-241-0/+4
* | domain: Restore original neverallow rules for shipping buildsRicardo Cerqueira2015-06-161-1/+3
* | SEAndroid: Updated vold domain related policystable/cm-12.0-YNG4Nstable/cm-12.0-YNG3Cstable/cm-12.0-YNG1TAstable/cm-12.0-YNG1Tstable/cm-12.0-YNG1Icm-12.0Ravi Kumar Siddojigari2015-02-111-0/+3
* | sepolicy: allow vold to mount ext4 sdcardMichael Bestas2014-12-161-0/+1
* | sepolicy: New type sdcard_posix for labeled filesystemsTom Marshall2014-12-121-0/+1
|/
* Allow installd, vold, system_server unlabeled access.Stephen Smalley2014-05-291-2/+5
* Introduce wakelock_use()Nick Kralevich2014-05-231-2/+1
* Drop relabelto_domain() macro and its associated definitions.Stephen Smalley2014-05-091-1/+0
* Allow vold to access keymasterPaul Lawrence2014-04-141-0/+4
* Replace ctl_default_prop access with explicit service property keys.Robert Craig2014-03-251-1/+1
* Allow vold to call to healthdPaul Lawrence2014-03-201-0/+4
* Clean up socket rules.Stephen Smalley2014-02-251-1/+1
* Introduce asec_public_file type.Robert Craig2014-02-111-2/+5
* vold: allow wakelocks, fsck logsNick Kralevich2013-12-191-0/+8
* am 35e8dcc9: Merge "Let vold mount OBB files on external storage." into klp-devJeff Sharkey2013-11-141-2/+1
|\
| * Let vold mount OBB files on external storage.Jeff Sharkey2013-11-141-2/+1
* | am 2abfe7d4: Allow vold to invoke blkid, use external ASECs.Jeff Sharkey2013-10-171-0/+5
|\|
| * Allow vold to invoke blkid, use external ASECs.Jeff Sharkey2013-10-171-0/+5
* | Partially revert 4fc702eccf2c427a44da4b02342250094ab61192.Nick Kralevich2013-10-141-1/+0
|/
* DO NOT MERGE Fix denials seen during device upgrade.Geremy Condra2013-10-091-0/+1
* Merge "Allow vold to start and stop processes via init" into klp-devGeremy Condra2013-09-111-0/+1
|\
| * Allow vold to start and stop processes via initKen Sumrall2013-09-101-0/+1
* | Give vold the capability to kill.Geremy Condra2013-09-111-1/+1
|/
* Grant fsetid Linux capability to vold.Alex Klyubin2013-07-081-1/+1
* Enable SELinux on voldNick Kralevich2013-06-281-2/+61
* Make all domains unconfined.repo sync2013-05-201-68/+1
* Move domains into per-domain permissive mode.repo sync2013-05-141-0/+1
* Merge "SELinux policy: let vold write to device:dir." into jb-mr2-devAlex Klyubin2013-05-101-0/+1
|\
| * SELinux policy: let vold write to device:dir.Alex Klyubin2013-05-091-0/+1
* | SELinux policy: let vold create /data/tmp_mntAlex Klyubin2013-05-091-1/+1
|/