- 6a32eec alphabetize /data/misc entries. by Nick Kralevich · 11 years ago
- 8fff872 Merge "Make tee enforcing." by Nick Kralevich · 11 years ago
- 8ad2259 Make bootanim domain enforcing. by Stephen Smalley · 11 years ago
- 4b237c9 Merge "Make watchdogd enforcing." by Nick Kralevich · 11 years ago
- a11c56e Make surfaceflinger domain enforcing. by Stephen Smalley · 11 years ago
- acde43f Define a domain for the bootanim service. by Stephen Smalley · 11 years ago
- 3ba9012 Move gpu_device type and rules to core policy. by Stephen Smalley · 11 years ago
- cf6b350 Allow apps to execute ping by Nick Kralevich · 11 years ago
- ca9ba32 Merge "Make ping enforcing." by Nick Kralevich · 11 years ago
- 21a6a6b Merge "Allow system_app to set properties" by Nick Kralevich · 11 years ago
- b71be5c Merge "Make the runas domain enforcing." by Nick Kralevich · 11 years ago
- 3e78000 Allow system_app to set properties by Nick Kralevich · 11 years ago
- 6531712 Allow untrusted apps to execute binaries from their sandbox directories. by Stephen Smalley · 11 years ago
- 27daf18 Make the runas domain enforcing. by Stephen Smalley · 11 years ago
- 0bc1737 Merge "Support run-as and ndk-gdb functionality." by Nick Kralevich · 11 years ago
- e6a7b37 Restrict mapping low memory. by Stephen Smalley · 11 years ago
- 48759ca Support run-as and ndk-gdb functionality. by Stephen Smalley · 11 years ago
- 95e0842 Restrict ptrace access by debuggerd and unconfineddomain. by Stephen Smalley · 11 years ago
- 82fc3b5 Allow app-app communication via pipes by Nick Kralevich · 11 years ago
- 49db268 Merge "Make debuggerd enforcing." by Nick Kralevich · 11 years ago
- 2c55c53 am fea6e66f: Allow kernel domain, not init domain, to set SELinux enforcing mode. by Stephen Smalley · 11 years ago
- fea6e66 Allow kernel domain, not init domain, to set SELinux enforcing mode. by Stephen Smalley · 11 years ago
- a6c9cdf am 9e8b8d9f: Revert "Allow kernel domain, not init domain, to set SELinux enforcing mode." by Nick Kralevich · 11 years ago
- 9e8b8d9 Revert "Allow kernel domain, not init domain, to set SELinux enforcing mode." by Nick Kralevich · 11 years ago
- 6c8cbac am bf12e225: Allow kernel domain, not init domain, to set SELinux enforcing mode. by Stephen Smalley · 11 years ago
- bf12e22 Allow kernel domain, not init domain, to set SELinux enforcing mode. by Stephen Smalley · 11 years ago
- 156b5db am 2b392fcc: Move lmkd into it\'s own domain. by Nick Kralevich · 11 years ago
- d5f77d7 am 7adb999e: Restrict the ability to set usermodehelpers and proc security settings. by Stephen Smalley · 11 years ago
- 2b392fc Move lmkd into it's own domain. by Nick Kralevich · 11 years ago
- 5495507 Make tee enforcing. by Stephen Smalley · 11 years ago
- 1c670cc Make watchdogd enforcing. by Stephen Smalley · 11 years ago
- 6463c49 Make radio enforcing. by Stephen Smalley · 11 years ago
- cc96454 Make mediaserver enforcing. by Stephen Smalley · 11 years ago
- edc8f38 Make media_app enforcing. by Stephen Smalley · 11 years ago
- 56a1a7e Make nfc enforcing. by Stephen Smalley · 11 years ago
- 1b556c3 Make ping enforcing. by Stephen Smalley · 11 years ago
- 2eba9c5 Make bluetooth enforcing. by Stephen Smalley · 11 years ago
- a161840 Make debuggerd enforcing. by Stephen Smalley · 11 years ago
- 7adb999 Restrict the ability to set usermodehelpers and proc security settings. by Stephen Smalley · 11 years ago
- b96f677 Merge commit '4ab298359613736281e10accaed3a6ffe1fe590a' into HEAD by The Android Open Source Project · 11 years ago
- aa37683 Fix new rild denials. by Robert Craig · 11 years ago
- b254764 Drop tegra specific label from policy. by Robert Craig · 11 years ago
- 8824c55 Merge "Allow SELinuxPolicyInstallReceiver to work." by Nick Kralevich · 11 years ago
- d99e6d5 Restrict the ability to set SELinux enforcing mode to init. by Stephen Smalley · 11 years ago
- a49ba92 Allow SELinuxPolicyInstallReceiver to work. by Stephen Smalley · 11 years ago
- 51ce2f0 Merge "Make the isolated_app domain enforcing." by Nick Kralevich · 11 years ago
- 081aed2 Default to socket_device for anything under /dev/socket. by Stephen Smalley · 11 years ago
- 08ecc02 Make the isolated_app domain enforcing. by Stephen Smalley · 11 years ago
- 4768553 Allow write access to ashmem allocated regions by Nick Kralevich · 11 years ago
- 2ffd52a am 043b9027: Confine watchdogd, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 6af0cc2 Merge commit '060f6fa67e1d9779d2d8357659ae530d65171faa' into HEAD by The Android Open Source Project · 11 years ago
- 043b902 Confine watchdogd, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 7ef2b39 am 1ed3caf7: Merge "Add support for duplicate allow rule detection (-D / --dups)." by Nick Kralevich · 11 years ago
- 1ed3caf Merge "Add support for duplicate allow rule detection (-D / --dups)." by Nick Kralevich · 11 years ago
- bec54f4 Add support for duplicate allow rule detection (-D / --dups). by Stephen Smalley · 11 years ago
- 65d4e83 am 006260e5: Merge "Confine hostapd, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 006260e Merge "Confine hostapd, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 2c8eef8 am 2b939e8c: Merge "Confine ping, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 2b939e8 Merge "Confine ping, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 945fb56 Confine hostapd, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 4ab2983 am 35e8dcc9: Merge "Let vold mount OBB files on external storage." into klp-dev by Jeff Sharkey · 11 years ago
- 35e8dcc Merge "Let vold mount OBB files on external storage." into klp-dev by Jeff Sharkey · 11 years ago
- 80176dc Let vold mount OBB files on external storage. by Jeff Sharkey · 11 years ago
- e0068ec am 24fb24f7: am ae49e7a3: Merge "Confine tee, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 24fb24f am ae49e7a3: Merge "Confine tee, but leave it permissive for now." by Nick Kralevich · 11 years ago
- ae49e7a Merge "Confine tee, but leave it permissive for now." by Nick Kralevich · 11 years ago
- c6a3f60 am 678420e0: am 6ce3d60c: Merge "Confine rild, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 87d0deb am 67a53232: am b1cb3205: Confine wpa_supplicant, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 678420e am 6ce3d60c: Merge "Confine rild, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 67a5323 am b1cb3205: Confine wpa_supplicant, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 6ce3d60 Merge "Confine rild, but leave it permissive for now." by Nick Kralevich · 11 years ago
- dcbab90 Confine rild, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 72a4745 Confine tee, but leave it permissive for now. by Stephen Smalley · 11 years ago
- b1cb320 Confine wpa_supplicant, but leave it permissive for now. by Stephen Smalley · 11 years ago
- 0e11233 am 360d4120: netd: allow tcp_socket name_connect by Nick Kralevich · 11 years ago
- b9d93b0 am ace68b1e: am 91ebcf33: netd: allow tcp_socket name_connect by Nick Kralevich · 11 years ago
- ace68b1 am 91ebcf33: netd: allow tcp_socket name_connect by Nick Kralevich · 11 years ago
- 360d412 netd: allow tcp_socket name_connect by Nick Kralevich · 11 years ago
- 91ebcf3 netd: allow tcp_socket name_connect by Nick Kralevich · 11 years ago
- d8c9d74 am 59078a94: netd: allow tcp connections. by Nick Kralevich · 11 years ago
- 59078a9 netd: allow tcp connections. by Nick Kralevich · 11 years ago
- e6da07b am b391269f: am 36a5d109: netd: allow tcp connections. by Nick Kralevich · 11 years ago
- b391269 am 36a5d109: netd: allow tcp connections. by Nick Kralevich · 11 years ago
- 36a5d10 netd: allow tcp connections. by Nick Kralevich · 11 years ago
- 4914633 am 868a9e26: am 8510d31e: Rename camera_calibration_file and audio_firmware_file. by Stephen Smalley · 11 years ago
- 868a9e2 am 8510d31e: Rename camera_calibration_file and audio_firmware_file. by Stephen Smalley · 11 years ago
- 8510d31 Rename camera_calibration_file and audio_firmware_file. by Stephen Smalley · 11 years ago
- fb2ca12 am bc4484b2: am bc1388d3: Merge "Make kernel / init enforcing" by Nick Kralevich · 11 years ago
- c956237 am 14f95109: am 56f39193: Merge "Confine debuggerd, but leave it permissive for now." by Nick Kralevich · 11 years ago
- bc4484b am bc1388d3: Merge "Make kernel / init enforcing" by Nick Kralevich · 11 years ago
- 14f9510 am 56f39193: Merge "Confine debuggerd, but leave it permissive for now." by Nick Kralevich · 11 years ago
- bc1388d Merge "Make kernel / init enforcing" by Nick Kralevich · 11 years ago
- 56f3919 Merge "Confine debuggerd, but leave it permissive for now." by Nick Kralevich · 11 years ago
- 4ca16a5 am a9ccd7dc: am af47ebb6: Label /dev/fscklogs and allow system_server access to it. by Stephen Smalley · 11 years ago
- a9ccd7d am af47ebb6: Label /dev/fscklogs and allow system_server access to it. by Stephen Smalley · 11 years ago
- af47ebb Label /dev/fscklogs and allow system_server access to it. by Stephen Smalley · 11 years ago
- 47f8bba am c1468d45: am 00739e3d: Make the ueventd domain enforcing. by Nick Kralevich · 11 years ago
- c1468d4 am 00739e3d: Make the ueventd domain enforcing. by Nick Kralevich · 11 years ago
- b1d8164 Make kernel / init enforcing by Nick Kralevich · 11 years ago
- 00739e3 Make the ueventd domain enforcing. by Nick Kralevich · 11 years ago