- 61c80d5 Update policy for Android 4.2 / latest master. by Stephen Smalley · 12 years ago
- eab2389 Merge "Revert "Include su.te only for userdebug/eng builds."" into jb-mr1-dev-plus-aosp by Jean-Baptiste Queru · 12 years ago
- 8c87a18 am df822f41: Merge "Add SELinux policy for asec containers." by Kenny Root · 12 years ago
- eefaa83 am cdfb06f5: Moved Android policy tools to tools directory by Alice Chu · 12 years ago
- df822f4 Merge "Add SELinux policy for asec containers." by Kenny Root · 12 years ago
- 9ceb47b Revert "Include su.te only for userdebug/eng builds." by Kenny Root · 12 years ago
- cdfb06f Moved Android policy tools to tools directory by Alice Chu · 12 years ago
- 83dde22 am f6647eb9: Change 0 to NULL Byte by Alice Chu · 12 years ago
- f6647eb Change 0 to NULL Byte by Alice Chu · 12 years ago
- a2517b2 resolved conflicts for merge of 47cd396b to jb-mr1-dev-plus-aosp by Kenny Root · 12 years ago
- 47cd396 Add better per-device sepolicy support. by rpcraig · 12 years ago
- 6b964fa am d8b122c7: Use file target as dependency. by Ying Wang · 12 years ago
- d8b122c Use file target as dependency. by Ying Wang · 12 years ago
- 8f4600c am 5dbfdc0b: Add double free protection to checkseapp. by rpcraig · 12 years ago
- 5dbfdc0 Add double free protection to checkseapp. by rpcraig · 12 years ago
- 7672eac Add SELinux policy for asec containers. by rpcraig · 12 years ago
- 84b7472 am 6766cc9e: Merge "allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access" by Kenny Root · 12 years ago
- ca895fb am 91c12e3c: Merge "file class macro cleanup" by Kenny Root · 12 years ago
- 6766cc9 Merge "allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access" by Kenny Root · 12 years ago
- 91c12e3 Merge "file class macro cleanup" by Kenny Root · 12 years ago
- ced365a am 01a58af1: Add a checkfc utility to check file_contexts validity and invoke it. by Stephen Smalley · 12 years ago
- 01a58af Add a checkfc utility to check file_contexts validity and invoke it. by Stephen Smalley · 12 years ago
- b83bb3f Revert "ISSUE 6849488 Bluedroid stack, remove system/bluetooth." by Kenny Root · 12 years ago
- 44374bc am 659aaced: Remove HAVE_SELINUX guard by Kenny Root · 12 years ago
- f26d813 allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access by Joshua Brindle · 12 years ago
- 659aace Remove HAVE_SELINUX guard by Kenny Root · 12 years ago
- 7104df5 file class macro cleanup by William Roberts · 12 years ago
- 382381b am 3ac1d26a: Switch app_* and isolated to _app and _isolated in seapp_contexts. by Stephen Smalley · 12 years ago
- 3ac1d26 Switch app_* and isolated to _app and _isolated in seapp_contexts. by Stephen Smalley · 12 years ago
- acbded3 Merge "ISSUE 6849488 Bluedroid stack, remove system/bluetooth." into jb-mr1-dev by Zhihai Xu · 12 years ago
- c6c6aba am 061f254d: Define security labeling for isolated processes. by Stephen Smalley · 12 years ago
- b620dc6 ISSUE 6849488 Bluedroid stack, remove system/bluetooth. by Zhihai Xu · 12 years ago
- 061f254 Define security labeling for isolated processes. by Stephen Smalley · 12 years ago
- 9822c1d am 66a3e8d9: Drop the use of a policy version suffix on the sepolicy file. by Stephen Smalley · 12 years ago
- 66a3e8d Drop the use of a policy version suffix on the sepolicy file. by Stephen Smalley · 12 years ago
- dfd4cfc am fc6b1032: Merge changes I98fc14e1,If334ba73 by Kenny Root · 12 years ago
- fc6b103 Merge changes I98fc14e1,If334ba73 by Kenny Root · 12 years ago
- b3ab56c Fix for segfault/jmp depends on unitialized variable by William Roberts · 12 years ago
- a53ccf3 Fix check_seapp segfault and undefined linking err by William Roberts · 12 years ago
- 2e44ea3 am 9c08abbd: Merge "Allow domain access to /dev/ion" by Kenny Root · 12 years ago
- 9c08abb Merge "Allow domain access to /dev/ion" by Kenny Root · 12 years ago
- c2cb712 am c27d30a6: Correct spelling mistake by William Roberts · 12 years ago
- ccc8271 Allow domain access to /dev/ion by William Roberts · 12 years ago
- c27d30a Correct spelling mistake by William Roberts · 12 years ago
- d0f027c am 10f9a372: Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
- 10f9a37 Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
- 1148bc2 Merge checkseapp support. by seandroid · 12 years ago
- ae23a1f Corrected gramatical issues by William Roberts · 12 years ago
- a861318 Added new line to end of file by William Roberts · 12 years ago
- 98ed392 Changed seapp_contexts temporary file naming by William Roberts · 12 years ago
- 0ae3a8a Fix mls checking code by William Roberts · 12 years ago
- f0e0a94 Support overrides in seapp_contexts by William Roberts · 12 years ago
- a363683 Add tf_daemon labeling support. by rpcraig · 12 years ago
- d49f7e6 Add ppp/mtp policy. by rpcraig · 12 years ago
- 171a062 per device seapp_context support by William Roberts · 12 years ago
- 867ae05 dhcp policy. by rpcraig · 12 years ago
- aa7fb3b resolved conflicts for merge of 0c2e5705 to jb-mr1-dev by Jean-Baptiste Queru · 12 years ago
- 0c2e570 Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
- e07b8a5 Trusted Execution Environment policy. by rpcraig · 12 years ago
- a1ce2fa Define wake_alarm and block_suspect capabilities. by Stephen Smalley · 12 years ago
- abd977a Additions for grouper/JB by rpcraig · 12 years ago
- fed2465 Allow debugfs access and setsched for mediaserver. by Stephen Smalley · 12 years ago
- 6cce619 Merge asec changes. by Stephen Smalley · 12 years ago
- 1d19f7e Allow system_server to relabel /data/anr. by Stephen Smalley · 12 years ago
- 5f9917c Allow debuggerd to restorecon the tombstone directory. by Stephen Smalley · 12 years ago
- 901cc36 Untrusted_app gets route information by Haiqing Jiang · 12 years ago
- c70dc4e domain writes to cgroup pseudo filesystem by Haiqing Jiang · 12 years ago
- d28714c Introduce app_read_logs boolean. by Stephen Smalley · 12 years ago
- 3261fee untrusted_app reads logs when android_cts enabled by Haiqing Jiang · 12 years ago
- 173cbdd read permission over lnk_file to devices when android_cts enabled by Haiqing Jiang · 12 years ago
- e7e65d4 New asec container labeling. by rpcraig · 12 years ago
- b19665c Add mac_permissions.xml file. by rpcraig · 12 years ago
- 1f0f77f Allow CTS Test apps to access to system_data_file by Haiqing Jiang · 12 years ago
- 59e9680 socket permissions to untrusted_app by Haiqing Jiang · 12 years ago
- 1ce0fe3 appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled by Haiqing Jiang · 12 years ago
- dd31ddf seinfo can be used to select types, and sebool is now supported. by Stephen Smalley · 12 years ago
- 2b47c3f allocate perms to platformappdomain over system_data_file by Haiqing Jiang · 12 years ago
- 19e7fbe mediaserver and system require abstract socket connnection by Haiqing Jiang · 12 years ago
- f6ca160 installd unlink platform_app_data_file by Haiqing Jiang · 12 years ago
- 7585fc6 Platform app domain sdcard accesses by Haiqing Jiang · 12 years ago
- b9760aa Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. by Stephen Smalley · 12 years ago
- 3296dea external/sepolicy: mediaserver open application data files by Haiqing Jiang · 12 years ago
- 569f589 external/sepolicy: system r/w udp_socket of appdomain by hqjiang · 12 years ago
- 8f781f5 external/sepolicy: install daemon unlink application data files by hqjiang · 12 years ago
- 4c06d27 Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. by hqjiang · 12 years ago
- 20d6963 allow camera calibration by hqjiang · 12 years ago
- af56ac1 Include su.te only for userdebug/eng builds. by Matt Finifter · 12 years ago
- 1c73516 Address various denials introduced by JB/4.1. by Stephen Smalley · 12 years ago
- c331d0f Restore devnull initial sid context. by Stephen Smalley · 12 years ago
- dc10723 Support for ocontexts per device. by William Roberts · 12 years ago
- 96bf505 Fix the app_ndk policy boolean allow rule. by Michal Mašek · 12 years ago
- e1c545d correct denies of inter system processes communication over named pipe by hqjiang · 12 years ago
- ee5f400 Correct denies of rpmsg device when accessing to remote processors. by hqjiang · 12 years ago
- 81039ab Corrected denials for LocationManager when accessing gps over uart. by hqjiang · 12 years ago
- 60e4f11 Add key_socket class to socket_class_set macro. Allow system to trigger module auto-loading and to write to sockets created under /dev. by Stephen Smalley · 12 years ago
- 965f2ff Allow system_app to set MAC enforcing mode and read MAC denials. by Stephen Smalley · 12 years ago
- 03d2803 media app should have rw access to sdcard dir and files. by William Roberts · 12 years ago
- f3b587c Rewrite app domains and seapp_contexts to leverage new seinfo tags. by Stephen Smalley · 12 years ago
- 92495b3 Add persist.mac_enforcing_mode context by Bob Craig · 12 years ago
- 35c8d4f system needs open permission to qtaguid ctrl file. by Stephen Smalley · 12 years ago