1. 61c80d5 Update policy for Android 4.2 / latest master. by Stephen Smalley · 12 years ago
  2. eab2389 Merge "Revert "Include su.te only for userdebug/eng builds."" into jb-mr1-dev-plus-aosp by Jean-Baptiste Queru · 12 years ago
  3. 8c87a18 am df822f41: Merge "Add SELinux policy for asec containers." by Kenny Root · 12 years ago
  4. eefaa83 am cdfb06f5: Moved Android policy tools to tools directory by Alice Chu · 12 years ago
  5. df822f4 Merge "Add SELinux policy for asec containers." by Kenny Root · 12 years ago
  6. 9ceb47b Revert "Include su.te only for userdebug/eng builds." by Kenny Root · 12 years ago
  7. cdfb06f Moved Android policy tools to tools directory by Alice Chu · 12 years ago
  8. 83dde22 am f6647eb9: Change 0 to NULL Byte by Alice Chu · 12 years ago
  9. f6647eb Change 0 to NULL Byte by Alice Chu · 12 years ago
  10. a2517b2 resolved conflicts for merge of 47cd396b to jb-mr1-dev-plus-aosp by Kenny Root · 12 years ago
  11. 47cd396 Add better per-device sepolicy support. by rpcraig · 12 years ago
  12. 6b964fa am d8b122c7: Use file target as dependency. by Ying Wang · 12 years ago
  13. d8b122c Use file target as dependency. by Ying Wang · 12 years ago
  14. 8f4600c am 5dbfdc0b: Add double free protection to checkseapp. by rpcraig · 12 years ago
  15. 5dbfdc0 Add double free protection to checkseapp. by rpcraig · 12 years ago
  16. 7672eac Add SELinux policy for asec containers. by rpcraig · 12 years ago
  17. 84b7472 am 6766cc9e: Merge "allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access" by Kenny Root · 12 years ago
  18. ca895fb am 91c12e3c: Merge "file class macro cleanup" by Kenny Root · 12 years ago
  19. 6766cc9 Merge "allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access" by Kenny Root · 12 years ago
  20. 91c12e3 Merge "file class macro cleanup" by Kenny Root · 12 years ago
  21. ced365a am 01a58af1: Add a checkfc utility to check file_contexts validity and invoke it. by Stephen Smalley · 12 years ago
  22. 01a58af Add a checkfc utility to check file_contexts validity and invoke it. by Stephen Smalley · 12 years ago
  23. b83bb3f Revert "ISSUE 6849488 Bluedroid stack, remove system/bluetooth." by Kenny Root · 12 years ago
  24. 44374bc am 659aaced: Remove HAVE_SELINUX guard by Kenny Root · 12 years ago
  25. f26d813 allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access by Joshua Brindle · 12 years ago
  26. 659aace Remove HAVE_SELINUX guard by Kenny Root · 12 years ago
  27. 7104df5 file class macro cleanup by William Roberts · 12 years ago
  28. 382381b am 3ac1d26a: Switch app_* and isolated to _app and _isolated in seapp_contexts. by Stephen Smalley · 12 years ago
  29. 3ac1d26 Switch app_* and isolated to _app and _isolated in seapp_contexts. by Stephen Smalley · 12 years ago
  30. acbded3 Merge "ISSUE 6849488 Bluedroid stack, remove system/bluetooth." into jb-mr1-dev by Zhihai Xu · 12 years ago
  31. c6c6aba am 061f254d: Define security labeling for isolated processes. by Stephen Smalley · 12 years ago
  32. b620dc6 ISSUE 6849488 Bluedroid stack, remove system/bluetooth. by Zhihai Xu · 12 years ago
  33. 061f254 Define security labeling for isolated processes. by Stephen Smalley · 12 years ago
  34. 9822c1d am 66a3e8d9: Drop the use of a policy version suffix on the sepolicy file. by Stephen Smalley · 12 years ago
  35. 66a3e8d Drop the use of a policy version suffix on the sepolicy file. by Stephen Smalley · 12 years ago
  36. dfd4cfc am fc6b1032: Merge changes I98fc14e1,If334ba73 by Kenny Root · 12 years ago
  37. fc6b103 Merge changes I98fc14e1,If334ba73 by Kenny Root · 12 years ago
  38. b3ab56c Fix for segfault/jmp depends on unitialized variable by William Roberts · 12 years ago
  39. a53ccf3 Fix check_seapp segfault and undefined linking err by William Roberts · 12 years ago
  40. 2e44ea3 am 9c08abbd: Merge "Allow domain access to /dev/ion" by Kenny Root · 12 years ago
  41. 9c08abb Merge "Allow domain access to /dev/ion" by Kenny Root · 12 years ago
  42. c2cb712 am c27d30a6: Correct spelling mistake by William Roberts · 12 years ago
  43. ccc8271 Allow domain access to /dev/ion by William Roberts · 12 years ago
  44. c27d30a Correct spelling mistake by William Roberts · 12 years ago
  45. d0f027c am 10f9a372: Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
  46. 10f9a37 Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
  47. 1148bc2 Merge checkseapp support. by seandroid · 12 years ago
  48. ae23a1f Corrected gramatical issues by William Roberts · 12 years ago
  49. a861318 Added new line to end of file by William Roberts · 12 years ago
  50. 98ed392 Changed seapp_contexts temporary file naming by William Roberts · 12 years ago
  51. 0ae3a8a Fix mls checking code by William Roberts · 12 years ago
  52. f0e0a94 Support overrides in seapp_contexts by William Roberts · 12 years ago
  53. a363683 Add tf_daemon labeling support. by rpcraig · 12 years ago
  54. d49f7e6 Add ppp/mtp policy. by rpcraig · 12 years ago
  55. 171a062 per device seapp_context support by William Roberts · 12 years ago
  56. 867ae05 dhcp policy. by rpcraig · 12 years ago
  57. aa7fb3b resolved conflicts for merge of 0c2e5705 to jb-mr1-dev by Jean-Baptiste Queru · 12 years ago
  58. 0c2e570 Merge upstream sepolicy into AOSP by Jean-Baptiste Queru · 12 years ago
  59. e07b8a5 Trusted Execution Environment policy. by rpcraig · 12 years ago
  60. a1ce2fa Define wake_alarm and block_suspect capabilities. by Stephen Smalley · 12 years ago
  61. abd977a Additions for grouper/JB by rpcraig · 12 years ago
  62. fed2465 Allow debugfs access and setsched for mediaserver. by Stephen Smalley · 12 years ago
  63. 6cce619 Merge asec changes. by Stephen Smalley · 12 years ago
  64. 1d19f7e Allow system_server to relabel /data/anr. by Stephen Smalley · 12 years ago
  65. 5f9917c Allow debuggerd to restorecon the tombstone directory. by Stephen Smalley · 12 years ago
  66. 901cc36 Untrusted_app gets route information by Haiqing Jiang · 12 years ago
  67. c70dc4e domain writes to cgroup pseudo filesystem by Haiqing Jiang · 12 years ago
  68. d28714c Introduce app_read_logs boolean. by Stephen Smalley · 12 years ago
  69. 3261fee untrusted_app reads logs when android_cts enabled by Haiqing Jiang · 12 years ago
  70. 173cbdd read permission over lnk_file to devices when android_cts enabled by Haiqing Jiang · 12 years ago
  71. e7e65d4 New asec container labeling. by rpcraig · 12 years ago
  72. b19665c Add mac_permissions.xml file. by rpcraig · 12 years ago
  73. 1f0f77f Allow CTS Test apps to access to system_data_file by Haiqing Jiang · 12 years ago
  74. 59e9680 socket permissions to untrusted_app by Haiqing Jiang · 12 years ago
  75. 1ce0fe3 appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled by Haiqing Jiang · 12 years ago
  76. dd31ddf seinfo can be used to select types, and sebool is now supported. by Stephen Smalley · 12 years ago
  77. 2b47c3f allocate perms to platformappdomain over system_data_file by Haiqing Jiang · 12 years ago
  78. 19e7fbe mediaserver and system require abstract socket connnection by Haiqing Jiang · 12 years ago
  79. f6ca160 installd unlink platform_app_data_file by Haiqing Jiang · 12 years ago
  80. 7585fc6 Platform app domain sdcard accesses by Haiqing Jiang · 12 years ago
  81. b9760aa Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. by Stephen Smalley · 12 years ago
  82. 3296dea external/sepolicy: mediaserver open application data files by Haiqing Jiang · 12 years ago
  83. 569f589 external/sepolicy: system r/w udp_socket of appdomain by hqjiang · 12 years ago
  84. 8f781f5 external/sepolicy: install daemon unlink application data files by hqjiang · 12 years ago
  85. 4c06d27 Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. by hqjiang · 12 years ago
  86. 20d6963 allow camera calibration by hqjiang · 12 years ago
  87. af56ac1 Include su.te only for userdebug/eng builds. by Matt Finifter · 12 years ago
  88. 1c73516 Address various denials introduced by JB/4.1. by Stephen Smalley · 12 years ago
  89. c331d0f Restore devnull initial sid context. by Stephen Smalley · 12 years ago
  90. dc10723 Support for ocontexts per device. by William Roberts · 12 years ago
  91. 96bf505 Fix the app_ndk policy boolean allow rule. by Michal Mašek · 12 years ago
  92. e1c545d correct denies of inter system processes communication over named pipe by hqjiang · 12 years ago
  93. ee5f400 Correct denies of rpmsg device when accessing to remote processors. by hqjiang · 12 years ago
  94. 81039ab Corrected denials for LocationManager when accessing gps over uart. by hqjiang · 12 years ago
  95. 60e4f11 Add key_socket class to socket_class_set macro. Allow system to trigger module auto-loading and to write to sockets created under /dev. by Stephen Smalley · 12 years ago
  96. 965f2ff Allow system_app to set MAC enforcing mode and read MAC denials. by Stephen Smalley · 12 years ago
  97. 03d2803 media app should have rw access to sdcard dir and files. by William Roberts · 12 years ago
  98. f3b587c Rewrite app domains and seapp_contexts to leverage new seinfo tags. by Stephen Smalley · 12 years ago
  99. 92495b3 Add persist.mac_enforcing_mode context by Bob Craig · 12 years ago
  100. 35c8d4f system needs open permission to qtaguid ctrl file. by Stephen Smalley · 12 years ago