1. 3261fee untrusted_app reads logs when android_cts enabled by Haiqing Jiang · 12 years ago
  2. 173cbdd read permission over lnk_file to devices when android_cts enabled by Haiqing Jiang · 12 years ago
  3. e7e65d4 New asec container labeling. by rpcraig · 12 years ago
  4. b19665c Add mac_permissions.xml file. by rpcraig · 12 years ago
  5. 1f0f77f Allow CTS Test apps to access to system_data_file by Haiqing Jiang · 12 years ago
  6. 59e9680 socket permissions to untrusted_app by Haiqing Jiang · 12 years ago
  7. 1ce0fe3 appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled by Haiqing Jiang · 12 years ago
  8. dd31ddf seinfo can be used to select types, and sebool is now supported. by Stephen Smalley · 12 years ago
  9. 2b47c3f allocate perms to platformappdomain over system_data_file by Haiqing Jiang · 12 years ago
  10. 19e7fbe mediaserver and system require abstract socket connnection by Haiqing Jiang · 12 years ago
  11. f6ca160 installd unlink platform_app_data_file by Haiqing Jiang · 12 years ago
  12. 7585fc6 Platform app domain sdcard accesses by Haiqing Jiang · 12 years ago
  13. b9760aa Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. by Stephen Smalley · 12 years ago
  14. 3296dea external/sepolicy: mediaserver open application data files by Haiqing Jiang · 12 years ago
  15. 569f589 external/sepolicy: system r/w udp_socket of appdomain by hqjiang · 12 years ago
  16. 8f781f5 external/sepolicy: install daemon unlink application data files by hqjiang · 12 years ago
  17. 4c06d27 Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. by hqjiang · 12 years ago
  18. 20d6963 allow camera calibration by hqjiang · 12 years ago
  19. af56ac1 Include su.te only for userdebug/eng builds. by Matt Finifter · 12 years ago
  20. 1c73516 Address various denials introduced by JB/4.1. by Stephen Smalley · 12 years ago
  21. c331d0f Restore devnull initial sid context. by Stephen Smalley · 12 years ago
  22. dc10723 Support for ocontexts per device. by William Roberts · 12 years ago
  23. 96bf505 Fix the app_ndk policy boolean allow rule. by Michal Mašek · 12 years ago
  24. e1c545d correct denies of inter system processes communication over named pipe by hqjiang · 12 years ago
  25. ee5f400 Correct denies of rpmsg device when accessing to remote processors. by hqjiang · 12 years ago
  26. 81039ab Corrected denials for LocationManager when accessing gps over uart. by hqjiang · 12 years ago
  27. 60e4f11 Add key_socket class to socket_class_set macro. Allow system to trigger module auto-loading and to write to sockets created under /dev. by Stephen Smalley · 12 years ago
  28. 965f2ff Allow system_app to set MAC enforcing mode and read MAC denials. by Stephen Smalley · 12 years ago
  29. 03d2803 media app should have rw access to sdcard dir and files. by William Roberts · 12 years ago
  30. f3b587c Rewrite app domains and seapp_contexts to leverage new seinfo tags. by Stephen Smalley · 12 years ago
  31. 92495b3 Add persist.mac_enforcing_mode context by Bob Craig · 13 years ago
  32. 35c8d4f system needs open permission to qtaguid ctrl file. by Stephen Smalley · 12 years ago
  33. 322b37a Update system rule for qtaguid file. by Stephen Smalley · 12 years ago
  34. e4682a6 Allow apps to write to /proc/net/xt_qtaguid/ctrl. by Stephen Smalley · 12 years ago
  35. 6c39ee0 Make wallpaper_file a mlstrustedobject to permit writes from any app level. by Stephen Smalley · 12 years ago
  36. 56ad8c7 This patch fixes rild trying to access the bluetooth efs dir with read perms. by William Roberts · 12 years ago
  37. 70d4fc2 Add selinux network script to policy by Joshua Brindle · 12 years ago
  38. 07ef722 ion fix by William Roberts · 12 years ago
  39. e8bc32b Public domain notice by Stephen Smalley · 12 years ago
  40. f6f8710 Remove all denials caused by rild on tuna devices. Tested on a maguro variant. by William Roberts · 12 years ago
  41. 80ea1d2 sdcard policy and fuse device label. by William Roberts · 12 years ago
  42. 7fa2f9e Policy for hci_attach service. by William Roberts · 12 years ago
  43. efd6d6e Apply m4 to file_contexts and property_contexts to support includes. by Stephen Smalley · 13 years ago
  44. 4e85633 Merge branch 'aosp' by Stephen Smalley · 13 years ago
  45. a83fc37 Added policy to allow SEAndroidManager to read AVC messages. by James Carter · 13 years ago
  46. d045eae am f5f899c3: Merge from upstream sepolicy by The Android Open Source Project · 13 years ago
  47. 911dd71 am f4ea5b25: Use the checkpolicy built from source. by Ying Wang · 13 years ago
  48. f5f899c Merge from upstream sepolicy by The Android Open Source Project · 13 years ago
  49. f4ea5b2 Use the checkpolicy built from source. by Ying Wang · 13 years ago
  50. f774148 Use the checkpolicy built from source. by Ying Wang · 13 years ago
  51. 730957a Rework the radio vs rild property split. by Stephen Smalley · 13 years ago
  52. a883c38 Allow apps to write to anr_data_file for /data/anr/traces.txt. by Stephen Smalley · 13 years ago
  53. 124720a Add policy for property service. by Stephen Smalley · 13 years ago
  54. 2cb1b31 Allow adbd to access the qemu device and label /dev/eac correctly. by Stephen Smalley · 13 years ago
  55. f794823 Integrate nfc_power and rild rules from tuna sepolicy by Bryan Hinton. by Stephen Smalley · 13 years ago
  56. 0e85c17 Rewrite MLS constraints to only constrain open for app_data_file, not read/write. by Stephen Smalley · 13 years ago
  57. f6cbbe2 Introduce a separate wallpaper_file type for the wallpaper file. by Stephen Smalley · 13 years ago
  58. 59d2803 Introduce a separate apk_tmp_file type for the vmdl.*\.tmp files. by Stephen Smalley · 13 years ago
  59. b660916 Allow the shell to create files on the sdcard. by Stephen Smalley · 13 years ago
  60. d5a70a7 Drop redundant rules. by Stephen Smalley · 13 years ago
  61. c83d008 Policy changes to support running the latest CTS. by Stephen Smalley · 13 years ago
  62. 64935c7 Limit per-device policy files to a well-defined sepolicy prefix. by Stephen Smalley · 13 years ago
  63. 5b340be Add support for per-device .te and .fc files. by Stephen Smalley · 13 years ago
  64. 4c6f1ce Allow Settings to set enforcing and booleans if settings_manage_selinux is true. by Stephen Smalley · 13 years ago
  65. 7e8cf24 Do not build if HAVE_SELINUX=false. by Stephen Smalley · 13 years ago
  66. 2b826fc Add a dependency on checkpolicy. by Stephen Smalley · 13 years ago
  67. 02fb5f3 Rewrite Android.mk. by Ying Wang · 13 years ago
  68. beefbe5 Add explicit role declaration for newer checkpolicy versions. by Stephen Smalley · 13 years ago
  69. 6261d6d Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file. by Stephen Smalley · 13 years ago
  70. 0d76f4e Allow system server to set scheduling info for apps. by Stephen Smalley · 13 years ago
  71. c94e239 Further policy for Motorola Xoom. by Stephen Smalley · 13 years ago
  72. 2dd4e51 SE Android policy. by Stephen Smalley · 13 years ago