1. 15d1a12 Revert "Enforce execve() restrictions for API > 28" by Nick Kralevich · 7 years ago
  2. 0dd738d Enforce execve() restrictions for API > 28 by Nick Kralevich · 7 years ago
  3. 5d17551 Change priv-apps /data/data labels to privapp_data_file by Nick Kralevich · 7 years ago
  4. cdc6649 Revert "Change priv-apps /home/home labels to privapp_data_file" by Nick Kralevich · 7 years ago
  5. bd39081 resolve merge conflicts of 601b4422ae9e4c742eacf84d6bdec5014a6f3290 to stage-aosp-master by Nick Kralevich · 7 years ago
  6. 4df5782 Change priv-apps /home/home labels to privapp_data_file by Nick Kralevich · 7 years ago
  7. 1a703fe Revert "Revert "Ensure only com.android.shell can run in the shell domain."" by Max Bires · 8 years ago
  8. 77d41f7 Revert "Revert "Ensure only com.android.shell can run in the shell domain."" by Max Bires · 8 years ago
  9. febdfa4 SELinux changes to accomodate starting the webview_zygote as a child of the zygote. by Robert Sesek · 8 years ago
  10. bacb19b SELinux changes to accomodate starting the webview_zygote as a child of the zygote. by Robert Sesek · 8 years ago
  11. 1c57b81 Merge "SE Policy for Secure Element app and Secure Element HAL" am: 6a60cb3e69 am: f285f2db4b by Ruchi Kandoi · 8 years ago
  12. 8a2b4a7 SE Policy for Secure Element app and Secure Element HAL by Ruchi Kandoi · 8 years ago
  13. 6231b4d Enforce per-app data protections for targetSdk 28+ by Jeff Vander Stoep · 8 years ago
  14. 4ea5569 Adding a traceur_app domain to remove it from shell by Max Bires · 8 years ago
  15. 7650669 Allow Instant/V2 apps to load code from /data/data by Chad Brubaker · 8 years ago
  16. bf0c2a5 Revert "Ensure only com.android.shell can run in the shell domain." by Nick Kralevich · 8 years ago
  17. 714ee5f Ensure only com.android.shell can run in the shell domain. by Nick Kralevich · 8 years ago
  18. 9f152d9 Split mediaprovider as a separate domain from priv_app by Jerry Zhang · 8 years ago
  19. 6dc13ff Use levelFrom=user for v2 apps by Chad Brubaker · 9 years ago
  20. a782a81 Add new untrusted_v2_app domain by Chad Brubaker · 9 years ago
  21. bacb6d7 untrusted_app: policy versioning based on targetSdkVersion by Jeff Vander Stoep · 9 years ago
  22. f54b362 Add minTargetSdkVersion input selector to seapp_contexts by Michael Peck · 9 years ago
  23. 4c40d73 Merge ephemeral data and apk files into app by Chad Brubaker · 9 years ago
  24. e392020 Clarify what determines precedence rules in seapp_contexts by Alex Klyubin · 9 years ago
  25. 52da39d Partially revert "mediaprovider" SELinux domain. by Jeff Sharkey · 9 years ago
  26. f921dd9 Move MediaProvider to its own domain, add new MtpServer permissions by Jerry Zhang · 9 years ago
  27. 06cf31e Rename autoplay_app to ephemeral_app by Chad Brubaker · 9 years ago
  28. cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed from seapp_contexts]
  29. 400d3ac Add autoplay_app domain by Jeff Vander Stoep · 10 years ago
  30. ee9c0b5 Add priv_app domain to global seapp_context by Jeff Vander Stoep · 10 years ago
  31. 81e1f90 check_seapp: add support for "neverallow" checks by William Roberts · 10 years ago
  32. 884ee2a checkseapp, seapp_contexts: drop sebool= support. by Stephen Smalley · 11 years ago
  33. b5ffbb7 restore shared_relro functionality by Nick Kralevich · 11 years ago
  34. 92dfa31 seinfo for platform based domains should be stated explicitly. by William Roberts · 11 years ago
  35. a833763 Enable per-user isolation for normal apps. by Stephen Smalley · 11 years ago
  36. ff4db91 Add isOwner= input selector for seapp_contexts. by Stephen Smalley · 11 years ago
  37. 4be3190 Trivial change to support different SELinux policies for third party apps by Nick Kralevich · 11 years ago
  38. 9786af2 Define SELinux policy for RELRO sharing support. by Torne (Richard Coles) · 11 years ago
  39. 91a4f8d Label app data directories for system UID apps with a different type. by Stephen Smalley · 11 years ago
  40. 9ba844f Coalesce shared_app, media_app, release_app into untrusted_app. by Stephen Smalley · 11 years ago
  41. 6d8fa69 Move shell entry up with other platform UID entries. by Stephen Smalley · 11 years ago
  42. f9c3257 Get rid of separate download_file type. by Stephen Smalley · 11 years ago
  43. dc88dca Get rid of separate platform_app_data_file type. by Stephen Smalley · 11 years ago
  44. 8673468 Drop levelFrom=none from untrusted_app entry. by Stephen Smalley · 12 years ago
  45. 6139de5 Add support for and use new path= specifier in seapp_contexts. by Stephen Smalley · 12 years ago
  46. 1fdee11 1/2: Rename domain "system" to "system_server". by Alex Klyubin · 12 years ago
  47. 5944436 Add "shell" to seapp_contexts by Nick Kralevich · 12 years ago
  48. dc4837a am 7a80915f: am 2ae799e4: Drop separate domain for browser. by Stephen Smalley · 12 years ago
  49. 2ae799e Drop separate domain for browser. by Stephen Smalley · 12 years ago
  50. 17a41bd Drop MLS separation for compatibility. by Geremy Condra · 12 years ago
  51. 3808414 Generalize levelFromUid support. by Stephen Smalley · 13 years ago
  52. 61c80d5 Update policy for Android 4.2 / latest master. by Stephen Smalley · 13 years ago
  53. f26d813 allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access by Joshua Brindle · 13 years ago
  54. 3ac1d26 Switch app_* and isolated to _app and _isolated in seapp_contexts. by Stephen Smalley · 13 years ago
  55. 061f254 Define security labeling for isolated processes. by Stephen Smalley · 13 years ago
  56. dd31ddf seinfo can be used to select types, and sebool is now supported. by Stephen Smalley · 13 years ago
  57. b9760aa Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps. by Stephen Smalley · 13 years ago
  58. f3b587c Rewrite app domains and seapp_contexts to leverage new seinfo tags. by Stephen Smalley · 13 years ago
  59. 2dd4e51 SE Android policy. by Stephen Smalley · 14 years ago