- f04db5b app.te: Delete apk_private_tmp_file neverallow by Nick Kralevich · 12 months ago
- 27b515e Add SELinux policy for storage areas by Ellen Arteca · 1 year, 4 months ago
- 000b251 stats_service: only disallow untrusted access by Tej Singh · 1 year, 7 months ago
- 4245d04 Allow system_server access to hidraw devices. by Daniel Norman · 1 year, 9 months ago
- b36ecf6 Merge changes from topic "iso_compute" by Charles Chen · 2 years, 7 months ago
- 3d4a6b7 Add isolated_compute_app domain by Charles Chen · 2 years, 8 months ago
- ccf8014 Share isolated properties across islolated apps by Charles Chen · 2 years, 8 months ago
- 214294c Add SELinux Policy For io_uring by Gil Cukierman · 2 years, 10 months ago
- cfdea5f Blocks untrusted apps to access /dev/socket/mdnsd from U by Yuyang Huang · 2 years, 8 months ago
- 24d90e7 Hide ro.debuggable and ro.secure from ephemeral and isolated applications by Alessandra Loro · 2 years, 10 months ago
- 6ecd207 Merge "Drop back-compatibility for hiding ro.debuggable and ro.secure" by Alessandra Loro · 3 years ago
- 40718f4 Allow getopt to eliminate warnings in MicrodroidBenchmarks tests by Alice Wang · 3 years ago
- 8a7dcb5 Drop back-compatibility for hiding ro.debuggable and ro.secure by Alessandra Loro · 3 years, 1 month ago
- d0e108f Disallow untrusted apps to read ro.debuggable and ro.secure by Alessandra Loro · 3 years, 2 months ago
- af609b2 Enforce MAC address restrictions for priv apps. by Bram Bonne · 3 years, 4 months ago
- 872a6f5 Restrict VM usage to platform_app. am: f96cd6557e by Alan Stokes · 4 years ago
- f96cd65 Restrict VM usage to platform_app. by Alan Stokes · 4 years ago
- c9996ff Merge "Add rules for virtualizationservice and crosvm" am: d59b429b63 am: cf84b7571b by Jiyong Park · 4 years, 1 month ago
- 5e20d83 Add rules for virtualizationservice and crosvm by Jiyong Park · 4 years, 2 months ago
- 3f36b24 Merge "untrusted_app_30: add new targetSdk domain" am: c1d9d9a85c am: 86943d839a by Bram Bonné · 4 years, 2 months ago
- ea5460a untrusted_app_30: add new targetSdk domain by Bram Bonné · 4 years, 4 months ago
- 2dec873 Revert "untrusted_app_30: add new targetSdk domain" am: f6fc9377ad am: dc26e38e21 by Paul Hobbs · 4 years, 2 months ago
- f6fc937 Revert "untrusted_app_30: add new targetSdk domain" by Paul Hobbs · 4 years, 2 months ago
- 040fa57 untrusted_app_30: add new targetSdk domain am: 55badc22c1 am: d9fea8c063 by Bram Bonné · 4 years, 2 months ago
- 55badc2 untrusted_app_30: add new targetSdk domain by Bram Bonné · 4 years, 4 months ago
- d631804 Merge "Add fusefs_type for FUSE filesystems" am: 53ef2e85e2 am: 93749a5278 by Thiébaud Weksteen · 4 years, 2 months ago
- 9ec5327 Add fusefs_type for FUSE filesystems by Thiébaud Weksteen · 4 years, 3 months ago
- 858893a Merge "Enforce RTM_GETLINK restrictions on all apps" am: 40bf1a6a70 am: a596c13e89 by Bram Bonné · 4 years, 4 months ago
- d65a7bf make ril.cdma.inecmmode system property internal by Nazanin · 4 years, 4 months ago
- a4433b4 Enforce RTM_GETLINK restrictions on all apps by Bram Bonné · 4 years, 4 months ago
- aa4ce95 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 7 months ago
- aa8bb3a Revert^3 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- a54bed6 Revert^2 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- 7ce5e71 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" by Jonglin Lee · 4 years, 9 months ago
- 51c04ac Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Jonglin Lee · 4 years, 9 months ago
- b18b394 Merge "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Treehugger Robot · 4 years, 9 months ago
- ab5e7d3 Merge "Revert^3 "Enforce RTM_GETLINK restrictions on all 3p apps"" by Elliott Hughes · 4 years, 9 months ago
- 80b8e3c Revert^3 "Enforce RTM_GETLINK restrictions on all 3p apps" by Bram Bonné · 4 years, 9 months ago
- f46d7a2 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 10 months ago
- aff923a Merge "Revert^2 "Enforce RTM_GETLINK restrictions on all 3p apps"" by Bram Bonné · 4 years, 10 months ago
- 18ccf97 Revert^2 "Enforce RTM_GETLINK restrictions on all 3p apps" by Bram Bonné · 4 years, 10 months ago
- d083d24 Merge "Revert "Enforce RTM_GETLINK restrictions on all 3p apps"" by Tej Singh · 4 years, 10 months ago
- f48d1f8 Revert "Enforce RTM_GETLINK restrictions on all 3p apps" by Tej Singh · 4 years, 10 months ago
- 593c3b5 Merge "Enforce RTM_GETLINK restrictions on all 3p apps" by Bram Bonné · 4 years, 10 months ago
- a0518b7 Make kmsg_device mlstrustedobject. by Alan Stokes · 4 years, 11 months ago
- a43e26e untrusted_apps: AIDL vendor service parity w/ HIDL by Steven Moreland · 4 years, 11 months ago
- 03fb6ee Enforce RTM_GETLINK restrictions on all 3p apps by Jeff Vander Stoep · 5 years ago
- e346fbc simplify neverallowxperm for tun_device by Maciej Żenczykowski · 5 years ago
- 2aa8042 incident_service: only disallow untrusted access by Jeff Vander Stoep · 5 years ago
- fd54803 Allow mediaprovider_app access to /proc/filesystems. by Martijn Coenen · 6 years ago
- e3f1d5a Create new mediaprovider_app domain. by Martijn Coenen · 6 years ago
- b38a1d8 untrusted_app: disallow bind RTM_ROUTE socket by Jeff Vander Stoep · 6 years ago
- 1f7ae8e reland: untrusted_app_29: add new targetSdk domain by Jeff Vander Stoep · 6 years ago
- 1d241db Revert "untrusted_app_29: add new targetSdk domain" by Santiago Seifert · 6 years ago
- a1aa221 untrusted_app_29: add new targetSdk domain by Jeff Vander Stoep · 6 years ago
- 34a19b7 Merge "Revert "Allow MediaProvider to host FUSE devices."" by Zimuzo Ezeozue · 6 years ago
- 74a6730 Revert "Allow MediaProvider to host FUSE devices." by Zimuzo Ezeozue · 6 years ago
- b4d7815 Merge "Reland "sepolicy: rework ashmem_device permissions"" by Orion Hodson · 6 years ago
- b554a95 Reland "sepolicy: rework ashmem_device permissions" by Tri Vo · 6 years ago
- 5527d70 Revert "sepolicy: rework ashmem_device permissions" by Orion Hodson · 6 years ago
- 28903d9 untrusted_app_25: remove access to net.dns properties by Jeff Vander Stoep · 6 years ago
- d9dcea5 sepolicy: rework ashmem_device permissions by Tri Vo · 6 years ago
- e95c704 Access to HALs from untrusted apps is blacklist-based by Jiyong Park · 6 years ago
- b27a746 Merge "Remove vintf_service." am: cacefc6a78 by Steven Moreland · 6 years ago
- 4bb0a98 Remove vintf_service. by Steven Moreland · 6 years ago
- 88fedc2 Merge "Reland "Re-open /dev/binder access to all."" am: aa6793febd by Steven Moreland · 6 years ago
- aa6793f Merge "Reland "Re-open /dev/binder access to all."" by Steven Moreland · 6 years ago
- b5a4640 selinux: remove sysfs_mac_address am: f1e71dc75c by Tri Vo · 6 years ago
- f1e71dc selinux: remove sysfs_mac_address by Tri Vo · 6 years ago
- 8f5e8e5 Do not allow untrusted apps to read sysfs_net files am: 804d99ac76 by Maciej enczykowski · 6 years ago
- 804d99a Do not allow untrusted apps to read sysfs_net files by Maciej Żenczykowski · 6 years ago
- b75b047 Reland "Re-open /dev/binder access to all." by Steven Moreland · 6 years ago
- db28fe2 Revert "Re-open /dev/binder access to all." am: 6b2eaade82 by Steven Moreland · 6 years ago
- 6b2eaad Revert "Re-open /dev/binder access to all." by Steven Moreland · 6 years ago
- 169bfcf Merge changes Icdf207c5,I20aa48ef am: 30a06d278f by Steven Moreland · 6 years ago
- 94ff361 Re-open /dev/binder access to all. by Steven Moreland · 6 years ago
- cf289bc Allow MediaProvider to host FUSE devices. am: b56cc6fb1f by Zim · 6 years ago
- b56cc6f Allow MediaProvider to host FUSE devices. by Zim · 6 years ago
- e7e6fff Merge "Properly define hal_codec2 and related policies" into qt-dev by Pawin Vongmasa · 6 years ago
- 609c243 Properly define hal_codec2 and related policies by Pawin Vongmasa · 6 years ago
- 52bcfdf Merge "Remove unneeded permissions" into qt-dev am: 2b34e6ad9f by Marco Nelissen · 6 years ago
- ba258f0 Remove unneeded permissions by Marco Nelissen · 7 years ago
- 68b6f80 Use explicit whitelist for HIDL app neverallows. by Steven Moreland · 6 years ago
- 8eff3e2 Deprecate /mnt/sdcard -> /storage/self/primary symlink. by Tri Vo · 6 years ago
- 19200ae ephemeral_app: restore /dev/ashmem open permissions by Tri Vo · 6 years ago
- 0da2ecd ephemeral_app: restore /dev/ashmem open permissions by Tri Vo · 6 years ago
- 8b12ff5 Neverallow app open access to /dev/ashmem by Tri Vo · 7 years ago
- 877fe9d audit apps opening /dev/ashmem by Tri Vo · 7 years ago
- 73d0a67 sepolicy for ashmemd by Tri Vo · 7 years ago
- 0ac2eec Neverallow executable files and symlink following by Jeff Vander Stoep · 7 years ago
- e17b293 Allow app to conntect to BufferHub service by Jiwen 'Steve' Cai · 7 years ago
- fb66c6f rename rs_data_file to app_exec_data_file by Nick Kralevich · 7 years ago
- 41a871b Permissions for InputClassifier HAL by Siarhei Vishniakou · 8 years ago
- 65a89c1 Revert "remove app_data_file execute" by Nick Kralevich · 7 years ago
- b362474 remove app_data_file execute by Nick Kralevich · 7 years ago
- 0eb0a16 bless app created renderscript files by Nick Kralevich · 7 years ago
- e7040ea Add power.stats HAL 1.0 sepolicy by Benjamin Schwartz · 7 years ago
- 55d9096 SEPolicy changes to allow kcov access in userdebug. by Dan Austin · 7 years ago
- 535c5d2 Remove 'dex2oat_exec' from untrusted_app by David Brazdil · 7 years ago
- a194d37 Tighten up handling of new classes by Nick Kralevich · 7 years ago