- 09b27c7 Add "DO NOT ADD statements" comments to public by Inseob Kim · 1 year, 5 months ago
- 75806ef Minimize public policy by Inseob Kim · 1 year, 5 months ago
- aa4ce95 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 7 months ago
- aa8bb3a Revert^3 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- a54bed6 Revert^2 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- 51c04ac Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Jonglin Lee · 4 years, 9 months ago
- f46d7a2 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 10 months ago
- 55e5c9b Move system property rules to private by Inseob Kim · 6 years ago
- 5e37271 Introduce system_file_type by Nick Kralevich · 7 years ago
- 7a4af30 Start the process of locking down proc/net by Jeff Vander Stoep · 7 years ago
- 9b2e0cb sepolicy: Add rules for non-init namespaces by Benjamin Gordon · 8 years ago
- 76aab82 Move domain_deprecated into private policy by Jeff Vander Stoep · 8 years ago
- f627e55 restore permissions to /vendor for non-treble devices by Jeff Vander Stoep · 8 years ago
- 50563c0 Ban core components from accessing vendor data types by Jeff Vander Stoep · 8 years ago
- cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed (91%) from dhcp.te]
- bff9801 Enforce ioctl command whitelisting on all sockets by Jeff Vander Stoep · 9 years ago
- c29b2fc drop dhcp auditallow by Nick Kralevich · 10 years ago
- d22987b Create attribute for moving perms out of domain by Jeff Vander Stoep · 10 years ago
- a3c97a7 Only allow toolbox exec where /system exec was already allowed. by Stephen Smalley · 10 years ago
- 625a352 Replace unix_socket_connect() and explicit property sets with macro by William Roberts · 10 years ago
- 5cf3994 Revert /proc/net related changes by Nick Kralevich · 11 years ago
- 99940d1 remove /proc/net read access from domain.te by Nick Kralevich · 11 years ago
- fee4915 Align SELinux property policy with init property_perms. by Stephen Smalley · 11 years ago
- 97a2cfd Allow Bluetooth app to initiate DHCP service on bt-pan interface. by Paul Jensen · 11 years ago
- 00b180d Eliminate some duplicated rules. by Stephen Smalley · 11 years ago
- c797ea0 Make dhcp enforcing. by Stephen Smalley · 12 years ago
- 1601132 Clean up socket rules. by Stephen Smalley · 12 years ago
- 515a76b Allow dhcp rawip_socket permissions. by dcashman · 12 years ago
- 623975f Support forcing permissive domains to unconfined. by Nick Kralevich · 12 years ago
- c0493c8 Drop extra _system_file types. by Stephen Smalley · 12 years ago
- 529fcbe Create proc_net type for /proc/sys/net entries. by Robert Craig · 12 years ago
- c48fd77 Confine dhcp, but leave it permissive for now. by Stephen Smalley · 12 years ago
- 353c72e Move unconfined domains out of permissive mode. by Nick Kralevich · 12 years ago
- 77d4731 Make all domains unconfined. by repo sync · 12 years ago
- 50e37b9 Move domains into per-domain permissive mode. by repo sync · 12 years ago
- 4702046 Allow dhcpd to interact with ttys. by Geremy Condra · 12 years ago
- e69552b Revert "Revert "Various minor policy fixes based on CTS."" by Geremy Condra · 12 years ago
- ba84bf1 Revert "Various minor policy fixes based on CTS." by Geremy Condra · 12 years ago
- 8a814a7 Various minor policy fixes based on CTS. by Stephen Smalley · 12 years ago
- ff7e530 Create policy for PAN connections. by rpcraig · 13 years ago
- f26d813 allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access by Joshua Brindle · 13 years ago
- 867ae05 dhcp policy. by rpcraig · 13 years ago