- 09b27c7 Add "DO NOT ADD statements" comments to public by Inseob Kim · 1 year, 5 months ago
- 75806ef Minimize public policy by Inseob Kim · 1 year, 5 months ago
- 46288c6 Merge "strengthen app_data_file neverallows" by Steven Moreland · 2 years, 3 months ago
- f3722d5 strengthen app_data_file neverallows by Steven Moreland · 2 years, 4 months ago
- 9c2a5cf strengthen system_file neverallows by Steven Moreland · 2 years, 4 months ago
- aa4ce95 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 7 months ago
- aa8bb3a Revert^3 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- a54bed6 Revert^2 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- 51c04ac Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Jonglin Lee · 4 years, 9 months ago
- f46d7a2 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 10 months ago
- 9949bba Allow logd to set logd_prop by Tom Cherry · 5 years ago
- 55e5c9b Move system property rules to private by Inseob Kim · 6 years ago
- 4ab64c9 Relabel /data/system/packages.list to new type. by Florian Mayer · 6 years ago
- 5d89abd Allow to getattr kmsg_device by Yifan Hong · 6 years ago
- 51d92c9 runtime_event_log_tags_file: dontaudit map permission by Jeff Vander Stoep · 7 years ago
- 5e37271 Introduce system_file_type by Nick Kralevich · 7 years ago
- 275ea12 llkd: Add stack symbol checking by Mark Salyzyn · 7 years ago
- 23c9d91 Start partitioning off privapp_data_file from app_data_file by Nick Kralevich · 7 years ago
- f45db06 Deprivilege haiku by Jeff Vander Stoep · 7 years ago
- 7a4af30 Start the process of locking down proc/net by Jeff Vander Stoep · 7 years ago
- 9b2e0cb sepolicy: Add rules for non-init namespaces by Benjamin Gordon · 8 years ago
- 87ed5e8 Explicitly label logd's dependencies in /proc. by Tri Vo · 8 years ago
- 384ce66 logd: add getEventTag command and service by Mark Salyzyn · 9 years ago
- d33a9a1 logd: restrict access to /dev/event-log-tags by Mark Salyzyn · 9 years ago
- cb3eb4e Introduce crash_dump debugging helper. by Josh Gao · 9 years ago
- df125b9 init: only allowed to transition to logpersist or logd by Mark Salyzyn · 9 years ago
- da62cb4 logcat: introduce split to logd and logpersist domains by Mark Salyzyn · 9 years ago
- 2e00e63 sepolicy: add version_policy tool and version non-platform policy. by dcashman · 9 years ago
- cb5f4a3 Prevent ptrace of logd on user builds by Nick Kralevich · 9 years ago
- 31e9f39 logd.te: Remove setting persist.sys. and sys.powerctl by Nick Kralevich · 9 years ago
- cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed (98%) from logd.te]
- 5c4435a logd: remove domain_deprecated attribute by Jeff Vander Stoep · 9 years ago
- bff9801 Enforce ioctl command whitelisting on all sockets by Jeff Vander Stoep · 9 years ago
- 7ef8073 audit domain_deprecated perms for removal by Jeff Vander Stoep · 9 years ago
- b6287b1 logd: Add setpcap for Minijail use. by Jorge Lucangeli Obes · 9 years ago
- 68d67a0 logpersist: reserve persist.logd.logpersistd by Mark Salyzyn · 9 years ago
- 7454133 dumpstate: access /data/misc/logd by Mark Salyzyn · 9 years ago
- 6937aa9 refine /data/misc/logd rules by Nick Kralevich · 9 years ago
- 9c16871 Allow logd.auditd to reboot to safe mode by Sami Tolvanen · 10 years ago
- 2f3979a logd: grant perms from domain_deprecated by Jeff Vander Stoep · 10 years ago
- 0c8286f SELinux rule for ro.device_owner and persist.logd.security by Rubin Xu · 10 years ago
- d22987b Create attribute for moving perms out of domain by Jeff Vander Stoep · 10 years ago
- 483fd26 Enforce no persistent logging on user builds by Jeff Vander Stoep · 10 years ago
- 0d22c6c logd: logpersistd by Mark Salyzyn · 10 years ago
- 61d665a logd: allow access to system files by Mark Salyzyn · 11 years ago
- 664ef57 logd: Add klogd by Mark Salyzyn · 11 years ago
- 45731c7 Annotate MLS trusted subjects and objects. by Stephen Smalley · 11 years ago
- 6252b63 logd: auditd: add permissions to access /dev/kmsg by Mark Salyzyn · 11 years ago
- 238a654 logd: add auditd by Mark Salyzyn · 11 years ago
- 1601132 Clean up socket rules. by Stephen Smalley · 12 years ago
- 8ed750e sepolicy: Add write_logd, read_logd & control_logd by Mark Salyzyn · 12 years ago