- 09b27c7 Add "DO NOT ADD statements" comments to public by Inseob Kim · 1 year, 5 months ago
- 75806ef Minimize public policy by Inseob Kim · 1 year, 5 months ago
- 448bd57 Remove all module_request rules by Eric Biggers · 2 years, 1 month ago
- 9a18423 Merge "strengthen system_file neverallows" by Steven Moreland · 2 years, 4 months ago
- 9c2a5cf strengthen system_file neverallows by Steven Moreland · 2 years, 4 months ago
- 099da6d Allow netd to perform SIGKILL on process dnsmasq by Ken Chen · 2 years, 4 months ago
- cfdea5f Blocks untrusted apps to access /dev/socket/mdnsd from U by Yuyang Huang · 2 years, 8 months ago
- b13921c much more finegrained bpf selinux privs for networking mainline by Maciej Żenczykowski · 3 years, 4 months ago
- 309a355 Add permissions for new netd AIDL HAL by Devin Moore · 3 years, 4 months ago
- b30e888 Add search in bpf directory for bpfdomains by Stephane Lee · 3 years, 6 months ago
- 70b0a77 Add sepolicy for mdns service by paulhu · 3 years, 9 months ago
- c23fb98 update post bpf tethering mainline module split from netd by Maciej Żenczykowski · 4 years, 6 months ago
- d68cb48 apply 'fs_bpf_tethering' label to /sys/fs/bpf/tethering by Maciej Żenczykowski · 4 years, 7 months ago
- f8ad339 Introduce app_data_file_type attribute. by Alan Stokes · 4 years, 11 months ago
- b01e1d9 Revert "Introduce app_data_file_type attribute." by Alan Stokes · 4 years, 10 months ago
- 27e0c74 Introduce app_data_file_type attribute. by Alan Stokes · 4 years, 11 months ago
- 8f280b0 sepolicy support for cgroup v2 by Marco Ballesio · 5 years ago
- a0e7a6d Update language to comply with Android's inclusive language guidance by Jeff Sharkey · 5 years ago
- e49acfa Add dontaudit statement to suppress denials by Ken Chen · 5 years ago
- f8155a0 netd: suppress dir write to /system by Jeff Vander Stoep · 5 years ago
- 55e5c9b Move system property rules to private by Inseob Kim · 6 years ago
- 49c73b0 cut down bpf related privileges by Maciej Żenczykowski · 6 years ago
- ef1493d netd: remove freshly added neverallows by Maciej Żenczykowski · 6 years ago
- d4a692f netd does not require and should not have SYS_ADMIN nor module loading privs by Maciej Żenczykowski · 6 years ago
- 1086c7d wifi_stack: Move to network_stack process by Roshan Pius · 6 years ago
- 3aa1c17 sepolicy: Permission changes for new wifi mainline module by Roshan Pius · 6 years ago
- 44328c0 sepolicy - move public clatd to private by Maciej Żenczykowski · 6 years ago
- 6450e00 selinux - allow netd to create tun device and pass it in via open fd across execve to clatd cli by Maciej Żenczykowski · 6 years ago
- 487fcb8 selinux - netd - tighten down bpf policy by Maciej Żenczykowski · 6 years ago
- 554b334 Sepolicy for netutils_wrapper to use binder call by Luke Huang · 6 years ago
- 524f25e Add sepolicy for resolver service by Luke Huang · 7 years ago
- 780fbad Add NetworkStack policies for netd and netlink by Remi NGUYEN VAN · 7 years ago
- e3d625b SEPolicy updates for adding native flag namespace(netd). by chenbruce · 7 years ago
- 7b57104 Use bpfloader to create bpf maps instead of netd by Chenbo Feng · 7 years ago
- 5f3ba92 sepolicy changes for network stack app by Remi NGUYEN VAN · 7 years ago
- 5e37271 Introduce system_file_type by Nick Kralevich · 7 years ago
- 342362a sepolicy: grant dac_read_search to domains with dac_override by Benjamin Gordon · 7 years ago
- 23c9d91 Start partitioning off privapp_data_file from app_data_file by Nick Kralevich · 7 years ago
- 8a8d4ef public/netd.te: allow netd to operate icmp_socket that passed to it by Yongqin Liu · 7 years ago
- 7a4af30 Start the process of locking down proc/net by Jeff Vander Stoep · 7 years ago
- 4de238e Allow dumpstate to read property_type by Jaekyun Seok · 7 years ago
- bdf2a9c Rename qtaguid_proc to conform to name conventions by Jeff Vander Stoep · 7 years ago
- 569e22e netd: silence innocuous denials to /proc and /sys by Tri Vo · 7 years ago
- 566411e Add sepolicy to lock down bpf access by Chenbo Feng · 8 years ago
- 7ae939e Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid" by Luis Hector Chavez · 8 years ago
- 08f92f9 sepolicy: New sepolicy classes and rules about bpf object by Chenbo Feng · 8 years ago
- 254ad0d sepolicy: Allow mount cgroupv2 and bpf fs by Chenbo Feng · 8 years ago
- 9b2e0cb sepolicy: Add rules for non-init namespaces by Benjamin Gordon · 8 years ago
- cc781f7 Allow netd to read the /dev/xt_qtaguid by Chenbo Feng · 8 years ago
- 185941a sepolicy: allow netd to write to qtaguid file by Chenbo Feng · 8 years ago
- 640e595 Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid by Luis Hector Chavez · 8 years ago
- 8dabc2c Restrict netd fwk policy. by Tri Vo · 8 years ago
- 91d398d Sync internal master and AOSP sepolicy. by Dan Cashman · 8 years ago
- d7989e8 Merge "netd: relax binder neverallow rules for hwservices" am: 4fc64f2fc3 by Jeffrey Vander Stoep · 8 years ago
- 07c650e netd: relax binder neverallow rules for hwservices by Jeff Vander Stoep · 8 years ago
- 7c34e83 Move domain_deprecated into private policy by Jeff Vander Stoep · 8 years ago
- f692d2f Explicitly allow netd to take the iptables lock. am: 9273c1bb5c by Lorenzo Colitti · 8 years ago
- 9273c1b Explicitly allow netd to take the iptables lock. by Lorenzo Colitti · 8 years ago
- 34bc175 Merge "Revert "Temporarily revert the SELinux policy for persist.netd.stable_secret."" by Lorenzo Colitti · 8 years ago
- 5b3efd3 Revert "Temporarily revert the SELinux policy for persist.netd.stable_secret." by Lorenzo Colitti · 8 years ago
- 9822937 Merge "Temporarily revert the SELinux policy for persist.netd.stable_secret." by Lorenzo Colitti · 8 years ago
- 07e631d Temporarily revert the SELinux policy for persist.netd.stable_secret. by Lorenzo Colitti · 8 years ago
- 14a3cb2 SELinux policy for secure persistent netd storage am: abb1ba6532 am: 5ee87b0092 by Joel Scherpelz · 8 years ago
- abb1ba6 SELinux policy for secure persistent netd storage by Joel Scherpelz · 8 years ago
- 0f52004 Revert "SELinux policy for secure persistent netd storage" am: 06486796a4 by Bartosz Fabianowski · 8 years ago
- 0648679 Revert "SELinux policy for secure persistent netd storage" by Bartosz Fabianowski · 8 years ago
- 36efd0c SELinux policy for secure persistent netd storage am: ef1fd98b6a am: 9381cb3dce by Joel Scherpelz · 8 years ago
- ef1fd98 SELinux policy for secure persistent netd storage by Joel Scherpelz · 8 years ago
- 76aab82 Move domain_deprecated into private policy by Jeff Vander Stoep · 8 years ago
- f627e55 restore permissions to /vendor for non-treble devices by Jeff Vander Stoep · 8 years ago
- 516c9ab Merge changes from topic 'ipsec-svc-pick' into oc-dev by Nathan Harold · 8 years ago
- 4a580cc Fix lock logspam and remove domain_deprecated rule by Nick Kralevich · 8 years ago
- 63a9315 Update Common NetD SEPolicy to allow Netlink XFRM by Nathan Harold · 9 years ago
- 7eb3dd3b Update Common NetD SEPolicy to allow Netlink XFRM by Nathan Harold · 9 years ago
- 5251ad1 netd.te: drop dccp_socket support by Nick Kralevich · 9 years ago
- 606d2fd te_macros: introduce add_service() macro by William Roberts · 9 years ago
- dd649da domain_deprecated.te: remove /proc/net access by Nick Kralevich · 9 years ago
- cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed (96%) from netd.te]
- 59afa24 Change name in the rules after renaming dns_listener -> netd_listener by Michal Karpinski · 9 years ago
- 2802970 Add back fowner capability to netd by Christopher Wiley · 9 years ago
- bff9801 Enforce ioctl command whitelisting on all sockets by Jeff Vander Stoep · 9 years ago
- 7ef8073 audit domain_deprecated perms for removal by Jeff Vander Stoep · 9 years ago
- 8211568 Remove WiFi permissions from netd by Christopher Wiley · 9 years ago
- d29c1a0 SEPolicy to start hostapd via init by Christopher Wiley · 9 years ago
- 97db27d Define explicit label for wlan sysfs fwpath by Christopher Wiley · 9 years ago
- 17cfd3f Keep pre-existing sysfs write permissions. by dcashman · 9 years ago
- f7bfd48 Allow bugreports to dump the native netd service state. by Lorenzo Colitti · 9 years ago
- 71d6ddc selinux changes for DNS metrics. by Lorenzo Colitti · 9 years ago
- 423fd19 Update netlink socket classes. by Stephen Smalley · 10 years ago
- 5f376c1 Allow netd to check permissions. by Lorenzo Colitti · 10 years ago
- 9119f12 Revert "Revert "netd: restrict netd binder access to system_server"" by Lorenzo Colitti · 10 years ago
- b5594c2 Revert "netd: restrict netd binder access to system_server" by Lorenzo Colitti · 10 years ago
- 5445795 netd: restrict netd binder access to system_server by Jeff Vander Stoep · 10 years ago
- a92c7fe Merge "Allow the framework to communicate with netd via a binder service" into nyc-dev by Lorenzo Colitti · 10 years ago
- 5fba8e1 Permit bluetooth to run DhcpClient by Erik Kline · 10 years ago
- 24dcc8b Allow the framework to communicate with netd via a binder service by Lorenzo Colitti · 10 years ago
- 71a6a3e Allow netd to use NETLINK_SOCK_DIAG. by Lorenzo Colitti · 10 years ago
- 3351122 netd.te: Remove allow netd toolbox_exec:file rx_file_perms; by Nick Kralevich · 10 years ago
- d22987b Create attribute for moving perms out of domain by Jeff Vander Stoep · 10 years ago
- a3c97a7 Only allow toolbox exec where /system exec was already allowed. by Stephen Smalley · 10 years ago