- 09b27c7 Add "DO NOT ADD statements" comments to public by Inseob Kim · 1 year, 5 months ago
- 75806ef Minimize public policy by Inseob Kim · 1 year, 5 months ago
- 6b4c453 Allow ueventd to read apexd property by Suchang Woo · 3 years, 9 months ago
- e09c0ee Allow ueventd to access device-mapper. by David Anderson · 2 years, 4 months ago
- 16c1ae3 Add use_bionic_libs macro by Jiyong Park · 3 years, 8 months ago
- 74ed0f6 Give ueventd permissions to read /proc/bootconfig by Devin Moore · 4 years, 6 months ago
- 68c1986 Allow ueventd to read apex mount directories. by Jooyung Han · 5 years ago
- 55e5c9b Move system property rules to private by Inseob Kim · 6 years ago
- 0487fe0 ueventd: allow using external firmware handlers by Harpreet \"Eli\" Sangha · 6 years ago
- 2a67e94 Use a property instead of file to communicate cold boot done by Tom Cherry · 6 years ago
- a0f998e Allow bootstrap bionic only to init, ueventd, and apexd by Jiyong Park · 6 years ago
- 41a2abf Properly Treble-ize tmpfs access by Jeff Vander Stoep · 7 years ago
- c7f56cd Remove kmem_device selinux type. by Tri Vo · 7 years ago
- 342362a sepolicy: grant dac_read_search to domains with dac_override by Benjamin Gordon · 7 years ago
- 095fbea Strengthen ptrace neverallow rules by Nick Kralevich · 7 years ago
- 52a80ac Allow ueventd to insert modules by Tom Cherry · 7 years ago
- d8612de Suppress denial for ueventd to getattr by Inseob Kim · 7 years ago
- 90b21ee init is a dynamic executable by Jiyong Park · 7 years ago
- 98ef2ab ueventd: allow reading kernel cmdline by Bowgo Tsai · 7 years ago
- 7ae939e Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid" by Luis Hector Chavez · 8 years ago
- 9b2e0cb sepolicy: Add rules for non-init namespaces by Benjamin Gordon · 8 years ago
- 640e595 Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid by Luis Hector Chavez · 8 years ago
- 91d398d Sync internal master and AOSP sepolicy. by Dan Cashman · 8 years ago
- 76aab82 Move domain_deprecated into private policy by Jeff Vander Stoep · 8 years ago
- 277a20e sepolicy: relabel /vendor by Sandeep Patil · 8 years ago
- c9cf736 file_context: explicitly label all file context files by Sandeep Patil · 8 years ago
- 3171829 Removing init and ueventd access to generic char files by Max Bires · 9 years ago
- 9e7a5b0 Auditing init and ueventd access to chr device files. by Max Bires · 9 years ago
- e78fa1b Revert "ueventd.te: auditallow device:chr_file" by Nick Kralevich · 9 years ago
- ed0b4eb ueventd.te: auditallow device:chr_file by Nick Kralevich · 9 years ago
- c27c23f /dev/port does not seem to be used, adding in rules to confirm. by Max · 9 years ago
- cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed (98%) from ueventd.te]
- bff9801 Enforce ioctl command whitelisting on all sockets by Jeff Vander Stoep · 9 years ago
- 7ef8073 audit domain_deprecated perms for removal by Jeff Vander Stoep · 9 years ago
- 3b1ab2e prementive strike on merge conflicts by Jeff Vander Stoep · 9 years ago
- 98fbb31 Merge \"Simplify /dev/kmsg SELinux policy.\" am: aa2aa21902 by Elliott Hughes · 9 years ago
- 63b33dc Simplify /dev/kmsg SELinux policy. by Elliott Hughes · 9 years ago
- aeebec1 resolve merge conflicts of b71cf12 to nyc-dev-plus-aosp by dcashman · 9 years ago
- 17cfd3f Keep pre-existing sysfs write permissions. by dcashman · 9 years ago
- cd109d4 ueventd: allow getattr on blk and chr types. by William Roberts · 9 years ago
- 87c1147 Allow ueventd to relabel block devices by Mihai Serban · 9 years ago
- d41ad55 Allow ueventd to relabel block devices by Mihai Serban · 9 years ago
- 3493682 reduce duplicate SELinux rules by Nick Kralevich · 9 years ago
- f100b2c Create sysfs_hwrandom type. by dcashman · 9 years ago
- 85c0f8a Create sysfs_hwrandom type. by dcashman · 9 years ago
- 1c98332 Leftovers of SELinux policy reload mechanism by Janis Danisevskis · 9 years ago
- 36f255f Create sysfs_zram label. by dcashman · 10 years ago
- d22987b Create attribute for moving perms out of domain by Jeff Vander Stoep · 10 years ago
- e265197 Allow /dev/klog access, drop mknod and __null__ access by Nick Kralevich · 10 years ago
- 3e113ed neverallow ueventd to set properties by Nick Kralevich · 11 years ago
- 9f0682d Revert "Allow ueventd to set verity.* properties" by Sami Tolvanen · 11 years ago
- 47cd53a Allow ueventd to set verity.* properties by Sami Tolvanen · 11 years ago
- a7c04dc Remove domain:process from unconfined by Nick Kralevich · 11 years ago
- 1d2ff86 allow ueventd sysfs_type lnk_file by Nick Kralevich · 11 years ago
- b8bdfde ueventd: Add policy support for ueventd labeling changes by Nick Kralevich · 11 years ago
- 356f4be Restrict requesting contexts other than policy-defined defaults. by Stephen Smalley · 11 years ago
- 02dac03 Drop relabelto_domain() macro and its associated definitions. by Stephen Smalley · 11 years ago
- 9add1f0 Add sysfs_type attribute to sysfs, coalesce ueventd rules. by Stephen Smalley · 11 years ago
- 0a33375 ueventd: Adds permission to ueventd to access sysfs file by Ruchi Kandoi · 11 years ago
- 1601132 Clean up socket rules. by Stephen Smalley · 12 years ago
- 00739e3 Make the ueventd domain enforcing. by Nick Kralevich · 12 years ago
- 967f39a Move sysfs_devices_system_cpu to the central policy. by Nick Kralevich · 12 years ago
- 85c5fc2 Start confining ueventd by William Roberts · 12 years ago
- 77d4731 Make all domains unconfined. by repo sync · 12 years ago
- 50e37b9 Move domains into per-domain permissive mode. by repo sync · 12 years ago
- 77ec892 SELinux policy for users of libcutils klog_write. by Alex Klyubin · 12 years ago
- 7bb2a55 Give domains read access to security_file domain. by William Roberts · 12 years ago
- 4e0e74e Allow ueventd to relabel sysfs nodes. by Stephen Smalley · 12 years ago
- 41e5390 New dev_types and other minor adjustments. by rpcraig · 13 years ago
- f6f8710 Remove all denials caused by rild on tuna devices. Tested on a maguro variant. by William Roberts · 13 years ago
- c83d008 Policy changes to support running the latest CTS. by Stephen Smalley · 14 years ago
- 6261d6d Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file. by Stephen Smalley · 14 years ago
- 2dd4e51 SE Android policy. by Stephen Smalley · 14 years ago