1. 09b27c7 Add "DO NOT ADD statements" comments to public by Inseob Kim · 1 year, 5 months ago
  2. 75806ef Minimize public policy by Inseob Kim · 1 year, 5 months ago
  3. 6b4c453 Allow ueventd to read apexd property by Suchang Woo · 3 years, 9 months ago
  4. e09c0ee Allow ueventd to access device-mapper. by David Anderson · 2 years, 4 months ago
  5. 16c1ae3 Add use_bionic_libs macro by Jiyong Park · 3 years, 8 months ago
  6. 74ed0f6 Give ueventd permissions to read /proc/bootconfig by Devin Moore · 4 years, 6 months ago
  7. 68c1986 Allow ueventd to read apex mount directories. by Jooyung Han · 5 years ago
  8. 55e5c9b Move system property rules to private by Inseob Kim · 6 years ago
  9. 0487fe0 ueventd: allow using external firmware handlers by Harpreet \"Eli\" Sangha · 6 years ago
  10. 2a67e94 Use a property instead of file to communicate cold boot done by Tom Cherry · 6 years ago
  11. a0f998e Allow bootstrap bionic only to init, ueventd, and apexd by Jiyong Park · 6 years ago
  12. 41a2abf Properly Treble-ize tmpfs access by Jeff Vander Stoep · 7 years ago
  13. c7f56cd Remove kmem_device selinux type. by Tri Vo · 7 years ago
  14. 342362a sepolicy: grant dac_read_search to domains with dac_override by Benjamin Gordon · 7 years ago
  15. 095fbea Strengthen ptrace neverallow rules by Nick Kralevich · 7 years ago
  16. 52a80ac Allow ueventd to insert modules by Tom Cherry · 7 years ago
  17. d8612de Suppress denial for ueventd to getattr by Inseob Kim · 7 years ago
  18. 90b21ee init is a dynamic executable by Jiyong Park · 7 years ago
  19. 98ef2ab ueventd: allow reading kernel cmdline by Bowgo Tsai · 7 years ago
  20. 7ae939e Revert "Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid" by Luis Hector Chavez · 8 years ago
  21. 9b2e0cb sepolicy: Add rules for non-init namespaces by Benjamin Gordon · 8 years ago
  22. 640e595 Allow callers of uevent_kernel_*() access to /proc/sys/kernel/overflowuid by Luis Hector Chavez · 8 years ago
  23. 91d398d Sync internal master and AOSP sepolicy. by Dan Cashman · 8 years ago
  24. 76aab82 Move domain_deprecated into private policy by Jeff Vander Stoep · 8 years ago
  25. 277a20e sepolicy: relabel /vendor by Sandeep Patil · 8 years ago
  26. c9cf736 file_context: explicitly label all file context files by Sandeep Patil · 8 years ago
  27. 3171829 Removing init and ueventd access to generic char files by Max Bires · 9 years ago
  28. 9e7a5b0 Auditing init and ueventd access to chr device files. by Max Bires · 9 years ago
  29. e78fa1b Revert "ueventd.te: auditallow device:chr_file" by Nick Kralevich · 9 years ago
  30. ed0b4eb ueventd.te: auditallow device:chr_file by Nick Kralevich · 9 years ago
  31. c27c23f /dev/port does not seem to be used, adding in rules to confirm. by Max · 9 years ago
  32. cc39f63 Split general policy into public and private components. by dcashman · 9 years ago[Renamed (98%) from ueventd.te]
  33. bff9801 Enforce ioctl command whitelisting on all sockets by Jeff Vander Stoep · 9 years ago
  34. 7ef8073 audit domain_deprecated perms for removal by Jeff Vander Stoep · 9 years ago
  35. 3b1ab2e prementive strike on merge conflicts by Jeff Vander Stoep · 9 years ago
  36. 98fbb31 Merge \"Simplify /dev/kmsg SELinux policy.\" am: aa2aa21902 by Elliott Hughes · 9 years ago
  37. 63b33dc Simplify /dev/kmsg SELinux policy. by Elliott Hughes · 9 years ago
  38. aeebec1 resolve merge conflicts of b71cf12 to nyc-dev-plus-aosp by dcashman · 9 years ago
  39. 17cfd3f Keep pre-existing sysfs write permissions. by dcashman · 9 years ago
  40. cd109d4 ueventd: allow getattr on blk and chr types. by William Roberts · 9 years ago
  41. 87c1147 Allow ueventd to relabel block devices by Mihai Serban · 9 years ago
  42. d41ad55 Allow ueventd to relabel block devices by Mihai Serban · 9 years ago
  43. 3493682 reduce duplicate SELinux rules by Nick Kralevich · 9 years ago
  44. f100b2c Create sysfs_hwrandom type. by dcashman · 9 years ago
  45. 85c0f8a Create sysfs_hwrandom type. by dcashman · 9 years ago
  46. 1c98332 Leftovers of SELinux policy reload mechanism by Janis Danisevskis · 9 years ago
  47. 36f255f Create sysfs_zram label. by dcashman · 10 years ago
  48. d22987b Create attribute for moving perms out of domain by Jeff Vander Stoep · 10 years ago
  49. e265197 Allow /dev/klog access, drop mknod and __null__ access by Nick Kralevich · 10 years ago
  50. 3e113ed neverallow ueventd to set properties by Nick Kralevich · 11 years ago
  51. 9f0682d Revert "Allow ueventd to set verity.* properties" by Sami Tolvanen · 11 years ago
  52. 47cd53a Allow ueventd to set verity.* properties by Sami Tolvanen · 11 years ago
  53. a7c04dc Remove domain:process from unconfined by Nick Kralevich · 11 years ago
  54. 1d2ff86 allow ueventd sysfs_type lnk_file by Nick Kralevich · 11 years ago
  55. b8bdfde ueventd: Add policy support for ueventd labeling changes by Nick Kralevich · 11 years ago
  56. 356f4be Restrict requesting contexts other than policy-defined defaults. by Stephen Smalley · 11 years ago
  57. 02dac03 Drop relabelto_domain() macro and its associated definitions. by Stephen Smalley · 11 years ago
  58. 9add1f0 Add sysfs_type attribute to sysfs, coalesce ueventd rules. by Stephen Smalley · 11 years ago
  59. 0a33375 ueventd: Adds permission to ueventd to access sysfs file by Ruchi Kandoi · 11 years ago
  60. 1601132 Clean up socket rules. by Stephen Smalley · 12 years ago
  61. 00739e3 Make the ueventd domain enforcing. by Nick Kralevich · 12 years ago
  62. 967f39a Move sysfs_devices_system_cpu to the central policy. by Nick Kralevich · 12 years ago
  63. 85c5fc2 Start confining ueventd by William Roberts · 12 years ago
  64. 77d4731 Make all domains unconfined. by repo sync · 12 years ago
  65. 50e37b9 Move domains into per-domain permissive mode. by repo sync · 12 years ago
  66. 77ec892 SELinux policy for users of libcutils klog_write. by Alex Klyubin · 12 years ago
  67. 7bb2a55 Give domains read access to security_file domain. by William Roberts · 12 years ago
  68. 4e0e74e Allow ueventd to relabel sysfs nodes. by Stephen Smalley · 12 years ago
  69. 41e5390 New dev_types and other minor adjustments. by rpcraig · 13 years ago
  70. f6f8710 Remove all denials caused by rild on tuna devices. Tested on a maguro variant. by William Roberts · 13 years ago
  71. c83d008 Policy changes to support running the latest CTS. by Stephen Smalley · 14 years ago
  72. 6261d6d Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file. by Stephen Smalley · 14 years ago
  73. 2dd4e51 SE Android policy. by Stephen Smalley · 14 years ago