- fa1b5c7 Revert "Update netlink_route_socket for nlmsg xperm" by Bo Hu · 9 months ago
- dd25127 Update netlink_route_socket for nlmsg xperm by Thiébaud Weksteen · 11 months ago
- 290f005 Add ITradeInMode service sepolicy. by David Anderson · 11 months ago
- 6543cf9 Allow priv_app to measure fs-verity on tmp apk files by Victor Hsieh · 1 year, 4 months ago
- 015429c Remove the usage of the pm.archiving.enabled system property by Song Chun Fan · 1 year, 5 months ago
- e972e93 Revert^2 "Add pm.archiving.enabled system property" by Inseob Kim · 1 year, 5 months ago
- 840041d Revert "Add pm.archiving.enabled system property" by Song Chun Fan · 1 year, 5 months ago
- 77a3ca6 Introduce vmlauncher_app domain by Jeongik Cha · 1 year, 5 months ago
- f09f43c Sepolicy for crosvm to show display by Jeongik Cha · 1 year, 5 months ago
- 92ca7b7 Stop granting permission to report_off_body to keystore2 by Eric Biggers · 1 year, 6 months ago
- 92b5ea2 Allow pm.archiving.enabled to be read by priv apps. am: 65af65df10 am: 8eb2acdca4 am: b909f63746 by Andrea Zilio · 1 year, 9 months ago
- 65af65d Allow pm.archiving.enabled to be read by priv apps. by Andrea Zilio · 1 year, 9 months ago
- 7f938f5 Add system_boot_reason read access to priv_app by Bell YAO · 1 year, 9 months ago
- 51cc740 Ignore access from priv_app to wifi_config_prop by Thiébaud Weksteen · 1 year, 11 months ago
- 5717c08 Add device_config read access to priv_app by Seigo Nonaka · 2 years ago
- f3722d5 strengthen app_data_file neverallows by Steven Moreland · 2 years, 4 months ago
- b56bf68 strengthen debugfs neverallows by Steven Moreland · 2 years, 4 months ago
- 941ba72 sepolicy: rework perfetto producer/profiler rules for "user" builds by Ryan Savitski · 2 years, 7 months ago
- dfb3182 allow com.android.vending to access vendor_apex_file by Deyao Ren · 3 years ago
- 3060852 Allow priv apps to use virtualizationservice by Alan Stokes · 2 years, 11 months ago
- 9aeba4f Allow private apps to report offbody events. by Josh Yang · 3 years, 7 months ago
- 4835071 Merge "sepolicy: add permissions for trace reporting" am: 34fb0d8933 am: dc933135a0 am: 6f8a4fc5d7 am: 5c159064bd by Lalit Maganti · 3 years, 7 months ago
- b549e2d sepolicy: add permissions for trace reporting by Lalit Maganti · 3 years, 9 months ago
- d5d189e Merge "Grant BetterBug access ot WM traces attributes" am: 53b6de0642 am: 2c95edf2af am: af4b21ef5b am: fea7cd0639 by Treehugger Robot · 3 years, 9 months ago
- 6b624a5 Grant BetterBug access ot WM traces attributes by Nataniel Borges · 3 years, 10 months ago
- 7f23ef4 priv_app: remove sysfs_net permissions bypass by Jeff Vander Stoep · 4 years ago
- 737b098 Allow priv_app to run the renderscript compiler. by Hongguang · 4 years, 3 months ago
- b382f02 [incfs] Allow everyone read the IncFS sysfs features by Yurii Zubrytskyi · 4 years, 5 months ago
- ae9645e Allow betterbug to read profile reports generated by profcollect by Yi Kong · 4 years, 6 months ago
- aa4ce95 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 7 months ago
- e92be7b Merge "Allow priv_app system_linker_exec:file execute_no_trans" by Elliott Hughes · 4 years, 7 months ago
- 25cb904 Allow priv_app system_linker_exec:file execute_no_trans by Elliott Hughes · 4 years, 7 months ago
- b4c9491 [selinux] allow priv_app to get incremental progress by Songchun Fan · 4 years, 7 months ago
- 0f01076 Allow dataloaders (priv_app) access to IncFs enabled property. by Alex Buynytskyy · 4 years, 7 months ago
- aa8bb3a Revert^3 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- a54bed6 Revert^2 "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Marco Ballesio · 4 years, 7 months ago
- 80dfa06 IncFS: update SE policies for the new API by Yurii Zubrytskyi · 4 years, 8 months ago
- 2bb8587 Allow shell + priv_app to traverse /data/misc/perfetto-traces by Primiano Tucci · 4 years, 8 months ago
- 2f99809 Allow dumpstate to snapshot traces and attach them to bug reports by Primiano Tucci · 4 years, 8 months ago
- a45cdda Allow priv_app read access to /data/app-staging directory by Mohammad Samiul Islam · 4 years, 9 months ago
- 51c04ac Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy" by Jonglin Lee · 4 years, 9 months ago
- f46d7a2 sepolicy: rules for uid/pid cgroups v2 hierarchy by Marco Ballesio · 4 years, 10 months ago
- a0518b7 Make kmsg_device mlstrustedobject. by Alan Stokes · 4 years, 11 months ago
- affe239 Add sepolicy for music recognition service. by Nick Moukhine · 5 years ago
- 3dbf3d8 Add wifi_hal_prop and remove exported_wifi_prop by Inseob Kim · 5 years ago
- 0709fbc Allow private app to access system app data file for ContentProvider by tianli · 5 years ago
- 01d4c99 Allow priv_app to search apex_data_file and read staging_data_file by Nikita Ioffe · 5 years ago
- 3db5a31 sepolicy: clean up redundant rules around gpuservice by Yiwei Zhang · 5 years ago
- 2679d8e [selinux] permissions on new ioctls for filling blocks by Songchun Fan · 5 years ago
- 82ea55d allow priv_apps to read from incremental_control_file by Songchun Fan · 6 years ago
- 3922253 permissions for incremental control file by Songchun Fan · 6 years ago
- e3f1d5a Create new mediaprovider_app domain. by Martijn Coenen · 6 years ago
- 5119bec Merge "Grant vold, installd, zygote and apps access to /mnt/pass_through" by Zimuzo Ezeozue · 6 years ago
- fcf599c Grant vold, installd, zygote and apps access to /mnt/pass_through by Zim · 6 years ago
- 9baf6d6 Merge "priv_app: Remove permissions for config_gz" by Treehugger Robot · 6 years ago
- 5ab5e8a priv_app: Remove permissions for config_gz by Ashwini Oruganti · 6 years ago
- 67a8248 initial policy for traced_perf daemon (perf profiler) by Ryan Savitski · 6 years ago
- db553aa priv_app: Remove permissions for selinuxfs by Ashwini Oruganti · 6 years ago
- 2e5ce26 Merge "priv_app: Remove permission to read from /data/anr/traces.txt" by Treehugger Robot · 6 years ago
- 565c685 priv_app: Remove permission to read from /data/anr/traces.txt by Ashwini Oruganti · 6 years ago
- d61b0ce priv_app: Remove rules for ota_package_file by Ashwini Oruganti · 6 years ago
- 65d6fd4 Merge "priv_app: Remove rules for system_update_service" by Ashwini Oruganti · 6 years ago
- 623fb38 Merge "priv_app: Remove rules allowing a priv-app to ptrace itself" by Treehugger Robot · 6 years ago
- a40840d priv_app: Remove rules for system_update_service by Ashwini Oruganti · 6 years ago
- 6df2792 Merge "priv_app: Remove rules for storaged" by Treehugger Robot · 6 years ago
- 2ba18e9 priv_app: Remove rules allowing a priv-app to ptrace itself by Ashwini Oruganti · 6 years ago
- 75ccb46 priv_app: Remove rules for keystore by Ashwini Oruganti · 6 years ago
- d1a8f0d priv_app: Remove rules for storaged by Ashwini Oruganti · 6 years ago
- 4f362b1 Merge "priv_app: Remove rules for update_engine" by Treehugger Robot · 6 years ago
- 5d395b2 priv_app: Remove rules for update_engine by Ashwini Oruganti · 6 years ago
- 977fdd9 priv_app.te: Remove auditallows for shell_data_file by Ashwini Oruganti · 6 years ago
- c9de5b5 gmscore_app: anr_data_file permissions by Ashwini Oruganti · 6 years ago
- f31e862 gmscore_app: shell_data_file permissions by Ashwini Oruganti · 6 years ago
- f1f7924 Merge "Allow application to find tethering service" by Treehugger Robot · 6 years ago
- 384858e Allow gmscore_app to write to /data/ota_package for OTA packages by Ashwini Oruganti · 6 years ago
- 9cc39d9 Allow application to find tethering service by markchien · 6 years ago
- 607bc67 Prevent apps from causing presubmit failures by Jeff Vander Stoep · 6 years ago
- 9b624df Merge "priv_app.te: Remove auditallow for privapp_data_file" by Treehugger Robot · 6 years ago
- b975142 priv_app.te: Remove auditallow for privapp_data_file by Ashwini Oruganti · 6 years ago
- 60c6d4e priv_app.te: Remove auditallow for statsd by Ashwini Oruganti · 6 years ago
- 9ba277d Allow gmscore to ptrace itself by Ashwini Oruganti · 6 years ago
- 9dfaa7d [Tether15] Allow system app to find TetheringManager by Mark Chien · 6 years ago
- e6ed127 Audit GMS core related allow rules in priv_app.te by Ashwini Oruganti · 6 years ago
- 90bd1de priv_app: supress more snet selinux denial on sysfs by Jeff Vander Stoep · 6 years ago
- 5e52281 Allow Java domains to be Perfetto producers. by Florian Mayer · 6 years ago
- 8a7bed9 Remove mediacodec_service. by Steven Moreland · 6 years ago
- 132b081 Remove perfprofd references. by Elliott Hughes · 6 years ago
- e319c03 priv_app: suppress denials to proc_net by Tri Vo · 6 years ago
- 565384d Sepolicy: add dynamic_system_prop by Hung-ying Tyan · 6 years ago
- 9cc5c09 Allow incidentd to communicate with clients over pipes. by Joe Onorato · 6 years ago
- 5c378a5 Clarify priv_app.te. by Alan Stokes · 6 years ago
- 544d6b3 Game Driver: sepolicy update for plumbing GpuStats into GpuService by Yiwei Zhang · 7 years ago
- 87e9123 disallow priv-apps from following untrusted app symlinks. by Nick Kralevich · 7 years ago
- ca0690e Allow heap profiling of certain app domains on user builds by Ryan Savitski · 7 years ago
- e1ddd74 drop priv_app app_data_file:file execute; by Nick Kralevich · 7 years ago
- dfc3c33 priv_app: remove /proc/net access by Nick Kralevich · 7 years ago
- f55c989 Constrain cgroups access. by Tri Vo · 7 years ago
- cacea25 Revert "Constrain cgroups access." by Nick Kralevich · 7 years ago
- 9899568 Constrain cgroups access. by Tri Vo · 7 years ago
- ce3e87c Add system_api_service to color_display_service by Christine Franks · 7 years ago