- 99a4cbc Grant lockdown integrity to all processes by Thiébaud Weksteen · 1 year, 7 months ago
- 941ba72 sepolicy: rework perfetto producer/profiler rules for "user" builds by Ryan Savitski · 2 years, 7 months ago
- 685cc43 Merge "Ignore access to /proc/zoneinfo for apps" by Thiébaud Weksteen · 2 years, 11 months ago
- d601699 Ignore access to /proc/zoneinfo for apps by Thiébaud Weksteen · 2 years, 11 months ago
- 3060852 Allow priv apps to use virtualizationservice by Alan Stokes · 2 years, 11 months ago
- 8a5c159 Allow untrusted app to use virtualizationservice - even on user builds by Jiyong Park · 3 years, 4 months ago
- 3696a20 Revert "Revert "allow simpleperf to profile more app types."" by Yabin Cui · 3 years, 10 months ago
- 47d4b1f Allow test apps to use the virtualizationservice by Jiyong Park · 3 years, 11 months ago
- f96cd65 Restrict VM usage to platform_app. by Alan Stokes · 4 years ago
- b85fd25 Merge "Allow access to trace_data_file from untrusted_app context" by Pirama Arumuga Nainar · 4 years ago
- dd2079d Revert "allow simpleperf to profile more app types." by Yabin Cui · 4 years ago
- 0612731 Allow access to trace_data_file from untrusted_app context by Pirama Arumuga Nainar · 4 years ago
- 39f4970 SEPolicy for compos_verify_key. by Alan Stokes · 4 years ago
- 26de4c4 allow simpleperf to profile more app types. by Yabin Cui · 4 years, 2 months ago
- b61bcc8 Allow appdomain sepolicy search access to /mnt/media_rw by Zim · 4 years, 5 months ago
- bcfca1a Add SELinux lockdown policy by Thiébaud Weksteen · 4 years, 6 months ago
- 2543715 never allow untrusted apps accessing debugfs_tracing by Adam Shih · 4 years, 9 months ago
- 826b92f Clarify comments on 3rd party app attributes. by Steven Moreland · 5 years ago
- 3db5a31 sepolicy: clean up redundant rules around gpuservice by Yiwei Zhang · 5 years ago
- 67a8248 initial policy for traced_perf daemon (perf profiler) by Ryan Savitski · 6 years ago
- ffa0dd9 perf_event: rules for system and simpleperf domain by Ryan Savitski · 6 years ago
- 607bc67 Prevent apps from causing presubmit failures by Jeff Vander Stoep · 6 years ago
- b4d7815 Merge "Reland "sepolicy: rework ashmem_device permissions"" by Orion Hodson · 6 years ago
- b554a95 Reland "sepolicy: rework ashmem_device permissions" by Tri Vo · 6 years ago
- 5527d70 Revert "sepolicy: rework ashmem_device permissions" by Orion Hodson · 6 years ago
- 5e52281 Allow Java domains to be Perfetto producers. by Florian Mayer · 6 years ago
- d9dcea5 sepolicy: rework ashmem_device permissions by Tri Vo · 6 years ago
- bfcddbe sepolicy: remove ashmemd by Tri Vo · 6 years ago
- 8a7bed9 Remove mediacodec_service. by Steven Moreland · 6 years ago
- 132b081 Remove perfprofd references. by Elliott Hughes · 6 years ago
- 9fbc87c ashmem: expand app access by Tri Vo · 7 years ago
- 8b12ff5 Neverallow app open access to /dev/ashmem by Tri Vo · 7 years ago
- 931623e Audit execution of app_data_file by untrusted_app. by Alan Stokes · 7 years ago
- 877fe9d audit apps opening /dev/ashmem by Tri Vo · 7 years ago
- 544d6b3 Game Driver: sepolicy update for plumbing GpuStats into GpuService by Yiwei Zhang · 7 years ago
- 9ea8c07 allow untrusted_app_all system_linker_exec:file execute_no_trans by Nick Kralevich · 7 years ago
- 73d0a67 sepolicy for ashmemd by Tri Vo · 7 years ago
- 337f564 Allow permissions needed for gdb debugging by Nick Kralevich · 7 years ago
- 87e9123 disallow priv-apps from following untrusted app symlinks. by Nick Kralevich · 7 years ago
- 3e5668f Make Android Studio Instant Run work again by Nick Kralevich · 7 years ago
- ca0690e Allow heap profiling of certain app domains on user builds by Ryan Savitski · 7 years ago
- fb66c6f rename rs_data_file to app_exec_data_file by Nick Kralevich · 7 years ago
- 65a89c1 Revert "remove app_data_file execute" by Nick Kralevich · 7 years ago
- b362474 remove app_data_file execute by Nick Kralevich · 7 years ago
- 0eb0a16 bless app created renderscript files by Nick Kralevich · 7 years ago
- 55d9096 SEPolicy changes to allow kcov access in userdebug. by Dan Austin · 7 years ago
- 5dc2c8c Revert "Revert "Enforce execve() restrictions for API > 28"" by Yabin Cui · 7 years ago
- 15d1a12 Revert "Enforce execve() restrictions for API > 28" by Nick Kralevich · 7 years ago
- 0dd738d Enforce execve() restrictions for API > 28 by Nick Kralevich · 7 years ago
- 0bfa7b5 Switch to r_file_perms by Nick Kralevich · 7 years ago
- d78e07c Remove untrusted app access to /proc/net by Jeff Vander Stoep · 7 years ago
- c47e149 Revert "auditallow app_data_file execute" by Nick Kralevich · 7 years ago
- f3eb985 Remove legacy execmod access from API >= 26. by Nick Kralevich · 7 years ago
- d90d001 Revert "Remove legacy execmod access." by Nick Kralevich · 7 years ago
- 4738b93 auditallow app_data_file execute by Nick Kralevich · 7 years ago
- 41b21ee Delete untrusted_v2_app by Nick Kralevich · 7 years ago
- 23c9d91 Start partitioning off privapp_data_file from app_data_file by Nick Kralevich · 7 years ago
- 0f11ffc Remove legacy execmod access. by Alan Stokes · 7 years ago
- 708aa90 Temporarily add auditing of execmod by apps. by Alan Stokes · 7 years ago
- 9c7396d Suppress denials for apps accessing storage too early by Jeff Vander Stoep · 7 years ago
- 7a4af30 Start the process of locking down proc/net by Jeff Vander Stoep · 7 years ago
- 252b015 Allow getsockopt and setsockopt for Encap Sockets by Nathan Harold · 7 years ago
- 3aa7ca5 Add untrusted_app_27 by Jeff Vander Stoep · 7 years ago
- d93ef54 Hide some denials. by Joel Galenson · 7 years ago
- 278147e Adding permission for traceur to use content provider by Max Bires · 8 years ago
- ee26864 Allow More Apps to Recv UDP Sockets from SystemServer by Nathan Harold · 8 years ago
- c80f9e0 Perfetto SELinux policies by Primiano Tucci · 8 years ago
- 63f4677 Allow vendor apps to use surfaceflinger_service by Jeff Vander Stoep · 8 years ago
- 91d398d Sync internal master and AOSP sepolicy. by Dan Cashman · 8 years ago
- ef7b210 untrusted_apps: allow untrusted_apps to execute from /vendor/app by Sandeep Patil · 8 years ago
- eda4b88 Correct documentation in untrusted_app_all by Chad Brubaker · 8 years ago
- b93f049 Add media services to ephemeral_app by Chad Brubaker · 8 years ago
- b238fe6 Split preloads into media_file and data_file by Fyodor Kupolov · 8 years ago
- 9be90fb Revert "Remove execmod support for newer API versions" by Nick Kralevich · 9 years ago
- 38d3eca Remove execmod support for newer API versions by Nick Kralevich · 9 years ago
- b4f354f Move /proc/tty/drivers access to untrusted_app_25 by Nick Kralevich · 9 years ago
- 7291641 MediaCAS: adding media.cas to service by Chong Zhang · 9 years ago
- d152425 Allow all untrusted_apps to create ptys by Jeff Vander Stoep · 9 years ago
- bacb6d7 untrusted_app: policy versioning based on targetSdkVersion by Jeff Vander Stoep · 9 years ago