index
:
android_external_sepolicy
caf/cm-12.0
caf/cm-12.1
cm-10.1
cm-10.2
cm-11.0
cm-12.0
cm-12.1
cm-13.0
jellybean
jellybean-stable
mr1.1-staging
shipping/cm-11.0
stable/cm-10.2
stable/cm-11.0
stable/cm-11.0-XNF8Y
stable/cm-11.0-XNF9X
stable/cm-11.0-XNG2S
stable/cm-11.0-XNG3C
stable/cm-12.0-YNG1I
stable/cm-12.0-YNG1T
stable/cm-12.0-YNG1TA
stable/cm-12.0-YNG3C
stable/cm-12.0-YNG4N
stable/cm-12.1-YOG3C
stable/cm-12.1-YOG4P
stable/cm-12.1-YOG7D
stable/cm-13.0-ZNH0E
stable/cm-13.0-ZNH2K
stable/cm-13.0-ZNH2KB
stable/cm-13.0-ZNH5Y
staging/cm-12.0-caf
staging/cm-12.1
staging/cm-13.0+r22
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
untrusted_app.te
Commit message (
Expand
)
Author
Age
Files
Lines
*
Further restrict socket ioctls available to apps
Jeff Vander Stoep
2016-05-27
1
-1
/
+1
*
Merge "untrusted_apps: Allow untrusted apps to find healthd_service." into mn...
Nick Kralevich
2015-10-19
1
-0
/
+1
|
\
|
*
untrusted_apps: Allow untrusted apps to find healthd_service.
Ruchi Kandoi
2015-10-19
1
-0
/
+1
*
|
Allow untrusted_app to list services.
dcashman
2015-09-10
1
-0
/
+3
|
/
*
restrict app access to socket ioctls
Jeff Vander Stoep
2015-06-05
1
-11
/
+2
*
Allow MediaProvider to traverse /mnt/media_rw.
Jeff Sharkey
2015-05-19
1
-0
/
+4
*
Merge "Allow tty and wireless extensions ioctls" into mnc-dev
Jeff Vander Stoep
2015-05-15
1
-1
/
+2
|
\
|
*
Allow tty and wireless extensions ioctls
Jeff Vander Stoep
2015-05-15
1
-1
/
+2
*
|
dontaudit untrusted_app exec_type:file getattr
Nick Kralevich
2015-05-13
1
-0
/
+5
|
/
*
Update sepolicy to add label for /data/misc/perfprofd.
Dehao Chen
2015-05-06
1
-0
/
+7
*
Deny untrusted app ioctl access to MAC addr
Jeff Vander Stoep
2015-05-05
1
-0
/
+11
*
Expand access to gatekeeperd.
Alex Klyubin
2015-04-29
1
-4
/
+0
*
gatekeeperd: use more specific label for /data file
Nick Kralevich
2015-04-17
1
-0
/
+4
*
Enforce more specific service access.
dcashman
2015-04-09
1
-22
/
+0
*
Enforce more specific service access.
dcashman
2015-04-08
1
-6
/
+3
*
Enforce more specific service access.
dcashman
2015-04-07
1
-11
/
+0
*
Enforce more specific service access.
dcashman
2015-04-07
1
-7
/
+0
*
Enforce more specific service access.
dcashman
2015-04-07
1
-7
/
+0
*
Assign app_api_service attribute to services.
dcashman
2015-04-06
1
-6
/
+0
*
Assign app_api_service attribute to services.
dcashman
2015-04-03
1
-4
/
+0
*
Add system_api_service and app_api_service attributes.
dcashman
2015-04-03
1
-1
/
+4
*
Record observed service accesses.
dcashman
2015-04-01
1
-0
/
+7
*
Add graphicsstats service
John Reck
2015-03-27
1
-0
/
+1
*
Don't grant hard link capabilities by default.
Nick Kralevich
2015-03-27
1
-0
/
+8
*
neverallow untrusted_app as a mlstrustedsubject.
Stephen Smalley
2015-03-13
1
-0
/
+10
*
Move allow rules before neverallow rules.
Stephen Smalley
2015-03-13
1
-4
/
+4
*
Record observed bluetooth service access.
dcashman
2015-03-06
1
-0
/
+1
*
allow untrusted_app read /data/anr/traces.txt
Nick Kralevich
2015-03-05
1
-0
/
+8
*
move untrusted_app statement to the correct file.
Nick Kralevich
2015-03-05
1
-0
/
+5
*
Record observed system_server servicemanager service requests.
dcashman
2015-03-03
1
-0
/
+14
*
Allow platform_app access to keystore.
dcashman
2015-03-02
1
-1
/
+0
*
appdomain: relax netlink_socket neverallow rule
Nick Kralevich
2015-01-28
1
-1
/
+4
*
Record service accesses.
dcashman
2015-01-16
1
-37
/
+2
*
Remove known system_server service accesses from auditing.
dcashman
2015-01-15
1
-25
/
+41
*
Make system_server_service an attribute.
dcashman
2015-01-14
1
-0
/
+59
*
Restrict service_manager find and list access.
dcashman
2014-12-15
1
-12
/
+7
*
sepolicy: allow system apps to access ASEC
Pawit Pornkitprasan
2014-12-12
1
-1
/
+0
*
fix whitespace
Nick Kralevich
2014-10-14
1
-1
/
+1
*
relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets
Nick Kralevich
2014-09-21
1
-0
/
+3
*
Allow untrusted_app access to temporary apk files.
dcashman
2014-08-06
1
-0
/
+4
*
Further refined service_manager auditallow statements.
Riley Spahn
2014-07-18
1
-0
/
+1
*
Remove radio_service from untrusted_app auditallow.
Riley Spahn
2014-07-15
1
-0
/
+1
*
Add access control for each service_manager action.
Riley Spahn
2014-07-14
1
-0
/
+11
*
Don't use don't
Nick Kralevich
2014-07-09
1
-1
/
+1
*
ensure that untrusted_app can't set properties
Nick Kralevich
2014-07-09
1
-0
/
+6
*
Add neverallow rules further restricing service_manager.
Riley Spahn
2014-07-07
1
-0
/
+5
*
add execmod to various app domains
Nick Kralevich
2014-06-02
1
-2
/
+2
*
untrusted_app: neverallow debugfs
Nick Kralevich
2014-05-13
1
-0
/
+8
*
Make the untrusted_app domain enforcing.
Stephen Smalley
2014-05-01
1
-1
/
+0
*
Coalesce shared_app, media_app, release_app into untrusted_app.
Stephen Smalley
2014-04-04
1
-1
/
+17
[next]