SELinux - Date Index
[Prev Page][Next Page]
- Re: Mirrors
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Tuna bitbucket repository wont git clone
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Mirrors
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Allow CTS Test apps to access to system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] socket permissions to untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Allow non-matched apps to launch when no match found
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] mediaserver and system require abstract socket connnection
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/2] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/2] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] installd unlink platform_app_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Platform app domain sdcard accesses
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Could we set them as "mlstrustedsubject"?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Could we set them as "mlstrustedsubject"?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Issue with setting booleans in SEManager app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Issue with setting booleans in SEManager app
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Joe Nall <joe@xxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Joe Nall <joe@xxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Questions about the MLS to "read down"
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Could we set them as "mlstrustedsubject"?
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Fix for build error no support ARM mode `smc #0'
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Support older compilers by wrapping smc .arch
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: [PATCH] Support older compilers by wrapping smc .arch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix broken peer recv check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH: system/core 4.0.4] Fix an init segfault.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH: system/core 4.0.4] Fix an init segfault.
- From: "Nogin, Aleksey" <anogin@xxxxxxx>
- [PATCH] Support older compilers by wrapping smc .arch
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap seandroid-tuna-3.0
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What is the reason for the denial?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What is the reason for the denial?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- What is the reason for the denial?
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH]: setfiles/restorecon minor improvements [was Re: [PATCH]: allow setfiles to continue on errors (new option)]
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] external/sepolicy: system r/w udp_socket of appdomain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] external/sepolicy: install daemon unlink application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] external/sepolicy: mediaserver open application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SE Android: bitbucket repo created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android: bitbucket repo created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [no subject]
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [no subject]
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] external/sepolicy: system r/w udp_socket of appdomain
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH]: allow setfiles to continue on errors (new option)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] external/sepolicy: install daemon unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- I have modified the policy for installd over app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH]: allow setfiles to continue on errors (new option)
- From: Pat McClory <pmcclory@xxxxxxxxxx>
- Re: [PATCH] Fix for build error no support ARM mode `smc #0'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 6/6] external/sepolicy: android_cts test denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] external/sepolicy: allow media_app read to application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Writing policy: default_contexts etc.
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH]: document the "-f" option in the setfiles' manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: allow setfiles to continue on errors (new option)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: fix symbolic links creation to the shared libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix broken peer recv check
- From: Chad Hanson <chanson@xxxxxxxxxxxxx>
- San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Is the CIL project still active
- From: Jeremy Solt <jsolt@xxxxxxxxxx>
- RE: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: Is the CIL project still active
- From: "Nogin, Aleksey" <anogin@xxxxxxx>
- RE: Is the CIL project still active
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: frameworks/base out of date, needs merge with upstream
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- frameworks/base out of date, needs merge with upstream
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap seandroid-omap-tuna-3.0
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Fix for build error no support ARM mode `smc #0'
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- packages/apps/settings master string localization
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- updates from Haiqing Jiang on Jul. 19
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 5/6] external/sepolicy: allow media_app read to application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 6/6] external/sepolicy: android_cts test denials
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- three patches to external/sepolicy
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qta
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] allow camera calibration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] We make two changes: 1. GPS-chip-requires-uart-rts-level-control; 2. We label our specific context to misc/camera(./*) in order to allow camera calibration.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] GPS chip requires uart rts level control
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] allow camera calibration
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] We make two changes: 1. GPS-chip-requires-uart-rts-level-control; 2. We label our specific context to misc/camera(./*) in order to allow camera calibration.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: Information about XSELinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seapp_contexts boolean support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Initial support for translatable SEAndroid strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- seapp_contexts boolean support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Initial support for translatable SEAndroid strings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Initial support for translatable SEAndroid strings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Information about XSELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- SE Android on provider with custom firmware
- From: "Kurt Ellzey" <kurt@xxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: The criteria for seandroid policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The criteria for seandroid policies
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- SEAndroid and OpenSSL/ECC support
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Add two device-specific labelings to target CSR GPS Chips.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] label gps proc entry as device-specific (instead of in ocontexts)
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/2] GPS chip accesses to uart driver when locationmanager launched.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Add two device-specific labelings to target CSR GPS Chips.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: build failure for SE Android 4.1.1_r1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: build failure for SE Android 4.1.1_r1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- build failure for SE Android 4.1.1_r1
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: [PATCH] Add build property ro.build.selinux when building
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] GPSLocation Provider needs socket connection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correct the denies of android.process.media when accessing to mtp_device
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correct denies of rpmsg device when accessing to remote processors.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android: 4.1/JB merged, 4.1.1 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Patches to target denies of GpsLocationProvider and media_app over mtp_device
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- dalvik2 libcore2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Local manifests
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libcore2 and dalvik2 in local_manifest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] local_manifest.xml for 4.1.1 branch has dalvik instead of dalvik2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Correct the denies of android.process.media when accessing to mtp_device
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] GPSLocation Provider needs socket connection
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Patches to target denies of GpsLocationProvider and media_app over mtp_device
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: Patches to target denies of LocationManager (GPS).
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: The order of policies in file "seapp_context"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: The order of policies in file "seapp_context"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The order of policies in file "seapp_context"
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- SE Android: 4.1/JB merged, 4.1.1 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] correct denies of inter system processes communication over named pipe
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Correct denies of rpmsg device when accessing to remote processors.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: external/strace build breakage
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android: Install-time MAC update, possible merge to seandroid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: Adding support for ro.build.selinux to Android.os.SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: external/strace build breakage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patches to target denies of LocationManager (GPS).
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Adding support for ro.build.selinux to Android.os.SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/strace build breakage
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patches to target denies of LocationManager (GPS).
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Corrected denials for LocationManager when accessing gps over uart.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] GPS chip accesses to uart driver when locationmanager launched.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Fwd: [PATCH] Add build property ro.build.selinux when building
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: include definition of new capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: do not check open perms if they are not known to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Installing SEAndroid on Mac OS X Lion (10.7.4)
- From: "Hsieh, George" <ghsieh@xxxxxxx>
- [PATCH 2/2] SELinux: do not check open perms if they are not known to policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] SELinux: include definition of new capabilities
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] Add new open_init_pty that doesn't waste CPU time
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/3] Remove policycoreutils/run_init/open_init_pty.c
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] Patch for mcstrans to not abort when it sees a squeeze config file
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 0/3] Patches from the Debian policycoreutils package
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/1] dix: Check whether grab allowed by security provider
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [V3] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/2] selinux: redefine a port definition to include the IP address
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 1/2] selinux: cleanup the security_node_sid() function
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/2] selinux: redefine a port definition to include the IP address
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/2] selinux: redefine a port definition to include the IP address
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: setools FTBFS in python module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Welcome to selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Welcome to selinux
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- setools FTBFS in python module
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Patch for mmac denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch for rild denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android: Install-time MAC update, possible merge to seandroid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- strange labelling error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android Galaxy Nexus recovery image
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Patch for mmac denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patch for rild denial
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patch for mmac denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: samsung galaxy nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- samsung galaxy nexus
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE Android local manifest patch dalvik and lobcore
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- [PATCH] SE Android local manifest patch dalvik and lobcore
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: AOSP commit 0cd29e3a3268f99ef0cb72a51782a35f407de1ae to manifests cause failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- AOSP commit 0cd29e3a3268f99ef0cb72a51782a35f407de1ae to manifests cause failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: AOSP patches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- AOSP patches
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- libsepol segmentation fault on policy load (role expansion)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add selinux network script to policy
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add selinux network script to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] ion fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH system/core] add SELinux network labeling script to startup
- From: jbrindle@xxxxxxxxxx
- [PATCH build] add selinux-network.sh to SELINUX_DEPENDS for SELinux network labeling
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/samsung] enable secmark labeling and netfilter security table for SE Android network access controls
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/tegra] Add security table to netfilter config
- From: jbrindle@xxxxxxxxxx
- [PATCH external/sepolicy] Add selinux network script to policy
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/goldfish] enable netfilter, secmark, and security tables
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/omap] Add security table to netfilter config
- From: jbrindle@xxxxxxxxxx
- Re: [PATCH] ion fix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] ion fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: KDE and SE Linux
- From: Hinnerk van Bruinehsen <h.v.bruinehsen@xxxxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH kernel/omap] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KDE and SE Linux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: KDE and SE Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add iptables script to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android patch -- Fix for bug on factory labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android patch -- Fix for bug on factory labeling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH external/sepolicy] Add iptables script to policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- KDE and SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH build] add iptables-selinux.sh to SELINUX_DEPENDS
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH external/sepolicy] Add iptables script to policy
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH kernel/omap] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH]: relabel all mount runtime files in the restorecond example config
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [v2] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- SE Android: Middleware MAC updates
- From: rpcraig <rpcraig@xxxxxxxxxxxxxx>
- RE: "operation not support" when execute #restorecon -R /
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Eamon Walsh <ewalsh.mailinglists@xxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Move context_copy() after switch block in ocontext_copy_*().
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 0/2] libsepol: fix segfault for missing initial sid context
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] libsepol: check for missing initial SID labeling statement.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Subject: [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- How to use the refpolicy in a embedded linux system?
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Boolean change of names.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Fix sel_netnode_insert suspicious rcu dereference
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Patches for maguro denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Patches for maguro denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol: Add always_check_network policy capability
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/3] SELinux: define mapping for new capabilities
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: Fix sel_netnode_insert suspicious rcu dereference
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] SELinux: require open policycap in truncate checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- SE Android: Middleware MAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: do not link static libraries from the system library directory
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH]: do not link static libraries from the system library directory
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH 52/90] policycoreutils: polgen: FIXME Add mgrepl patch to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/90] FIXME NO IDEA!!!
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/90] policycoreutils: FIXME add .tx to gitignore
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/90] libselinux: Fix bug in hidden_def FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 74/90] Po files updated from transifex
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/90] Add -N
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/90] libselinux: avc_netlink_recieve handle EINTR FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/90] policycoreutils: audit2allow: sepolgen-ifgen: use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/90] policycoreutils: setfiles: If you are not changing any
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 76/90] Sven Vermeulen patch for python3.2 support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/90] Fix sort selinux types of user controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 81/90] Optimize expand_filename_trans() function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 88/90] libselinux: libsemanage: more ruby python so file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 16/90] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/90] policycoreutils: FIXME Change restorecon to just
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/90] policycoreutils: newrole: FIXME do not drop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/90] policycoreutils: setfiles: FIXME Allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/90] libselinux: FIXME Allow SELinux labelling to support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/90] policycoreutils: run_init: FIXME If open_init_pty is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 86/90] Android/MacOS X build support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/90] fcontext customized was not returning the customized
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 89/90] libselinux: libsemanage: do not set soname needlessly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/90] policycoreutils: setfiles: Fix process_glob error
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/90] policycoreutils: restorecond: wrong options should
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 69/90] Fix boolean handling of = when setting multiple
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 85/90] Android/MacOS X build support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/90] policycoreutils: Make restorecon return 0 when a file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/90] policycoreutils: semanage: only allow enable/disable
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/90] libselinux: boolean name equivalency
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/90] Fix semanage dontaudit off to work correctly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/90] libsemanage: Use default semanage.conf as a fallback
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/90] policycoreutils: semanage: manpage update for -e
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/90] Fix template to place '
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/90] policycoreutils: mcstrans: add -f to run in foreground
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/90] policycoreutils: load_policy: do not force link file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 87/90] libselinux: additional makefile support for rubywrap
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 80/90] Add lnk_file handling to te_rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/90] policycoreutils: Disable user restorecond by default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 77/90] Allow matchpathcon to use multiple prefixes and test
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 73/90] realpath_not_final was returning '//NAME' if /NAME was
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/90] libselinux: libsemanage: remove build warning when
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 68/90] Fix missing error function and change to not use =
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 84/90] libselinux: label_android_property whitespace cleanups
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/90] policycoreutils: semanage: bash completion for modules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/90] Add support for not loading the kernel with semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/90] policycoreutils: Add Makefiles to support new gui code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/90] libselinux: Add support for lxc_contexts_path
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 72/90] Fortify source now requires all code to be compiled
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 75/90] Fixfiles needs to tell restorecon to ignore missing
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 83/90] libselinux: New Android property labeling backend
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/90] add some definition to the standard types available
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 66/90] Add rules to all streams to be stored in /tmp and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 67/90] sepolgen should follow symlinks and get the real path
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 82/90] Optimize expand_filename_trans() function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 71/90] asprintf return code must be checked
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/90] policycap for ptrace_child
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/90] Fix restorecon to return errors when bad paths are
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/90] policycoreutils: po: silence build process
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 79/90] Cleanup templates
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 78/90] Fix seusers potential crash. Change getdefaultcon to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/90] libselinux: audit2why: silence -Wmissing-prototypes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/90] Update translations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/90] checkpolicy: sepolgen: We need to support files that
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/90] policycoreutils: scripts: Don't syslog setfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Show SELinux packet type of packets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Show SELinux packet type of packets
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SE Android patch for internal fuse sdcard policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update patches for hci_attach service in SE Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Maguro denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add SELinux policy capability for always checking packet class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SE Android Maguro denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SE Android patch for internal fuse sdcard policy
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- setools python bindings are blowing up in Fedora 18 with latest compiler flags.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] Add SELinux policy capability for always checking packet class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 1/1] libsepol: Add always_check_packets policy capability
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Re: Show SELinux packet type of packets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: local_mainfest.xml
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update patches for hci_attach service in SE Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update patches for hci_attach service in SE Android
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Where to go for advice on local policy secuirity implications
- From: "James B. Byrne" <byrnejb@xxxxxxxxxxxxx>
- Re: Where to go for advice on local policy secuirity implications
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Where to go for advice on local policy secuirity implications
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Where to go for advice on local policy secuirity implications
- From: "James B. Byrne" <byrnejb@xxxxxxxxxxxxx>
- Re: Assertion failed in checkmodule
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] Two optimizations for libsepol
- From: Adam Tkac <atkac@xxxxxxxxxx>
- Show SELinux packet type of packets
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Update patches for hci_attach service in SE Android
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patch for bcrm_patchram_plus [DRAFT]
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: sepolgen requires unofficial setools patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sepolgen requires unofficial setools patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: sepolgen requires unofficial setools patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sepolgen requires unofficial setools patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: sepolgen requires unofficial setools patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- sepolgen requires unofficial setools patch
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- RE: local_mainfest.xml
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: local_mainfest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: local_mainfest.xml
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: local_mainfest.xml
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- local_mainfest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Tuna policy files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: Tuna policy files
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Tuna policy files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: fail to get seandroid code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- fail to get seandroid code
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: david caplan <dac@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: david caplan <dac@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: fix a RCU dereference in sel_netnode_insert()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] test_file: fix policy to allow building with relro
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: regression test of security policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: RFC: packet checks always on option
- From: Chad Hanson <chanson@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Assertion failed in checkmodule
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: labeled NFS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: tag avc cache alloc as non-critical
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: execute system-config-selinux while enforcing
- From: Andy Warner <warner@xxxxxxxxx>
- Re: regression test of security policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: execute system-config-selinux while enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- execute system-config-selinux while enforcing
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Mounting /sys within libselinux?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [1/4] sepgsql - add connection pooling server support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: regression test of security policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [1/4] sepgsql - add connection pooling server support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [3/4] sepgsql - Add temporary objects support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Can't login the embedded linux with seliux support
- From: casinee app <appcasinee@xxxxxxxxx>
- an't login
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Fred Aguirre <2playerfootball@xxxxxxxxx>
- Re: [3/4] sepgsql - Add temporary objects support
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: generate the policy for embedded device by seedit-cross
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: generate the policy for embedded device by seedit-cross
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: compile the libselinux for embedded device
- From: casinee <appcasinee@xxxxxxxxx>
- generate the policy for embedded device by seedit-cross
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: compile the libselinux for embedded device
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Success - SEAndroid on Galaxy Nexus maguro
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Success - SEAndroid on Galaxy Nexus maguro
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 49/49] libsepol: allocate enough space to hold filename in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: remove all unneeded AVC callback code
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [UPDATED] Patch for SE Android Manager AVC logging feature
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Any SELinux policy development/analysis training workshops?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- [ANN] Linux Security Summit 2012 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- [UPDATED] Patch for SE Android Manager AVC logging feature
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- libselinux: Provide new labeling backend
- From: rpcraig <rpcraig@xxxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- upcoming patch bomb!
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] make the RHEL4,5-only testcases exceptions obvious
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 1/1] XSELinux: Fix initialisation of polyinstantiated properties and selections
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Adding a booleans.subs file to selinux policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: michael <0xffdc@xxxxxxxxx>
- Re: DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: michael <0xffdc@xxxxxxxxx>
- Re: [PATCH 4/4] policycoreutils -- Make restorecon return 0 when a file has changed context with no error
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Requesting for materials regarding "SE Android"
- From: Fred Aguirre <2playerfootball@xxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Adding a booleans.subs file to selinux policy.
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] libsepol: introduce new policy capability ptrace_child
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Eric Paris <eparis@xxxxxxxxxx>
- Adding a booleans.subs file to selinux policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- seandroid-4.0.4 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Requesting for materials regarding "SE Android"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libsemanage test failure on several architectures
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- User Mode Linux
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Colin Walters <walters@xxxxxxxxxx>
- Android ashmem driver update
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: VirtualGL and selinux
- From: Mark Dalton <mdalton@xxxxxxxxxxxxx>
- Since we are sending patches for setools upstream.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 34/73] libselinux: Update Makefiles to handle /usrmove
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/73] policycoreutils: mcstrans: creating a pid file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]