SELinux - Date Index
[Prev Page][Next Page]
- Re: Porting seandroid to qualcomm MSM8960
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Porting seandroid to qualcomm MSM8960
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Porting seandroid to qualcomm MSM8960
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [UPDATE] Re: check_seapp script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: check_seapp script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH]: libselinux: improve the file_contexts.5 manual page
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2]: seobject.py must skip comments while reading external configuration files
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: seobject.py must skip comments while reading external configuration files (was Re: [refpolicy] [PATCH]: clarify the file_contexts.subs_dist configuration file usage)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: [UPDATE] Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [UPDATE] Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: overriding booleans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: overriding booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- overriding booleans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] per device seapp_context support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] per device seapp_context support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SE Android: Recent changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Support for device specific seapp_context additions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Support for device specific seapp_context additions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SE Android (Was: Re: Welcome to selinux)
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid policy question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- SEAndroid policy question
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- I think we need to quiet SELinux in log files on setattr.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: system_app should be signed platform
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- system_app should be signed platform
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Don't audit debugfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Adam Tkac <atkac@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seinfo tag label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Don't audit debugfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Don't audit debugfs
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: re-loadable policy support
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- seinfo tag label
- From: Leonard Miyata <l.miyata@xxxxxxxxxxxxxxx>
- re-loadable policy support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: repo commit broke repo init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- repo commit broke repo init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: init and /data/system policies
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: init and /data/system policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- init and /data/system policies
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- repo commands changing could break mirror scripts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android ZoneInfo Errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android ZoneInfo Errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Spelling correction and formatting fixed.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Consistent crash in selinux_ipv4_postroute?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Spelling correction and formatting fixed.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SE Android ZoneInfo Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Consistent crash in selinux_ipv4_postroute?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Ensure that we only close the selinux netlink socket once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Allow release_app getattr of netlink_selinux sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Nexus 7 not getting past bootloader
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Cloning Android repo's from bitbucket
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Allow release_app getattr of netlink_selinux sockets
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Untrusted_app gets route information
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Questions about the following denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] domain writes to cgroup pseudo filesystem
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Questions about the following denials
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] read permission over lnk_file to devices when android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/2] untrusted_app reads logs when android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Nexus 7 not getting past bootloader
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SEAndroid 4.0.4 make error since the code move
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Allow non-matched apps to launch when no match found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Allow CTS Test apps to access to system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] socket permissions to untrusted_app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mirrors
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: Mirrors
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Tuna bitbucket repository wont git clone
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Mirrors
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Mirrors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Allow CTS Test apps to access to system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] socket permissions to untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Allow non-matched apps to launch when no match found
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] mediaserver and system require abstract socket connnection
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/2] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/2] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] You can now specify a sebool= flag in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] installd unlink platform_app_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] installd unlink platform_app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Platform app domain sdcard accesses
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Platform app domain sdcard accesses
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Could we set them as "mlstrustedsubject"?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Could we set them as "mlstrustedsubject"?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Issue with setting booleans in SEManager app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Issue with setting booleans in SEManager app
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Joe Nall <joe@xxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: Joe Nall <joe@xxxxxxxx>
- Re: Questions about the MLS to "read down"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Questions about the MLS to "read down"
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Allow zygote to spawn non matched apps in permissive mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Could we set them as "mlstrustedsubject"?
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Fix for build error no support ARM mode `smc #0'
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Support older compilers by wrapping smc .arch
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: [PATCH] Support older compilers by wrapping smc .arch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for sebool in seapp_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix broken peer recv check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH: system/core 4.0.4] Fix an init segfault.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Support for sebool in seapp_contexts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH: system/core 4.0.4] Fix an init segfault.
- From: "Nogin, Aleksey" <anogin@xxxxxxx>
- [PATCH] Support older compilers by wrapping smc .arch
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap seandroid-tuna-3.0
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What is the reason for the denial?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What is the reason for the denial?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- What is the reason for the denial?
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH]: setfiles/restorecon minor improvements [was Re: [PATCH]: allow setfiles to continue on errors (new option)]
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] external/sepolicy: system r/w udp_socket of appdomain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] external/sepolicy: install daemon unlink application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] external/sepolicy: mediaserver open application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SE Android: bitbucket repo created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android: bitbucket repo created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [no subject]
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [no subject]
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH] external/sepolicy: system r/w udp_socket of appdomain
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH]: allow setfiles to continue on errors (new option)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] external/sepolicy: install daemon unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- I have modified the policy for installd over app_data_file
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH]: allow setfiles to continue on errors (new option)
- From: Pat McClory <pmcclory@xxxxxxxxxx>
- Re: [PATCH] Fix for build error no support ARM mode `smc #0'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 6/6] external/sepolicy: android_cts test denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] external/sepolicy: allow media_app read to application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Writing policy: default_contexts etc.
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH]: document the "-f" option in the setfiles' manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: allow setfiles to continue on errors (new option)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: fix symbolic links creation to the shared libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix broken peer recv check
- From: Chad Hanson <chanson@xxxxxxxxxxxxx>
- San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Is the CIL project still active
- From: Jeremy Solt <jsolt@xxxxxxxxxx>
- RE: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: Is the CIL project still active
- From: "Nogin, Aleksey" <anogin@xxxxxxx>
- RE: Is the CIL project still active
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: frameworks/base out of date, needs merge with upstream
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- frameworks/base out of date, needs merge with upstream
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- kernel/omap seandroid-omap-tuna-3.0
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Fix for build error no support ARM mode `smc #0'
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- packages/apps/settings master string localization
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/6] external/sepolicy: mediaserver open application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- updates from Haiqing Jiang on Jul. 19
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 5/6] external/sepolicy: allow media_app read to application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 4/6] external/sepolicy: system talk to rild via socket
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 6/6] external/sepolicy: android_cts test denials
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/3] external/sepolicy: the media apps from third-party are labeled with media_app instead of untrusted_app
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/3] external/sepolicy: install daemon link/unlink application data files
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- three patches to external/sepolicy
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 3/3] external/sepolicy: system r/w udp_socket of untrusted apps
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qta
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] allow camera calibration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] We make two changes: 1. GPS-chip-requires-uart-rts-level-control; 2. We label our specific context to misc/camera(./*) in order to allow camera calibration.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] GPS chip requires uart rts level control
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] allow camera calibration
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] We make two changes: 1. GPS-chip-requires-uart-rts-level-control; 2. We label our specific context to misc/camera(./*) in order to allow camera calibration.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: Information about XSELinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seapp_contexts boolean support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Initial support for translatable SEAndroid strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- seapp_contexts boolean support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Initial support for translatable SEAndroid strings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Initial support for translatable SEAndroid strings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Information about XSELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- SE Android on provider with custom firmware
- From: "Kurt Ellzey" <kurt@xxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- [PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: The criteria for seandroid policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The criteria for seandroid policies
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- SEAndroid and OpenSSL/ECC support
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Add two device-specific labelings to target CSR GPS Chips.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] label gps proc entry as device-specific (instead of in ocontexts)
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/2] GPS chip accesses to uart driver when locationmanager launched.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Add two device-specific labelings to target CSR GPS Chips.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: build failure for SE Android 4.1.1_r1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: build failure for SE Android 4.1.1_r1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- build failure for SE Android 4.1.1_r1
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: [PATCH] Add build property ro.build.selinux when building
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] GPSLocation Provider needs socket connection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correct the denies of android.process.media when accessing to mtp_device
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correct denies of rpmsg device when accessing to remote processors.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android: 4.1/JB merged, 4.1.1 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Patches to target denies of GpsLocationProvider and media_app over mtp_device
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- dalvik2 libcore2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Local manifests
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libcore2 and dalvik2 in local_manifest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] local_manifest.xml for 4.1.1 branch has dalvik instead of dalvik2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Support for ocontexts per device.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Correct the denies of android.process.media when accessing to mtp_device
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] GPSLocation Provider needs socket connection
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Patches to target denies of GpsLocationProvider and media_app over mtp_device
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: Patches to target denies of LocationManager (GPS).
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: The order of policies in file "seapp_context"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: The order of policies in file "seapp_context"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The order of policies in file "seapp_context"
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- SE Android: 4.1/JB merged, 4.1.1 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] correct denies of inter system processes communication over named pipe
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Correct denies of rpmsg device when accessing to remote processors.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Re: external/strace build breakage
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android: Install-time MAC update, possible merge to seandroid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: Adding support for ro.build.selinux to Android.os.SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: external/strace build breakage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patches to target denies of LocationManager (GPS).
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Adding support for ro.build.selinux to Android.os.SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- external/strace build breakage
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patches to target denies of LocationManager (GPS).
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] Corrected denials for LocationManager when accessing gps over uart.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- [PATCH] GPS chip accesses to uart driver when locationmanager launched.
- From: hqjiang <hqjiang1988@xxxxxxxxx>
- Fwd: [PATCH] Add build property ro.build.selinux when building
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anon_inodefs denials in SEAndroid with genlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SEAndroid: Labels of files in /data/data/APPDIR/lib directory
- From: Michal Mašek <michal.masek@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: include definition of new capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: do not check open perms if they are not known to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SEAndroid Licensing?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SEAndroid Licensing?
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Installing SEAndroid on Mac OS X Lion (10.7.4)
- From: "Hsieh, George" <ghsieh@xxxxxxx>
- [PATCH 2/2] SELinux: do not check open perms if they are not known to policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] SELinux: include definition of new capabilities
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] Add new open_init_pty that doesn't waste CPU time
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/3] Remove policycoreutils/run_init/open_init_pty.c
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] Patch for mcstrans to not abort when it sees a squeeze config file
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 0/3] Patches from the Debian policycoreutils package
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/1] dix: Check whether grab allowed by security provider
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [V3] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/2] selinux: redefine a port definition to include the IP address
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 1/2] selinux: cleanup the security_node_sid() function
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/2] selinux: redefine a port definition to include the IP address
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/2] selinux: redefine a port definition to include the IP address
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: setools FTBFS in python module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Is it time to move seandroid policy messages off of the selinux lists and onto there own list?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Welcome to selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Welcome to selinux
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Welcome to selinux
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- setools FTBFS in python module
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Patch for mmac denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch for rild denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: strange labelling error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android: Install-time MAC update, possible merge to seandroid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- strange labelling error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Galaxy Nexus recovery image
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android Galaxy Nexus recovery image
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Patch for mmac denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patch for rild denial
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Patch for mmac denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: samsung galaxy nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- samsung galaxy nexus
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE Android local manifest patch dalvik and lobcore
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Denials of changing wallpaper on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Denials of changing wallpaper on Galaxy Nexus
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- [PATCH] SE Android local manifest patch dalvik and lobcore
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: AOSP commit 0cd29e3a3268f99ef0cb72a51782a35f407de1ae to manifests cause failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- AOSP commit 0cd29e3a3268f99ef0cb72a51782a35f407de1ae to manifests cause failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: AOSP patches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- AOSP patches
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- libsepol segmentation fault on policy load (role expansion)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add selinux network script to policy
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add selinux network script to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] ion fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH system/core] add SELinux network labeling script to startup
- From: jbrindle@xxxxxxxxxx
- [PATCH build] add selinux-network.sh to SELINUX_DEPENDS for SELinux network labeling
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/samsung] enable secmark labeling and netfilter security table for SE Android network access controls
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/tegra] Add security table to netfilter config
- From: jbrindle@xxxxxxxxxx
- [PATCH external/sepolicy] Add selinux network script to policy
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/goldfish] enable netfilter, secmark, and security tables
- From: jbrindle@xxxxxxxxxx
- [PATCH kernel/omap] Add security table to netfilter config
- From: jbrindle@xxxxxxxxxx
- Re: [PATCH] ion fix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] ion fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: KDE and SE Linux
- From: Hinnerk van Bruinehsen <h.v.bruinehsen@xxxxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH kernel/omap] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KDE and SE Linux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: KDE and SE Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH external/sepolicy] Add iptables script to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android patch -- Fix for bug on factory labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android patch -- Fix for bug on factory labeling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH external/sepolicy] Add iptables script to policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH system/core] add iptables secmark labeling script to startup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- KDE and SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH kernel/goldfish] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH build] add iptables-selinux.sh to SELINUX_DEPENDS
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH external/sepolicy] Add iptables script to policy
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH system/core] add iptables secmark labeling script to startup
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH kernel/tegra] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH kernel/omap] enable secmark labeling for SE Android network access controls
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH]: relabel all mount runtime files in the restorecond example config
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [v2] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- SE Android: Middleware MAC updates
- From: rpcraig <rpcraig@xxxxxxxxxxxxxx>
- RE: "operation not support" when execute #restorecon -R /
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Eamon Walsh <ewalsh.mailinglists@xxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Move context_copy() after switch block in ocontext_copy_*().
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 0/2] libsepol: fix segfault for missing initial sid context
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] libsepol: check for missing initial SID labeling statement.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Subject: [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- How to use the refpolicy in a embedded linux system?
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Boolean change of names.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Boolean change of names.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Boolean change of names.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Fix sel_netnode_insert suspicious rcu dereference
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Patches for maguro denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Patches for maguro denials
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol: Add always_check_network policy capability
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 1/2] Add SELinux policy capability for always checking packet class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/2] Update SELinux policy capability to always check peer class.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- [PATCH 2/3] SELinux: define mapping for new capabilities
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: Fix sel_netnode_insert suspicious rcu dereference
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] SELinux: require open policycap in truncate checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: "operation not support" when execute #restorecon -R /
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- "operation not support" when execute #restorecon -R /
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- SE Android: Middleware MAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: do not link static libraries from the system library directory
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH]: do not link static libraries from the system library directory
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH 52/90] policycoreutils: polgen: FIXME Add mgrepl patch to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/90] FIXME NO IDEA!!!
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/90] policycoreutils: FIXME add .tx to gitignore
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/90] libselinux: Fix bug in hidden_def FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 74/90] Po files updated from transifex
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/90] Add -N
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/90] libselinux: avc_netlink_recieve handle EINTR FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/90] policycoreutils: audit2allow: sepolgen-ifgen: use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/90] policycoreutils: setfiles: If you are not changing any
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 76/90] Sven Vermeulen patch for python3.2 support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/90] Fix sort selinux types of user controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 81/90] Optimize expand_filename_trans() function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 88/90] libselinux: libsemanage: more ruby python so file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 16/90] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/90] policycoreutils: FIXME Change restorecon to just
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/90] policycoreutils: newrole: FIXME do not drop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/90] policycoreutils: setfiles: FIXME Allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/90] libselinux: FIXME Allow SELinux labelling to support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/90] policycoreutils: run_init: FIXME If open_init_pty is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 86/90] Android/MacOS X build support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/90] fcontext customized was not returning the customized
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 89/90] libselinux: libsemanage: do not set soname needlessly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/90] policycoreutils: setfiles: Fix process_glob error
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/90] policycoreutils: restorecond: wrong options should
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 69/90] Fix boolean handling of = when setting multiple
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 85/90] Android/MacOS X build support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/90] policycoreutils: Make restorecon return 0 when a file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/90] policycoreutils: semanage: only allow enable/disable
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/90] libselinux: boolean name equivalency
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/90] Fix semanage dontaudit off to work correctly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/90] libsemanage: Use default semanage.conf as a fallback
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/90] policycoreutils: semanage: manpage update for -e
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/90] Fix template to place '
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/90] policycoreutils: mcstrans: add -f to run in foreground
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/90] policycoreutils: load_policy: do not force link file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 87/90] libselinux: additional makefile support for rubywrap
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 80/90] Add lnk_file handling to te_rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/90] policycoreutils: Disable user restorecond by default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 77/90] Allow matchpathcon to use multiple prefixes and test
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 73/90] realpath_not_final was returning '//NAME' if /NAME was
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/90] libselinux: libsemanage: remove build warning when
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 68/90] Fix missing error function and change to not use =
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 84/90] libselinux: label_android_property whitespace cleanups
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/90] policycoreutils: semanage: bash completion for modules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/90] Add support for not loading the kernel with semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/90] policycoreutils: Add Makefiles to support new gui code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]