* Common Intermediate Language (CIL) Update
@ 2013-07-29 17:36 James Carter
2013-07-29 17:52 ` James Carter
` (2 more replies)
0 siblings, 3 replies; 10+ messages in thread
From: James Carter @ 2013-07-29 17:36 UTC (permalink / raw)
To: SELinux List; +Cc: Steve Lawrence
The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary
policies from a slightly modified version of Refpolicy that has been converted
to CIL.
Anyone interested in trying CIL out can do the following:
1) Clone the CIL compiler and cilpolicy
git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
git clone https://jwcarter@bitbucket.org/jwcarter/cilpolicy.git
2) Build secilc
cd secilc
make
cd ..
3) Build cilpolicy
./secilc/secilc `cat cilpolicy/LISTING`
To build an MLS policy:
Edit "cilpolicy/mls_declarations" and change "(tunable enable_mls false)" to
"(tunable enable_mls true)"
Build the MLS policy: ./secilc/secilc -M `cat cilpolicy/LISTING`
MCS is similar.
Anyone interested in trying to create their own CIL policy from Refpolicy can
clone the Flask Policy Parser (fpp) from bitbucket and follow the instructions
in the README. To clone fpp:
git clone https://jwcarter@bitbucket.org/jwcarter/fpp.git
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-07-29 17:36 Common Intermediate Language (CIL) Update James Carter
@ 2013-07-29 17:52 ` James Carter
2013-08-22 16:30 ` Richard Haines
2013-10-16 19:47 ` Common Intermediate Language (CIL) Update Dominick Grift
2 siblings, 0 replies; 10+ messages in thread
From: James Carter @ 2013-07-29 17:52 UTC (permalink / raw)
To: James Carter; +Cc: SELinux List, Steve Lawrence
On 07/29/2013 01:36 PM, James Carter wrote:
> The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary
> policies from a slightly modified version of Refpolicy that has been converted
> to CIL.
>
I meant to mention that the next step will be to integrate CIL into the SELinux
userspace toolchain.
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-07-29 17:36 Common Intermediate Language (CIL) Update James Carter
2013-07-29 17:52 ` James Carter
@ 2013-08-22 16:30 ` Richard Haines
2013-08-22 19:38 ` James Carter
2013-10-16 19:47 ` Common Intermediate Language (CIL) Update Dominick Grift
2 siblings, 1 reply; 10+ messages in thread
From: Richard Haines @ 2013-08-22 16:30 UTC (permalink / raw)
To: James Carter; +Cc: SELinux List
[-- Attachment #1: Type: text/plain, Size: 1802 bytes --]
Thanks for the updated CIL that has many useful fixes, however I notice that you removed the "permissionset" statement. Is this to be dropped altogether or just in your version (I've got lots in my test policy so thought I would ask before I change them all).
Richard
________________________________
From: James Carter <jwcart2@tycho.nsa.gov>
To: SELinux List <selinux@tycho.nsa.gov>
Cc: Steve Lawrence <slawrence@tresys.com>
Sent: Monday, 29 July 2013, 18:36
Subject: Common Intermediate Language (CIL) Update
The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary policies from a slightly modified version of Refpolicy that has been converted to CIL.
Anyone interested in trying CIL out can do the following:
1) Clone the CIL compiler and cilpolicy
git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
git clone https://jwcarter@bitbucket.org/jwcarter/cilpolicy.git
2) Build secilc
cd secilc
make
cd ..
3) Build cilpolicy
./secilc/secilc `cat cilpolicy/LISTING`
To build an MLS policy:
Edit "cilpolicy/mls_declarations" and change "(tunable enable_mls false)" to "(tunable enable_mls true)"
Build the MLS policy: ./secilc/secilc -M `cat cilpolicy/LISTING`
MCS is similar.
Anyone interested in trying to create their own CIL policy from Refpolicy can clone the Flask Policy Parser (fpp) from bitbucket and follow the instructions in the README. To clone fpp:
git clone https://jwcarter@bitbucket.org/jwcarter/fpp.git
-- James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[-- Attachment #2: Type: text/html, Size: 3361 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-08-22 16:30 ` Richard Haines
@ 2013-08-22 19:38 ` James Carter
2013-08-23 15:05 ` Richard Haines
0 siblings, 1 reply; 10+ messages in thread
From: James Carter @ 2013-08-22 19:38 UTC (permalink / raw)
To: Richard Haines; +Cc: SELinux List
On 08/22/2013 12:30 PM, Richard Haines wrote:
> Thanks for the updated CIL that has many useful fixes, however I notice that you removed the "permissionset" statement. Is this to be dropped altogether or just in your version (I've got lots in my test policy so thought I would ask before I change them all).
>
Yes, it is. Permissions can no longer be referred to apart from their class. Not
only was the permissionset statement removed, but permissions can no longer be
passed as an argument to a call.
Either classpermissionset or classmapping statements can be used to replace
them. I am sorry to say that this is a little bit more work up front, but I
think it makes sense for the overall policy.
> Richard
>
>
>
> ________________________________
> From: James Carter <jwcart2@tycho.nsa.gov>
> To: SELinux List <selinux@tycho.nsa.gov>
> Cc: Steve Lawrence <slawrence@tresys.com>
> Sent: Monday, 29 July 2013, 18:36
> Subject: Common Intermediate Language (CIL) Update
>
>
> The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary policies from a slightly modified version of Refpolicy that has been converted to CIL.
>
> Anyone interested in trying CIL out can do the following:
>
> 1) Clone the CIL compiler and cilpolicy
> git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
> git clone https://jwcarter@bitbucket.org/jwcarter/cilpolicy.git
>
> 2) Build secilc
> cd secilc
> make
> cd ..
>
> 3) Build cilpolicy
> ./secilc/secilc `cat cilpolicy/LISTING`
>
>
> To build an MLS policy:
>
> Edit "cilpolicy/mls_declarations" and change "(tunable enable_mls false)" to "(tunable enable_mls true)"
>
> Build the MLS policy: ./secilc/secilc -M `cat cilpolicy/LISTING`
>
> MCS is similar.
>
>
> Anyone interested in trying to create their own CIL policy from Refpolicy can clone the Flask Policy Parser (fpp) from bitbucket and follow the instructions in the README. To clone fpp:
> git clone https://jwcarter@bitbucket.org/jwcarter/fpp.git
>
> -- James Carter <jwcart2@tycho.nsa.gov>
> National Security Agency
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
> the words "unsubscribe selinux" without quotes as the message.
>
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-08-22 19:38 ` James Carter
@ 2013-08-23 15:05 ` Richard Haines
2013-08-23 15:18 ` James Carter
0 siblings, 1 reply; 10+ messages in thread
From: Richard Haines @ 2013-08-23 15:05 UTC (permalink / raw)
To: James Carter; +Cc: SELinux List
[-- Attachment #1: Type: text/plain, Size: 4039 bytes --]
Thanks for the bad news, anyway I've been trying the classmap / classmapping and not sure if this is a bug or
another change. The sample I've been using is (I just modified the test policy):
(classmap files_rw (read write))
(classmapping files_rw read
(file (open read getattr)))
(classmapping files_rw write
(file (execute_no_trans entrypoint execmod open audit_access))
(file (open write setattr)))
However the results vary between your version and the Tresys version as follows:
secil from git clone http://oss.tresys.com/git/cil.git cil
allow policy.console_t policy.t_1 : policy.file { write setattr execute_no_trans entrypoint execmod open audit_access } ;
allow policy.console_t policy.t_2 : policy.file { read getattr open } ;
secil from git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
allow policy.console_t policy.t_1 : policy.file { execute_no_trans entrypoint execmod open audit_access } ;
allow policy.console_t policy.t_2 : policy.file { read getattr open } ;
I think the Tresys version is correct (well I hope so)
Richard
________________________________
From: James Carter <jwcart2@tycho.nsa.gov>
To: Richard Haines <richard_c_haines@btinternet.com>
Cc: SELinux List <selinux@tycho.nsa.gov>
Sent: Thursday, 22 August 2013, 20:38
Subject: Re: Common Intermediate Language (CIL) Update
On 08/22/2013 12:30 PM, Richard Haines wrote:
> Thanks for the updated CIL that has many useful fixes, however I notice that you removed the "permissionset" statement. Is this to be dropped altogether or just in your version (I've got lots in my test policy so thought I would ask before I change them all).
>
Yes, it is. Permissions can no longer be referred to apart from their class. Not
only was the permissionset statement removed, but permissions can no longer be
passed as an argument to a call.
Either classpermissionset or classmapping statements can be used to replace
them. I am sorry to say that this is a little bit more work up front, but I
think it makes sense for the overall policy.
> Richard
>
>
>
> ________________________________
> From: James Carter <jwcart2@tycho.nsa.gov>
> To: SELinux List <selinux@tycho.nsa.gov>
> Cc: Steve Lawrence <slawrence@tresys.com>
> Sent: Monday, 29 July 2013, 18:36
> Subject: Common Intermediate Language (CIL) Update
>
>
> The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary policies from a slightly modified version of Refpolicy that has been converted to CIL.
>
> Anyone interested in trying CIL out can do the following:
>
> 1) Clone the CIL compiler and cilpolicy
> git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
> git clone https://jwcarter@bitbucket.org/jwcarter/cilpolicy.git
>
> 2) Build secilc
> cd secilc
> make
> cd ..
>
> 3) Build cilpolicy
> ./secilc/secilc `cat cilpolicy/LISTING`
>
>
> To build an MLS policy:
>
> Edit "cilpolicy/mls_declarations" and change "(tunable enable_mls false)" to "(tunable enable_mls true)"
>
> Build the MLS policy: ./secilc/secilc -M `cat cilpolicy/LISTING`
>
> MCS is similar.
>
>
> Anyone interested in trying to create their own CIL policy from Refpolicy can clone the Flask Policy Parser (fpp) from bitbucket and follow the instructions in the README. To clone fpp:
> git clone https://jwcarter@bitbucket.org/jwcarter/fpp.git
>
> -- James Carter <jwcart2@tycho.nsa.gov>
> National Security Agency
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
> the words "unsubscribe selinux" without quotes as the message.
>
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[-- Attachment #2: Type: text/html, Size: 6452 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-08-23 15:05 ` Richard Haines
@ 2013-08-23 15:18 ` James Carter
2013-08-25 16:15 ` CIL constraint problem Richard Haines
0 siblings, 1 reply; 10+ messages in thread
From: James Carter @ 2013-08-23 15:18 UTC (permalink / raw)
To: Richard Haines; +Cc: SELinux List
On 08/23/2013 11:05 AM, Richard Haines wrote:
> Thanks for the bad news, anyway I've been trying the classmap / classmapping and not sure if this is a bug or
> another change. The sample I've been using is (I just modified the test policy):
>
> (classmap files_rw (read write))
>
> (classmapping files_rw read
> (file (open read getattr)))
>
> (classmapping files_rw write
> (file (execute_no_trans entrypoint execmod open audit_access))
> (file (open write setattr)))
>
> However the results vary between your version and the Tresys version as follows:
>
> secil from git clone http://oss.tresys.com/git/cil.git cil
> allow policy.console_t policy.t_1 : policy.file { write setattr execute_no_trans entrypoint execmod open audit_access } ;
> allow policy.console_t policy.t_2 : policy.file { read getattr open } ;
>
> secil from git clone https://jwcarter@bitbucket.org/jwcarter/secilc.git
> allow policy.console_t policy.t_1 : policy.file { execute_no_trans entrypoint execmod open audit_access } ;
> allow policy.console_t policy.t_2 : policy.file { read getattr open } ;
>
>
> I think the Tresys version is correct (well I hope so)
>
The Tresys version is correct. This is a bug. I will take a look at it.
Thanks for the report.
Jim
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* CIL constraint problem
2013-08-23 15:18 ` James Carter
@ 2013-08-25 16:15 ` Richard Haines
[not found] ` <521CD1D7.1070505@tresys.com>
0 siblings, 1 reply; 10+ messages in thread
From: Richard Haines @ 2013-08-25 16:15 UTC (permalink / raw)
To: James Carter; +Cc: selinux list
I've been trying the constraints in CIL and found they were not being
generated although I managed to fix this with the patch listed at the end.
However there is still a problem that I have not managed to track down and
that is where I use a typeattribute in the constraint. The following is an
example CIL policy segment:
; Start
(class file (execute_no_trans entrypoint execmod open audit_access))
(common file (ioctl read write create getattr setattr lock relabelfrom
relabelto append unlink link rename execute swapon quotaon mounton))
(classcommon file file)
(type ax_t)
(type bx_t)
(type cx_t)
(typeattribute attribute_1)
(typeattributeset attribute_1 ax_t)
(typeattributeset attribute_1 bx_t)
(typeattributeset attribute_1 cx_t)
(constrain (file (execute_no_trans)) (or (and (eq t2 attribute_1) (eq t1 ax_t)) (neq r1 r2)))
; End
The policy statement generated by secilc (note the Tresys version does the same):
constrain { file } { execute_no_trans }
(( t2 == attribute_1 ) and ( t1 == ax_t ) or ( r1 != r2 ));
However it should be:
constrain { file } { execute_no_trans }
(( t2 == { ax_t bx_t cx_t } ) and ( t1 == ax_t ) or ( r1 != r2 ));
Subject: [PATCH] Allow CIL to generate constraints
Before this, no constraint statements were generated.
---
src/cil_binary.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/cil_binary.c b/src/cil_binary.c
index e31f589..bbbc534 100644
--- a/src/cil_binary.c
+++ b/src/cil_binary.c
@@ -1971,14 +1971,14 @@ int cil_constrain_to_policydb(policydb_t *pdb, struct cil_symtab_datum *datum)
cil_list_for_each(curr, cil_constrain->classperms) {
struct cil_classperms *classperms = curr->data;
- if (classperms->flavor == CIL_CLASS) {
+ if (classperms->flavor == CIL_CLASSPERMS) {
key = ((struct cil_symtab_datum *)classperms->r.cp.class)->name;
rc = cil_constrain_to_policydb_helper(pdb, key, classperms->r.cp.perms, expr);
if (rc != SEPOL_OK) {
goto exit;
}
- } else if (classperms->flavor == CIL_MAP_CLASS) {
+ } else if (classperms->flavor == CIL_MAP_CLASSPERMS) {
struct cil_list_item *i = NULL;
cil_list_for_each(i, classperms->r.mcp.perms) {
struct cil_map_perm *cmp = i->data;
--
1.7.11.7
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: CIL constraint problem
[not found] ` <521CD1D7.1070505@tresys.com>
@ 2013-08-27 16:29 ` James Carter
0 siblings, 0 replies; 10+ messages in thread
From: James Carter @ 2013-08-27 16:29 UTC (permalink / raw)
To: Steve Lawrence; +Cc: Richard Haines, SELinux List
On 08/27/2013 12:20 PM, Steve Lawrence wrote:
> Yep, looks like we aren't expanding typeattributes in constraints. I have a fix
> for the master branch on oss, but Jim has made a few changes to how constraints
> work, so my patch doesn't apply cleanly. I'm also seeing a segfault on the nsa
> branch with the simple test cil file (test/policy.cil), still looking into that.
> I've attached the patch to the oss master branch if you'd like to give it a shot.
>
I am still looking at the previous bug with constraints and investigating
perhaps the same segfault. Expanding typeattributes won't be hard I just hadn't
realized that needed to be done for constraints. Hopefully, it won't take too
long to resolve this.
Jim
> - Steve
>
>
> On 08/25/2013 12:15 PM, Richard Haines wrote:
>> I've been trying the constraints in CIL and found they were not being
>> generated although I managed to fix this with the patch listed at the end.
>>
>> However there is still a problem that I have not managed to track down and
>> that is where I use a typeattribute in the constraint. The following is an
>> example CIL policy segment:
>>
>> ; Start
>> (class file (execute_no_trans entrypoint execmod open audit_access))
>> (common file (ioctl read write create getattr setattr lock relabelfrom
>> relabelto append unlink link rename execute swapon quotaon mounton))
>> (classcommon file file)
>> (type ax_t)
>> (type bx_t)
>> (type cx_t)
>> (typeattribute attribute_1)
>> (typeattributeset attribute_1 ax_t)
>> (typeattributeset attribute_1 bx_t)
>> (typeattributeset attribute_1 cx_t)
>> (constrain (file (execute_no_trans)) (or (and (eq t2 attribute_1) (eq t1
>> ax_t)) (neq r1 r2)))
>> ; End
>>
>> The policy statement generated by secilc (note the Tresys version does the same):
>> constrain { file } { execute_no_trans }
>> (( t2 == attribute_1 ) and ( t1 == ax_t ) or ( r1 != r2 ));
>>
>> However it should be:
>> constrain { file } { execute_no_trans }
>> (( t2 == { ax_t bx_t cx_t } ) and ( t1 == ax_t ) or ( r1 != r2 ));
>>
>>
>> Subject: [PATCH] Allow CIL to generate constraints
>>
>> Before this, no constraint statements were generated.
>> ---
>> src/cil_binary.c | 4 ++--
>> 1 file changed, 2 insertions(+), 2 deletions(-)
>>
>> diff --git a/src/cil_binary.c b/src/cil_binary.c
>> index e31f589..bbbc534 100644
>> --- a/src/cil_binary.c
>> +++ b/src/cil_binary.c
>> @@ -1971,14 +1971,14 @@ int cil_constrain_to_policydb(policydb_t *pdb, struct
>> cil_symtab_datum *datum)
>>
>> cil_list_for_each(curr, cil_constrain->classperms) {
>> struct cil_classperms *classperms = curr->data;
>> - if (classperms->flavor == CIL_CLASS) {
>> + if (classperms->flavor == CIL_CLASSPERMS) {
>> key = ((struct cil_symtab_datum *)classperms->r.cp.class)->name;
>>
>> rc = cil_constrain_to_policydb_helper(pdb, key,
>> classperms->r.cp.perms, expr);
>> if (rc != SEPOL_OK) {
>> goto exit;
>> }
>> - } else if (classperms->flavor == CIL_MAP_CLASS) {
>> + } else if (classperms->flavor == CIL_MAP_CLASSPERMS) {
>> struct cil_list_item *i = NULL;
>> cil_list_for_each(i, classperms->r.mcp.perms) {
>> struct cil_map_perm *cmp = i->data;
>>
>
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-07-29 17:36 Common Intermediate Language (CIL) Update James Carter
2013-07-29 17:52 ` James Carter
2013-08-22 16:30 ` Richard Haines
@ 2013-10-16 19:47 ` Dominick Grift
2013-10-16 20:50 ` James Carter
2 siblings, 1 reply; 10+ messages in thread
From: Dominick Grift @ 2013-10-16 19:47 UTC (permalink / raw)
To: James Carter; +Cc: SELinux List, Steve Lawrence
On Mon, 2013-07-29 at 13:36 -0400, James Carter wrote:
> The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary
> policies from a slightly modified version of Refpolicy that has been converted
> to CIL.
>
> Anyone interested in trying CIL out can do the following:
I cloned both the repositories in this mail as well as the one hosted by
tresys but no new commits in either
A couple of things stand out when i try this
both non-mls and mls policy have no constraints according to seinfo
both non-mls and mls policy have no neverallow rules according to seinfo
the non-mls policy has a category "c0"
I like what i am seeing a lot, unfortunately it is not really usable yet
because user land can't work with it yet, and i need it to create home
directory contexts
looking forward to and update to this
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Common Intermediate Language (CIL) Update
2013-10-16 19:47 ` Common Intermediate Language (CIL) Update Dominick Grift
@ 2013-10-16 20:50 ` James Carter
0 siblings, 0 replies; 10+ messages in thread
From: James Carter @ 2013-10-16 20:50 UTC (permalink / raw)
To: Dominick Grift; +Cc: SELinux List, Steve Lawrence
On 10/16/2013 03:47 PM, Dominick Grift wrote:
> On Mon, 2013-07-29 at 13:36 -0400, James Carter wrote:
>> The CIL compiler, secilc, is now able to create MLS, MCS, and non-MLS binary
>> policies from a slightly modified version of Refpolicy that has been converted
>> to CIL.
>>
>> Anyone interested in trying CIL out can do the following:
>
> I cloned both the repositories in this mail as well as the one hosted by
> tresys but no new commits in either
>
> A couple of things stand out when i try this
>
> both non-mls and mls policy have no constraints according to seinfo
An update will be coming soon that will fix that bug.
> both non-mls and mls policy have no neverallow rules according to seinfo
They are evaluated by CIL.
> the non-mls policy has a category "c0"
>
That might be a recent bug. I don't see it on some earlier policy binaries
generated by CIL.
> I like what i am seeing a lot, unfortunately it is not really usable yet
> because user land can't work with it yet, and i need it to create home
> directory contexts
>
The userspace stuff is coming along.
> looking forward to and update to this
>
Thanks for the comments.
--
James Carter <jwcart2@tycho.nsa.gov>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2013-10-16 20:50 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-07-29 17:36 Common Intermediate Language (CIL) Update James Carter
2013-07-29 17:52 ` James Carter
2013-08-22 16:30 ` Richard Haines
2013-08-22 19:38 ` James Carter
2013-08-23 15:05 ` Richard Haines
2013-08-23 15:18 ` James Carter
2013-08-25 16:15 ` CIL constraint problem Richard Haines
[not found] ` <521CD1D7.1070505@tresys.com>
2013-08-27 16:29 ` James Carter
2013-10-16 19:47 ` Common Intermediate Language (CIL) Update Dominick Grift
2013-10-16 20:50 ` James Carter
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.