SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/9] checkpolicy: Add support for ibendportcon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] checkpolicy,libsepol: drop unnecessary usage of s6_addr32
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 3/9] libsepol: Add Infiniband Pkey handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 9/9] semanage: Update man pages for infiniband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 4/9] checkpolicy: Add support for ibendportcon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 6/9] libsepol: Add IB end port handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 0/9] SELinux user space support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update mmap tests for map permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix CFLAGS definition
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- [PATCH] libselinux: Fix CFLAGS definition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: show checkreqprot status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does recvfrom(2) imply { getattr }?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [lkp-robot] [selinux] 089f088df7: BUG:unable_to_handle_kernel
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dan Stromberg <drsalists@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 09/10] policycoreutils: fixfiles: don't ignore `-F` when run in `-C` mode
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 07/10] policycoreutils: fixfiles: un-document `-R -a` option
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 02/10] policycoreutils: fixfiles: remove two unused variables
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 05/10] policycoreutils: fixfiles: if restorecon aborts, we should too
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 03/10] policycoreutils: fixfiles: syntax error
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 06/10] policycoreutils: fixfiles: refactor into the `set -u` dialect
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 10/10] policycoreutils: fixfiles: use a consistent order for options to restorecon
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 08/10] policycoreutils: fixfiles: remove bad modes of "relabel" command
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 04/10] policycoreutils: fixfiles: usage errors are fatal
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Does recvfrom(2) imply { getattr }?
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Why does Python want to read /proc/meminfo
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/utils: Fix build without system sepol.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add brief info to policydb
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: show checkreqprot status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: silence false-positive -Wwrite-strings warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] sepolicy/gui: Update text strings to use better gettext templates
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- libsemanage: remove/replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Full SELinux labels on loopback for UDP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: add selinuxenforced tool
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol/utils: Fix build without system sepol.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v2 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Full SELinux labels on loopback for UDP
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Add attribute expansion options
- From: Jeff Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: add selinuxenforced tool
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- open permission is sometimes spelled recvfrom
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 6/6] policycoreutils: fixfiles: deprecate -l option
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 2/6] policycoreutils: fixfiles: remove (broken) redundant code
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 4/6] policycoreutils: fixfiles: fix logging about R/O filesystems
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 3/6] policycoreutils: fixfiles: clarify exclude_dirs()
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 5/6] policycoreutils: fixfiles: move logit call outside of redirected function
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 1/2] libselinux/utils: add noreturn attribute to selinux_check_access's usage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsepol: silence false-positive -Wwrite-strings warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: semanage: is __default__ login map required?
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: semanage: is __default__ login map required?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage: is __default__ login map required?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semanage: is __default__ login map required?
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- MLS on centos 7
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- [PATCH 19/19] sepolicy/gui: Update text strings to use better gettext templates
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 18/19] sepolicy: info() should provide attributes for a TYPE
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 17/19] sepolicy: Fix several issues in 'sepolicy manpage -a'
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 16/19] sepolicy: setools.*Query wants a list in ruletype
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 15/19] dbus: Use text streams in selinux_server.py
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 14/19] policycoreutils/sepolicy: Define our own cmp()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 13/19] sepolicy/generate.py: Fix string formatting
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 12/19] sepolicy: Simplify policy types detection
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 11/19] sepolicy: Don't return filter(), use [ ] notation instead
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 10/19] sepolicy: Adapt to new the semodule list output
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 09/19] Fix typo in executable.py template.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 08/19] sepolicy: We should be creating _exec interfaces when we create the domtrans interface
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 07/19] sepolicy: ptrace should be a part of deny_ptrace boolean in TEMPLATETYPE_admin
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 06/19] Fix up generation of application policy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 05/19] policycoreutils/sepolicy: boolean.png is in help/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 04/19] sepolicy: Move svirt man page out of libvirt into its own
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 03/19] sepolicy: Add manpages for typealiased types
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 02/19] sepolicy: Fix spelling mistakes in commands in generated manpages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 01/19] policycoreutils/sepolicy: Add documentation for MCS separated domains
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Several sepolicy fixes from Fedora
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Remove util/selinux_restorecon.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: Remove util/selinux_restorecon.c
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Add selinux_check_access utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add permissive= entry to avc audit log
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH security-next 2/2] selinux: use pernet operations for hook registration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: remove lock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Implement LSM notification system
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH 1/3] selinux: Implement LSM notification system
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: remove lock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: remove lock files
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: remove lock files
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] security: hooks : Prevent security to persist in memory (PR #31)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Docker daemon in enforcing state
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 7/7] policycoreutils: make audit and pam support configurable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Docker daemon in enforcing state
- From: Umair Sarfraz <aquadestructor@xxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 7/7] policycoreutils: make audit and pam support configurable
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/7] Add includes for DESTDIR only in root Makefile
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/7] restorecond: get pcre cflags/libs from pkg-config
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/7] Makefiles: drop -L/-I to system paths
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] libselinux: PCRE_LDFLAGS is actually LDLIBS
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/7] libselinux: get pcre CFLAGS/LDFLAGS from pkg-config
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/7] policycoreutils: honour LINGUAS variable
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] libselinux: Add support for selinux_check_access_flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: last call for selinux 2.7-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] libselinux: Add support for selinux_check_access_flags
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] libselinux: Add support for selinux_check_access_flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 1/1] libselinux: Add support for selinux_check_access_flags
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] libselinux: Add support for selinux_check_access_flags
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] security: hooks : Prevent security to persist in memory (PR #31)
- From: Pirabarlen-Cheenaramen <selven@xxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: last call for selinux 2.7-rc1 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- last call for selinux 2.7-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Updating offline the commit_num file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux BoF at Open Source Summit Japan
- From: 中村雄一 / NAKAMURA,YUUICHI <yuichi.nakamura.fe@xxxxxxxxxxx>
- Updating offline the commit_num file
- From: Eduardo Barretto <ebarreto@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: Add CAP_MAC_ADMIN tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: remove lock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add CAP_MAC_ADMIN tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: remove lock files
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux "filtering" capabilities?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux "filtering" capabilities?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux "filtering" capabilities?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 4.12
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.12
- From: Paul Moore via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Cannot write policy to allow { relabelto }
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Cannot write policy to allow { relabelto }
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Cannot write policy to allow { relabelto }
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Cannot write policy to allow { relabelto }
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Cannot write policy to allow { relabelto }
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Cannot write policy to allow { relabelto }
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- let's revert e3cab998b48ab293a9962faf9779d70ca339c65d
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: show checkreqprot status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_checkreqprot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] show checkreqprot status in sestatus
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: add security_checkreqprot
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 0/2] show checkreqprot status in sestatus
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_checkreqprot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] policycoreutils: newrole: always initialize pw fields
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2 v2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_checkreqprot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2 v2] secilc: Add options to control the expansion of attributes
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] libsemanage: make semanage_..._destroy return void
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: correct spelling errors in module_to_cil.c comments
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_checkreqprot
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: add security_checkreqprot
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] secilc: Add options to control the expansion of attributes
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_status_get_seq() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_status_get_seq() function
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: add selinux_is_enforced() function
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: add selinux_is_enforced() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH] selinux: add selinux_status_get_seq() function
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 6/6] policycoreutils: newrole: always initialize pw fields
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] policycoreutils: newrole: do not free pw strings twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/6] libselinux: avoid calling strcmp() on a NULL pointer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/6] libselinux: getsebool: always free names
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] libsemanage: make semanage_..._destroy return void
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] libsepol: cil: check cil_fill_list return value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] secilc: Add options to control the expansion of attributes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 6/6] libsepol: do not wrap integers when checking bound
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] libselinux: make process_boolean() fail on invalid lines
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] libsemanage: drop checks on semanage_module_info_destroy() value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/load_policy: Drop is_selinux_enabled() check
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libsemanage: Save linked policy, skip re-link when possible
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] secilc: Add options to control the expansion of attributes
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Save linked policy, skip re-link when possible
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy flask generator script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- refpolicy flask generator script
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: correct spelling errors in module_to_cil.c comments
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: do not leak memory when an error occurs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: do not free attr_name twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage: revert "Skip policy module re-link when only setting booleans."
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: do not seg fault on sepol_*_key_free(NULL)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 6/6] libsepol: do not wrap integers when checking bound
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] libselinux: do not dereference a NULL pointer when calloc() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/6] libselinux: make process_boolean() fail on invalid lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] libsemanage: drop checks on semanage_module_info_destroy() value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS directory label inheritance rules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/6] libselinux: ensure that 4 columns are read from /proc/mounts
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] libsepol: refuse to load policies with no block
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS directory label inheritance rules
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: Dennis Sherrell <sherrellconsulting@xxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: <thomasclinganjones@xxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: Tom Jones <thomasclinganjones@xxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: Tom Jones <thomasclinganjones@xxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: MLS directory label inheritance rules
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- MLS directory label inheritance rules
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- RE: add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- add CONFIG_SECURITY_SELINUX_LOAD_ONCE
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [PATCH] policycoreutils/load_policy: Drop is_selinux_enabled() check
- From: Luis Ressel <aranea@xxxxxxxx>
- Setting booleans causes duplicate ports in semanage listings
- From: Carlos Rodrigues <cefrodrigues@xxxxxxxxx>
- Re: [PATCH 0/3 v3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: In module_to_cil create one attribute for each unique set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: [PATCH v2] libsepol: In module_to_cil create one attribute for each unique set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: In module_to_cil create one attribute for each unique set
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: newrole: pam_systemd fails after dbus message rejection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security_bounded_transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: security_bounded_transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- newrole: pam_systemd fails after dbus message rejection
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- security_bounded_transition
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: "J. Bruce Fields" <bfields@xxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Confining a Java process reading file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Confining a Java process reading file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Confining a Java process reading file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Confining a Java process reading file
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] selinux: Use an other error code for an input validation failure in sidtab_insert()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] selinux: Return an error code only as a constant in sidtab_insert()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] selinux: Return directly after a failed memory allocation in policydb_index()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] SELinux: Fine-tuning for two function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable bug
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: Running Java and JVM on SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Running Java and JVM on SELinux
- From: Rahmadi Trimananda <rtrimana@xxxxxxx>
- Re: ssh/cron access checks and my Play Machine
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable bug
- From: James Morris <jmorris@xxxxxxxxx>
- Re: selinux: Fix an uninitialized variable bug in range_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: Fix an uninitialized variable bug in range_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: ssh/cron access checks and my Play Machine
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: ssh/cron access checks and my Play Machine
- From: Dominick Grift <dac.override@xxxxxxxxx>
- ssh/cron access checks and my Play Machine
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Fix an uninitialized variable bug
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object manager confused
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object manager confused
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- userspace object manager confused
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: "J. Bruce Fields" <bfields@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: label for /proc directory (before mounting)
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: label for /proc directory (before mounting)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: label for /proc directory (before mounting)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: Tomeu Vizoso <tomeu.vizoso@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: "J. Bruce Fields" <bfields@xxxxxxxxxx>
- Re: label for /proc directory (before mounting)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- label for /proc directory (before mounting)
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH v2] libsepol: In module_to_cil create one attribute for each unique set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] libsepol: do not dereference a NULL pointer when stack_init() fails
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 46/46] selinuxfs: Use seq_puts() in sel_avc_stats_seq_show()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 44/46] selinux: Adjust two checks for null pointers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 42/46] selinux: One function call less in roles_init() after error detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 43/46] selinux: Use kmalloc_array() in sidtab_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 35/46] selinux: Return directly after a failed kzalloc() in perm_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 41/46] selinux: Move two assignments for the variable "rc" in roles_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 40/46] selinux: Return directly after a failed kzalloc() in roles_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 39/46] selinux: Move two assignments for the variable "rc" in ocontext_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 38/46] selinux: One function call less in five functions after null pointer detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 36/46] selinux: Move an assignment for the variable "rc" in mls_read_range_helper()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 37/46] selinux: Move an assignment for the variable "rc" in policydb_load_isids()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 34/46] selinux: Return directly after a failed kzalloc() in common_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 33/46] selinux: Move an assignment for the variable "rc" in class_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
- From: Tomeu Vizoso <tomeu.vizoso@xxxxxxxxxxxxx>
- Re: [PATCH 30/46] selinux: Return directly after a failed kzalloc() in role_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 32/46] selinux: Return directly after a failed kzalloc() in class_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 29/46] selinux: Return directly after a failed kzalloc() in type_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 28/46] selinux: Return directly after a failed kzalloc() in user_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 27/46] selinux: Move an assignment for the variable "rc" in sens_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 26/46] selinux: Improve another size determination in sens_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 25/46] selinux: Return directly after a failed kzalloc() in sens_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 24/46] selinux: Return directly after a failed kzalloc() in cat_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: In module_to_cil create one attribute for each unique set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 7/7] libsemanage: genhomedircon: fix possible double-free
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/7] libsemanage: do not dereference a NULL pointer when calloc() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/7] libsemanage: do not close uninitialized file descriptors
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/7] libsepol: fix use-after-free in sepol_user_clone()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/7] libsepol: constify sepol_genbools()'s boolpath parameter
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/7] libsepol: make process_boolean() fail on invalid lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/7] libsepol: do not dereference a NULL pointer when stack_init() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: In module_to_cil create one attribute for each unique set
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] policycoreutils/setfiles: stdout messages don't need program prefix
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: fixfiles should handle path arguments more robustly
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not dereference a NULL pointer when calloc() fails
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] mcstrans: fix typo in mcstransd.8 man page
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Add hexadecimal support for Xen ioportcon statements
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol: In module_to_cil create one attribute for each unique set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: Delete unnecessary variable assignments in policydb_index()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux: Fine-tuning for several function implementations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: Delete unnecessary variable assignments in policydb_index()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux: Fine-tuning for several function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: Move some assignments for the variable "rc" in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- FOSSASIA 2017 SELinux intro talk
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/3] policycoreutils/setfiles: don't scramble stdout and stderr together
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 1/3] policycoreutils/setfiles: stdout messages don't need program prefix
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 3/3] policycoreutils: fixfiles: remove useless use of cat
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 2/2] policycoreutils: fixfiles: handle unexpected spaces in command
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 1/2] policycoreutils: fixfiles should handle path arguments more robustly
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol/cil: do not dereference a NULL pointer when calloc() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] mcstrans: fix typo in mcstransd.8 man page
- From: Nikola Forró <nforro@xxxxxxxxxx>
- Re: selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: selinux: Move some assignments for the variable "rc" in policydb_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit 2017 - CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 00/46] SELinux: Fine-tuning for several function implementations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 23/46] selinux: Move an assignment for a pointer in range_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 22/46] selinux: Delete an unnecessary variable initialisation in range_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 21/46] selinux: Two function calls less in range_read() after error detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 20/46] selinux: Move four assignments for the variable "rc" in range_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 19/46] selinux: Return directly after a failed next_entry() in range_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 18/46] selinux: One function call less in filename_trans_read() after error detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 17/46] selinux: Delete an unnecessary variable assignment in filename_trans_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 16/46] selinux: Move two assignments for the variable "rc" in filename_trans_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 15/46] selinux: One check and function call less in genfs_read() after error detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 14/46] selinux: One function call less in genfs_read() after null pointer detection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 13/46] selinux: Move four assignments for the variable "rc" in genfs_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 12/46] selinux: Move assignments for two pointers in genfs_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 11/46] selinux: Return directly after a failed next_entry() in genfs_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/46] selinux: Move some assignments for the variable "rc" in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 09/46] selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/46] selinux: Delete an unnecessary return statement in policydb_destroy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 07/46] selinux: Delete unnecessary variable assignments in policydb_index()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 06/46] selinux: Use kcalloc() in policydb_index()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 05/46] selinux: Adjust four checks for null pointers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: security, hugetlbfs: write to user memory in hugetlbfs_destroy_inode
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH 04/46] selinux: Use kmalloc_array() in hashtab_create()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/46] selinux: Improve size determinations in four functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/46] selinux: Delete an unnecessary return statement in cond_compute_av()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 01/46] selinux: Use kmalloc_array() in cond_init_bool_indexes()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Grant Grundler <grundler@xxxxxxxxxxxx>
- [PATCH 1/3 v3] libsepol: Add ability to convert binary policy to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/3 v3] libsepol: Add ability to convert binary policy to policy.conf file
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/3 v3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/3 v3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: security, hugetlbfs: write to user memory in hugetlbfs_destroy_inode
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: security, hugetlbfs: write to user memory in hugetlbfs_destroy_inode
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- security, hugetlbfs: write to user memory in hugetlbfs_destroy_inode
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: security: double-free in superblock_doinit
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- security: double-free in superblock_doinit
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Grant Grundler <grundler@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Grant Grundler <grundler@xxxxxxxxxxxx>
- [PATCH] libsepol/cil: Add hexadecimal support for Xen ioportcon statements
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: net_admin audit for setsockopt SO_SNDBUFFORCE
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 0/3 v2] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: net_admin audit for setsockopt SO_SNDBUFFORCE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug#857660: SELinux: cannot sent policyload notice
- From: Simon McVittie <smcv@xxxxxxxxxx>
- Re: net_admin audit for setsockopt SO_SNDBUFFORCE
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/2] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/2] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3 v2] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bug#857660: SELinux: cannot sent policyload notice
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Allow hexadecimal numbers in Xen context rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix minor memory leak in checkpolicy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] checkpolicy: dereference rangehead after checking it was not NULL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: avoid freeing uninitialized values
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: make reporting conflicting type transitions work
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Bug#857660: SELinux: cannot sent policyload notice
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: net_admin audit for setsockopt SO_SNDBUFFORCE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- net_admin audit for setsockopt SO_SNDBUFFORCE
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/2] kernel: Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH 2/3 v2] libsepol: Add ability to convert binary policy to policy.conf file
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/3 v2] libsepol: Add ability to convert binary policy to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/3 v2] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/3 v2] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/3] libsepol/cil: Use hexadecimal numbers when writing Xen rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/3] libsepol: Update module_to_cil to output hexadecimal for Xen rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Allow hexadecimal numbers in Xen context rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/3] libsepol: Allow hexadecimal numbers in Xen context rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: Fix minor memory leak in checkpolicy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/1] checkpolicy: dereference rangehead after checking it was not NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsepol/cil: avoid freeing uninitialized values
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsepol/cil: make reporting conflicting type transitions work
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: newrole as su'ed root
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: newrole as su'ed root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping()
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- newrole as su'ed root
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: portcon in policy modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: portcon in policy modules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- portcon in policy modules
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH] python/semanage: fix export of fcontext socket entries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: tomcat_t domain behavior
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: tomcat_t domain behavior
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: tomcat_t domain behavior
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: tomcat_t domain behavior
- From: Gary Tierney <gary.tierney@xxxxxxx>
- tomcat_t domain behavior
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: Bug#857660: SELinux: cannot sent policyload notice
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add ability to convert binary policy to CIL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Python 3.6 invalid escape sequence deprecation fixes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: fix obtaining domain name in HTMLManPages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: check for address length in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for cgroupfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for cgroupfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: include sys/socket.h in host programs to have PF_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for cgroupfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: Add ability to convert binary policy to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/3] libsepol: Add ability to convert binary policy to policy.conf file
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: check for address length in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: isolate selinux_enforcing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: isolate selinux_enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Python 3.6 invalid escape sequence deprecation fixes
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Custom Process Label (SElinux)
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: Custom Process Label (SElinux)
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH] Python 3.6 invalid escape sequence deprecation fixes
- From: Ville Skyttä <ville.skytta@xxxxxx>
- isolate selinux_enforcing
- From: yangshukui <yangshukui@xxxxxxxxxx>
- Re: [PATCH v2] selinux: check for address length in selinux_socket_bind()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Custom Process Label (SElinux)
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: Custom Process Label (SElinux)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Custom Process Label (SElinux)
- From: Thomas <thomas@xxxxxxxxxxxxxx>
- Custom Process Label (SElinux)
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH 1/6] restorecond: add noreturn attribute to exitApp()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: check for address length in selinux_socket_bind()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH v2] selinux: check for address length in selinux_socket_bind()
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Fwd: Kernel repository updated to v4.11-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 6/6] policycoreutils: add noreturn attribute to usage()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] semodule-utils: add noreturn attribute to usage()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]