SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 5/7] libsepol/cil: Check that permission is not an empty list
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/7] libsepol/cil: Use empty list for category expression evaluated as empty
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/7] libsepol/cil: Check for improper category range
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/7] libsepol/cil: Check if identifier is NULL when verifying name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/7] libsepol/cil: Use an empty list to represent an unknown permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: william.c.roberts@xxxxxxxxx
- [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 4/8] libselinux: fix required alignment for sha1.c on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 7/8] libselinux: DISABLE_BOOL move to include headers
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/8] libsepol/cil: disable symver on Mac builds
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/8] libsepol: build on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 3/8] libselinux: fix mac build warning when ANDROID_HOST=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 5/8] libselinux/utils: add noreturn to sefcontext_compile
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- speeding up nodups_specs, need large fc file.
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- read_spec_entry question
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- CIL policies which make secilc crash
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [SUSPECTED SPAM] [SUSPICIOUS MESSAGE] Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: do not suppress logging from libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol, libsemanage: fix linker scripts / map files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Gold linker build failures
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- restorecon -r goes up the tree?
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fuzzing secilc with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Daniel Cashman <dcashman@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/cil: fix double-free in cil categories parser
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: fix memory leak in __cil_fill_expr()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/3] Fuzzing secilc with AFL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: versioned ruby pkg-config and query vendorarchdir properly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: make -I imply -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/1] Makefile: make distclean target work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: renamed andriod label backend source file
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Question on restricting file access
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Makefile: make distclean target work
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: rename EMFLAGS to DISABLE_FLAGS
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: fix unused variable error
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libselinux: drop DISABLE_AVC=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libselinux: drop build config EMBEDDED=y
- From: william.c.roberts@xxxxxxxxx
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Do not always print a module name warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [Patch v2] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sefcontext_compile: do not fail silently
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: introduce configurable backends
- From: william.c.roberts@xxxxxxxxx
- Android Fork
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Use pp module name instead of filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Utility to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Add function to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: Use pp module name instead of filename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsemanage/tests: do not force using gcc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: silent -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop unused stdio_ext.h header file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libsepol: fix unused variable 'len' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libsepol: fix unused variable 'size' on mac build
- From: william.c.roberts@xxxxxxxxx
- Libsepol Mac Build Errors
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: kill logging check for selinux_enabled()
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] sandbox: do not try setup directories without -X or -M
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: "Secunia Research" <vuln@xxxxxxxxxxx>
- SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] Add libsepol and secil host and device targets
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add openrc_contexts functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 5/7] sepolicy: make info() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/7] sepolicy: info() and search() will return generators
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] sepolicy: update some users of search() to use setools directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/7] sepolicy: make search() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/7] sepolicy: initialize setools4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/7] sepolicy: rearrange vars together at the top
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9 (#2)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [RFC] mmap file_contexts and property_contexts:
- From: william.c.roberts@xxxxxxxxx
- Re: sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v5] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v4] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v4] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] sefcontext_compile: cleanup confusing usage message
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] sandbox: fix file labels on copied files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dave Quigley <dquigley@xxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] sandbox: fix file labels on copied files
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] sandbox: tests - close stdout of p1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- NFSv4.2 unlabeled_t on mountpoints
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix file/test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix file/test failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 5/5] libsepol: cil: Add cil_constraint_expr_to_policy()
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 4/5] libsepol: cil: Fix CIL_OP data assignment.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 3/5] libsepol: cil: Replace sensitivityorder statement.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 2/5] libsepol: cil: Remove duplicate sid policy declaration.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 1/5] libsepol: cil: Add userrole mapping to cil_gen_policy().
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: add support for pcre2
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: fix memory leak on pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/3] Make libsepol tests pass again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] remove system_u and s0 hardcoded strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] selinux: Create policydb version for Infiniband support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- Re: Creating a new port type
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Creating a new port type
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Creating a new port type
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- SELinux MLS Policies
- From: "Paul Bolton" <paul.a.bolton@xxxxxxxxx>
- [PATCH v2] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Or Gerlitz <gerlitz.or@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/3] selinux: detect invalid ebitmap
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: initialize structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- DBus
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] Make libsepol tests pass again
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: make "make test" fails when a CUnit test fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: tests: fix g_b_role_2 test
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] checkpolicy: add types associated to a role in the current scope when parsing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: ileyd <ileyd@xxxxxxxxxx>
- MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Add option to ignore restorecon_last
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 1/2] libselinux: Ignore restorecon_last in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] selinux: initialize structures
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] selinux: detect invalid ebitmap
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 2/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update libsepol to support the policy capability for AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]