SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 3/4] checkpolicy: remove -lfl from LDLIBS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] libsepol/tests: use LDFLAGS when linking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] mcstrans/utils: make "make all" use $DESTDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2 v2] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2 v2] libsepol: check decl_id bounds before using it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2 v2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2 v2] libsepol, checkpolicy: convert rangetrans and filenametrans to hashtabs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol: do not write object_r types to policy file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools: cast increases required alignment of target type
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __ANDROID__ instead of ANDROID
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] enabled.c: Remove stdio_ext.h header
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] libsepol: check decl_id bounds before using it
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] libsepol: ebitmap: reject loading bitmaps with incorrect high bit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] libsepol: do not check decl->symtab[i].nprim
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] libsepol: do not modify p->p_roles.nprim in role_set_expand
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setools: cast increases required alignment of target type
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] procattr.c: Use __ANDROID__ instead of ANDROID
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 4.10
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] enabled.c: Remove stdio_ext.h header
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [PATCH 3/5] libsepol: ebitmap: reject loading bitmaps with incorrect high bit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libsepol: check decl_id bounds before using it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: do not check decl->symtab[i].nprim
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] libsepol: do not modify p->p_roles.nprim in role_set_expand
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v6 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: fix unknown magic section number error message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v5 2/9] IB/core: Enforce PKey security on QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v5 8/9] selinux: Add IB Port SMP access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/2] libsepol, checkpolicy: convert rangetrans and filenametrans to hashtabs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/2] libsepol: do not write object_r types to policy file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5/5] libsepol: fix unknown magic section number error message
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libsepol: make scope_index_destroy() more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/5] libsepol: do not crash when block->branch_list is NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: do not crash when a symbol does not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] libsepol: do not call a NULL function in additive_scopes_to_cil()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH v5 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH 2/2 v2] secilc: Add secil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Lenny Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: segmentation fault in additive_scopes_to_cil()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: segmentation fault in additive_scopes_to_cil()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- segmentation fault in additive_scopes_to_cil()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Remove unused permission definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Remove unused permission definitions
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] label_file.h: actually use the results of compat_validate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: normalize input to /sys/fs/selinux/enforce
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] label_file.h: actually use the results of compat_validate
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Add cil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH 2/2] policycoreutils: Add cil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy: treat -self as an error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- github issue trackers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: normalize enforce values from the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: normalize input to /sys/fs/selinux/enforce
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy disable error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy disable error
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: use Python-specific .so extension
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: audit2why: remove unused module_state structure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: use Python-specific .so extension
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix global "make install"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: audit2why: remove unused module_state structure
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] mcstrans: fix global "make install"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] sandbox: make test not fail on systems without SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] expand_terule_helper: cleanups
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] sandbox: make test not fail on systems without SELinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3 2/3] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 1/3] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 3/3] expand_terule_helper: cleanups
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Using "override CFLAGS += -I$(PREFIX)/include" in mcstrans?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Using "override CFLAGS += -I$(PREFIX)/include" in mcstrans?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 1/2] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] mcstrans: Fix signed/unsigned warnings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: what is the purpose of security initial sid?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/2] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: what is the purpose of security initial sid?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- what is the purpose of security initial sid?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: test for ebitmap_read() negative return value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 5/5] restorecond: Add gitignore
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/5] mcstrans: Add utils gitignore
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/5] Add stub make test targets to new subdirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/5] mcstrans: take LIBDIR from args, dont guess
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: replace an assert with an error message
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: test for ebitmap_read() negative return value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: cil_lexer: make warnings non-fatal for building
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: use a macro prefixed with SEMANAGE to protect dso.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: cil_lexer: make warnings non-fatal for building
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libsemanage: use a macro prefixed with SEMANAGE to protect dso.h
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v3] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v3] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] Revert "libsepol: fix checkpolicy dontaudit compiler bug"
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux, libsemanage: swig: use SWIG_fail when an error occurs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] secilc: do not build secilc man page if it is up to date
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] libselinux,libsemanage: link Python wrapper with Python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Use GObject introspection binding instead of python-gobject in selinux_server.py
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: cil: remove double-free.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] libselinux, libsemanage: swig: use SWIG_fail when an error occurs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libselinux,libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] secilc: do not build secilc man page if it is up to date
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/4] libselinux,libsemanage: link Python wrapper with Python
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/4] libsemanage: query for python site-packages dir directly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] libselinux,libsemanage: link Ruby wrapper with -lruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] libselinux,libsemanage: use Ruby to define RUBYINC
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/4] selinux: Clean up initialization of isec->sclass
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] proc: Pass file mode to proc_pid_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] selinux: Minor cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: semanage_seuser_key_create: copy name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security: selinux - Improvement in code readability when
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Security: selinux - Improvement in code readability when
- From: Shailendra Verma <shailendra.v@xxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- how to assign process to user
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: Policy disable error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Diskless system running SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] policycoreutils: Force GTK3.0 for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Use GObject introspection binding instead of python-gobject in selinux_server.py
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH 1/1] libsemanage: semanage_seuser_key_create: copy name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS is disabled, but MLS context "s0" found
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- MLS is disabled, but MLS context "s0" found
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: cil: remove double-free.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- checkpolicy dontaudit compiler bug?
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 0/4] selinux: Fix invalidate deadlock with GFS2
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 2/4] proc: Pass file mode to proc_pid_make_inode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 3/4] selinux: Clean up initialization of isec->sclass
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 1/4] selinux: Minor cleanups
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Leon Romanovsky <leonro@xxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RE: GPF in sidtab_context_to_sid
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH v4 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: GPF in sidtab_context_to_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- GPF in sidtab_context_to_sid
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: sepol_{bool|iface|user}_key_create: copy name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm19827 <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm19827 <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Make sepolicy work with python3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: setsebool or audit2allow rule
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: setsebool or audit2allow rule
- From: Vaughn Clinton <vclinton@xxxxxxx>
- Re: setsebool or audit2allow rule
- From: Dominick Grift <dac.override@xxxxxxxxx>
- setsebool or audit2allow rule
- From: Vaughn Clinton <vclinton@xxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsemanage: remove ruby_semanage.so with "make clean"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux: remove rpm_execcon from SWIG wrappers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Security context of shared libraries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Security context of shared libraries
- From: mm <mm19827@xxxxxxxxx>
- Re: [PATCH] Revert "libselinux: support new python3 functions"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] mqueue: security xattr setting on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] mqueue: security xattr setting on inode creation
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] policycoreutils: Run 2to3 over the sepolicy python code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: Run 2to3 over the sepolicy python code
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- selinux user to linux mapping
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: ANN: Reference Policy Release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] Revert "libselinux: support new python3 functions"
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libsemanage: fix kernel pathname in semanage_verify_kernel()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: Reference Policy Release
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/utils: fix all the noreturn errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: avc_internal.c: allow building with clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: avc_internal.c: allow building with clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux/utils: fix all the noreturn errors
- From: william.c.roberts@xxxxxxxxx
- Backtrace in sandbox command
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libselinux: avc_internal.c: allow building with clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix compiler flags for linux + clang
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use-after-free in semanage boolean with Python 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Use-after-free in semanage boolean with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add symver with explicit version to build with ld.gold
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: restorecond: use pkg-config to find dbus-glib-1 files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Add symver with explicit version to build with ld.gold
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: POSIX mqueues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: State of rpm_execcon SWIG wrapper
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- secilc crashes on unknown permissions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- State of rpm_execcon SWIG wrapper
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] policycoreutils: restorecond: use pkg-config to find dbus-glib-1 files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS issue
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: mmap: fix shmat SHM_EXEC test for old policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: mmap: fix shmat SHM_EXEC test for old kernels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix pointer handling in realpath_not_final
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Allow overriding libsepol.a location during build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: add shmat SHM_EXEC test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- selinux: should execmem disable shmat(..., SHM_EXEC)?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: selinux: should execmem disable shmat(..., SHM_EXEC)?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix pointer handling in realpath_not_final
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH] libselinux: Allow overriding libsepol.a location during build
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Mapping of subject context to CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Mapping of subject context to CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: POSIX mqueues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: POSIX mqueues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork Dies on AOSP
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Android Fork Dies on AOSP
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Gold linker build failures
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: Gold linker build failures
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: POSIX mqueues
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- RE: Question for the experts -- DIRTY COW and SELinux
- From: Sean Hulbert <SHulbert@xxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Judd Meinders <judd.meinders@xxxxxxxxxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Question for the experts -- DIRTY COW and SELinux
- From: Robert Lee <robert.lee@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] [RFC] nodups_specs: speedup
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: cil: cil_strpool: Allow multiple strpool users.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol: cil: cil_strpool: Allow multiple strpool users.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 6/7] libsepol/cil: Verify alias in aliasactual statement is really an alias
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 7/7] libsepol/cil: Verify neither child nor parent in a bounds is an attribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/7] libsepol/cil: Check that permission is not an empty list
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/7] libsepol/cil: Use empty list for category expression evaluated as empty
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/7] libsepol/cil: Check for improper category range
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/7] libsepol/cil: Check if identifier is NULL when verifying name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/7] libsepol/cil: Use an empty list to represent an unknown permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: william.c.roberts@xxxxxxxxx
- [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 4/8] libselinux: fix required alignment for sha1.c on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 7/8] libselinux: DISABLE_BOOL move to include headers
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/8] libsepol/cil: disable symver on Mac builds
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/8] libsepol: build on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 3/8] libselinux: fix mac build warning when ANDROID_HOST=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 5/8] libselinux/utils: add noreturn to sefcontext_compile
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- speeding up nodups_specs, need large fc file.
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- read_spec_entry question
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- CIL policies which make secilc crash
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [SUSPECTED SPAM] [SUSPICIOUS MESSAGE] Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: do not suppress logging from libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol, libsemanage: fix linker scripts / map files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Gold linker build failures
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- restorecon -r goes up the tree?
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fuzzing secilc with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Daniel Cashman <dcashman@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/cil: fix double-free in cil categories parser
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: fix memory leak in __cil_fill_expr()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/3] Fuzzing secilc with AFL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: versioned ruby pkg-config and query vendorarchdir properly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: make -I imply -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/1] Makefile: make distclean target work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: renamed andriod label backend source file
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Question on restricting file access
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Makefile: make distclean target work
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]