SELinux - Date Index
[Prev Page][Next Page]
- Re: SELinux system configuration using CIPSO
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: replace an assert with an error message
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: test for ebitmap_read() negative return value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: cil_lexer: make warnings non-fatal for building
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: use a macro prefixed with SEMANAGE to protect dso.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: cil_lexer: make warnings non-fatal for building
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libsemanage: use a macro prefixed with SEMANAGE to protect dso.h
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v3] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v3] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH take2 v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] Revert "libsepol: fix checkpolicy dontaudit compiler bug"
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux, libsemanage: swig: use SWIG_fail when an error occurs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] secilc: do not build secilc man page if it is up to date
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] libselinux,libsemanage: link Python wrapper with Python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Use GObject introspection binding instead of python-gobject in selinux_server.py
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: cil: remove double-free.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy fails to load policy with ENOENT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- load_policy fails to load policy with ENOENT
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux, libsemanage: fall back to gcc in exception.sh
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] libselinux, libsemanage: swig: use SWIG_fail when an error occurs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libselinux,libsemanage: fall back to gcc in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] secilc: do not build secilc man page if it is up to date
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/4] libselinux,libsemanage: link Python wrapper with Python
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/4] libsemanage: query for python site-packages dir directly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] libselinux,libsemanage: link Ruby wrapper with -lruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] libselinux,libsemanage: use Ruby to define RUBYINC
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/4] selinux: Clean up initialization of isec->sclass
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] proc: Pass file mode to proc_pid_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] selinux: Minor cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: semanage_seuser_key_create: copy name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security: selinux - Improvement in code readability when
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Security: selinux - Improvement in code readability when
- From: Shailendra Verma <shailendra.v@xxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- how to assign process to user
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: Policy disable error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Diskless system running SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] policycoreutils: Force GTK3.0 for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Use GObject introspection binding instead of python-gobject in selinux_server.py
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH 1/1] libsemanage: semanage_seuser_key_create: copy name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS is disabled, but MLS context "s0" found
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- MLS is disabled, but MLS context "s0" found
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: cil: remove double-free.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: checkpolicy dontaudit compiler bug?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- checkpolicy dontaudit compiler bug?
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 0/4] selinux: Fix invalidate deadlock with GFS2
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 2/4] proc: Pass file mode to proc_pid_make_inode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 3/4] selinux: Clean up initialization of isec->sclass
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 1/4] selinux: Minor cleanups
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [SECILC] does not seem to filter redundant attributes and rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Leon Romanovsky <leonro@xxxxxxxxxxxx>
- Re: [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- [SECILC] does not seem to filter redundant attributes and rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RE: GPF in sidtab_context_to_sid
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH v4 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v4 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: GPF in sidtab_context_to_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- GPF in sidtab_context_to_sid
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: sepol_{bool|iface|user}_key_create: copy name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm19827 <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm19827 <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of shared libraries
- From: mm <mm19827@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch v2 2/2] policycoreutils: Make sepolicy work with python3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Make sepolicy work with python3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: setsebool or audit2allow rule
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: setsebool or audit2allow rule
- From: Vaughn Clinton <vclinton@xxxxxxx>
- Re: setsebool or audit2allow rule
- From: Dominick Grift <dac.override@xxxxxxxxx>
- setsebool or audit2allow rule
- From: Vaughn Clinton <vclinton@xxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsemanage: remove ruby_semanage.so with "make clean"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux: remove rpm_execcon from SWIG wrappers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Security context of shared libraries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Security context of shared libraries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Security context of shared libraries
- From: mm <mm19827@xxxxxxxxx>
- Re: [PATCH] Revert "libselinux: support new python3 functions"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] mqueue: security xattr setting on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] mqueue: security xattr setting on inode creation
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] policycoreutils: Run 2to3 over the sepolicy python code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: Run 2to3 over the sepolicy python code
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- selinux user to linux mapping
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: ANN: Reference Policy Release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Exit with an error for an unknown map permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] Revert "libselinux: support new python3 functions"
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libsemanage: fix kernel pathname in semanage_verify_kernel()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: Reference Policy Release
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/utils: fix all the noreturn errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: avc_internal.c: allow building with clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: avc_internal.c: allow building with clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux/utils: fix all the noreturn errors
- From: william.c.roberts@xxxxxxxxx
- Backtrace in sandbox command
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libselinux: avc_internal.c: allow building with clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: fix compiler flags for linux + clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix compiler flags for linux + clang
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Is it possible to prevent a binary executable file from being read via SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use-after-free in semanage boolean with Python 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Use-after-free in semanage boolean with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Is it possible to prevent a binary executable file from being read via SELinux?
- From: Patrick Doyle <wpdster@xxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Discussion on setting the /proc/self/oom_score_adj file label.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Discussion on setting the /proc/self/oom_score_adj file label.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add symver with explicit version to build with ld.gold
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: restorecond: use pkg-config to find dbus-glib-1 files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Add symver with explicit version to build with ld.gold
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: POSIX mqueues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: State of rpm_execcon SWIG wrapper
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- secilc crashes on unknown permissions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- State of rpm_execcon SWIG wrapper
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] policycoreutils: restorecond: use pkg-config to find dbus-glib-1 files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: MLS issue
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: mmap: fix shmat SHM_EXEC test for old policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: mmap: fix shmat SHM_EXEC test for old kernels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix pointer handling in realpath_not_final
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Allow overriding libsepol.a location during build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: add shmat SHM_EXEC test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- selinux: should execmem disable shmat(..., SHM_EXEC)?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: MLS issue
- From: Harry Waddell <waddell@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: selinux: should execmem disable shmat(..., SHM_EXEC)?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix pointer handling in realpath_not_final
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH] libselinux: Allow overriding libsepol.a location during build
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libselinux: Add clean-pywrap and clean-rubywrap targets
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Mapping of subject context to CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Mapping of subject context to CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS issue
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- MLS issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: POSIX mqueues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: POSIX mqueues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork Dies on AOSP
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Android Fork Dies on AOSP
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Gold linker build failures
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: Gold linker build failures
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: POSIX mqueues
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- POSIX mqueues
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- RE: Question for the experts -- DIRTY COW and SELinux
- From: Sean Hulbert <SHulbert@xxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Judd Meinders <judd.meinders@xxxxxxxxxxxxxxxxxxx>
- Re: Question for the experts -- DIRTY COW and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Question for the experts -- DIRTY COW and SELinux
- From: Robert Lee <robert.lee@xxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] [RFC] nodups_specs: speedup
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: cil: cil_strpool: Allow multiple strpool users.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/gui: fix system-config-selinux editing features
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol: cil: cil_strpool: Allow multiple strpool users.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 6/7] libsepol/cil: Verify alias in aliasactual statement is really an alias
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 7/7] libsepol/cil: Verify neither child nor parent in a bounds is an attribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/7] libsepol/cil: Check that permission is not an empty list
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/7] libsepol/cil: Use empty list for category expression evaluated as empty
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/7] libsepol/cil: Check for improper category range
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/7] libsepol/cil: Check if identifier is NULL when verifying name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/7] libsepol/cil: Use an empty list to represent an unknown permission
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 8/8] libselinux: add booleans.c to ANDROID_HOST=y recipe
- From: william.c.roberts@xxxxxxxxx
- [PATCH 6/8] libselinux: support ANDROID_HOST=1 on Mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 4/8] libselinux: fix required alignment for sha1.c on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 7/8] libselinux: DISABLE_BOOL move to include headers
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/8] libsepol/cil: disable symver on Mac builds
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/8] libsepol: build on mac
- From: william.c.roberts@xxxxxxxxx
- [PATCH 3/8] libselinux: fix mac build warning when ANDROID_HOST=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 5/8] libselinux/utils: add noreturn to sefcontext_compile
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- ANN: SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: speeding up nodups_specs, need large fc file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- speeding up nodups_specs, need large fc file.
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- read_spec_entry question
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: should module_load be checked on a kernel module object?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- CIL policies which make secilc crash
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- should module_load be checked on a kernel module object?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [SUSPECTED SPAM] [SUSPICIOUS MESSAGE] Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: genhomedircon: do not suppress logging from libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fuzzing /usr/libexec/selinux/hll/pp with AFL
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] genhomedircon: use userprefix as the role for homedir content
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Gold linker build failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol, libsemanage: fix linker scripts / map files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon: fix realpath logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Gold linker build failures
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: restorecon -r goes up the tree?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- restorecon -r goes up the tree?
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fuzzing secilc with AFL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH V2] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: Jason Zaman <perfinion@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Daniel Cashman <dcashman@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH 1/3] libsepol/cil: make cil_resolve_name() fail for '.'
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/cil: fix double-free in cil categories parser
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: fix memory leak in __cil_fill_expr()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/3] Fuzzing secilc with AFL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: Add support for converting extended permissions to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Fixes bug preventing the installation of base modules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Received a base module, expected a non-base module.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Received a base module, expected a non-base module.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] libsepol/cil: create user and role caches when building binary policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 0/1] libsepol/cil: create role/user caches for context validation
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 2/2] libselinux: query for python site-packages dir directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: versioned ruby pkg-config and query vendorarchdir properly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.6-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: make -I imply -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: reverse the sense of -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] secilc: correct include path of cil.h for Android
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] Remove Android.mk files and only keep them in Android tree
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol/cil: Check for too many permissions in classes and commons
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: re-introduce DISABLE_BOOL=y
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix xperm mapping between avrule and avtab
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/1] Makefile: make distclean target work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 3/3] libselinux: makes android label back ends configurable
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: renamed andriod label backend source file
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Question on restricting file access
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Makefile: make distclean target work
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Build ANDROID_HOST=y on mac
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC] Build ANDROID_HOST=y on mac
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: rename EMFLAGS to DISABLE_FLAGS
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: fix unused variable error
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libselinux: drop DISABLE_AVC=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libselinux: drop build config EMBEDDED=y
- From: william.c.roberts@xxxxxxxxx
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Do not always print a module name warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [Patch v2] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sefcontext_compile: do not fail silently
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: introduce configurable backends
- From: william.c.roberts@xxxxxxxxx
- Android Fork
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Use pp module name instead of filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Utility to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Add function to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: Use pp module name instead of filename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsemanage/tests: do not force using gcc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: silent -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop unused stdio_ext.h header file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libsepol: fix unused variable 'len' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libsepol: fix unused variable 'size' on mac build
- From: william.c.roberts@xxxxxxxxx
- Libsepol Mac Build Errors
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: kill logging check for selinux_enabled()
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] sandbox: do not try setup directories without -X or -M
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: "Secunia Research" <vuln@xxxxxxxxxxx>
- SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] Add libsepol and secil host and device targets
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]