SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add openrc_contexts functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 5/7] sepolicy: make info() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/7] sepolicy: info() and search() will return generators
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] sepolicy: update some users of search() to use setools directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/7] sepolicy: make search() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/7] sepolicy: initialize setools4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/7] sepolicy: rearrange vars together at the top
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9 (#2)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [RFC] mmap file_contexts and property_contexts:
- From: william.c.roberts@xxxxxxxxx
- Re: sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v5] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v4] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v4] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] sefcontext_compile: cleanup confusing usage message
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] sandbox: fix file labels on copied files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dave Quigley <dquigley@xxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] sandbox: fix file labels on copied files
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] sandbox: tests - close stdout of p1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- NFSv4.2 unlabeled_t on mountpoints
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix file/test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix file/test failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 5/5] libsepol: cil: Add cil_constraint_expr_to_policy()
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 4/5] libsepol: cil: Fix CIL_OP data assignment.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 3/5] libsepol: cil: Replace sensitivityorder statement.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 2/5] libsepol: cil: Remove duplicate sid policy declaration.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 1/5] libsepol: cil: Add userrole mapping to cil_gen_policy().
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: add support for pcre2
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: fix memory leak on pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/3] Make libsepol tests pass again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] remove system_u and s0 hardcoded strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] selinux: Create policydb version for Infiniband support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- Re: Creating a new port type
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Creating a new port type
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Creating a new port type
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- SELinux MLS Policies
- From: "Paul Bolton" <paul.a.bolton@xxxxxxxxx>
- [PATCH v2] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Or Gerlitz <gerlitz.or@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/3] selinux: detect invalid ebitmap
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: initialize structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- DBus
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] Make libsepol tests pass again
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: make "make test" fails when a CUnit test fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: tests: fix g_b_role_2 test
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] checkpolicy: add types associated to a role in the current scope when parsing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: ileyd <ileyd@xxxxxxxxxx>
- MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Add option to ignore restorecon_last
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 1/2] libselinux: Ignore restorecon_last in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] selinux: initialize structures
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] selinux: detect invalid ebitmap
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 2/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update libsepol to support the policy capability for AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: docker daemon type label issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v4] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3 1/2] genhomedircon: generate contexts for logins mapped to the default user
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/2] genhomedircon: generate contexts for logins mapped to the default user
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Bug Report - "sepolicy manage"
- From: Jordan Zebor <jzebor@xxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: docker daemon type label issue
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- docker daemon type label issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: sepolicy and setools4
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: sepolicy and setools4
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol: calloc all the *_to_val_structs
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v2 2/2] libsepol: port str_read from kernel
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/2] libsepol: calloc all the *_to_val_structs
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- sepolicy and setools4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/3] audit2allow: fix audit2why import from seobject.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/3] audit2allow: remove audit2why so it gets symlinked
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: port str_read from kernel
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] policycoreutils: import sepolicy directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] semanage: Fix semanage fcontext -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] semanage: fix error message for fcontext -m
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] libsemanage: validate and compile file contexts before installing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: validate and compile file contexts before installing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux, sefcontext_compile: handle NULL pcre study data
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: add auditing of changes in records
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fix AFL Found Bugs in libsepol v4
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] selinux-testsuite: fix cap_userns compiler warnings
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 6/7] libsepol: fix unitialized jmp and invalid dereference
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 5/7] libsepol: bound attr_type_map access by nprim
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 3/7] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 4/7] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 2/7] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- Fix AFL Found Bugs in libsepol v4
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 1/7] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [Bug report] Semanage fcontext with incorrect regexp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- libselinux Python wrapper and SWIG 3.0.10
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [Bug report] Semanage fcontext with incorrect regexp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [Bug report] Semanage fcontext with incorrect regexp
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] semanage: use socket.getprotobyname for protocol
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: Fix AFL Found Bugs in libsepol
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 2/7] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 7/7] libsepol: fix unitialized jmp and invalid dereference
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 6/7] libsepol: bound attr_type_map access by nprim
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 3/7] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 4/7] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 1/7] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- Fix AFL Found Bugs in libsepol
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH 2/2] semanage: default to "s0" if serange empty for port modify
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/2] semanage: default to "s0" if serange empty for port modify
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH 1/2] semanage: use socket.getprotobyname for protocol
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Restricting network communications of mounted filesystems
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/4] Update setfiles/restorecon to support selinux_restorecon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: test personality(READ_IMPLIES_EXEC)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: add tests for hugetlb anon mappings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] semanage: fix modify action in node and interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Restricting network communications of mounted filesystems
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- [PATCH v2 4/5] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 3/5] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/5] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 2/5] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/5] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- [PATCH 5/5] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/5] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- [PATCH 3/5] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH 4/5] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux/ChangeLog: Fix the author of the last libselinux change
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux/ChangeLog: Fix the author of the last libselinux change
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix memory leak in expand.c
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: 'fixfiles check' should not change anything
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix invalid read when policy file is corrupt
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/sepolicy: Check get_rpm_nvr_list() return value
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: Don't use subprocess.getstatusoutput() in Python 2 code
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: add auditing of changes in records
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: 'fixfiles check' should not change anything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [PATCH] libsepol: fix memory leak in expand.c
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Any way to label /proc/self/mem with a different type then the process type.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Python3 support in policycoreutils
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Any way to label /proc/self/mem with a different type then the process type.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: --EXTERNAL--Any way to label /proc/self/mem with a different type then the process type.
- From: "Parker, Michael D." <Michael.D.Parker@xxxxxx>
- Any way to label /proc/self/mem with a different type then the process type.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [PATCH] libsepol: fix memory leak in expand.c
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: fix memory leak in expand.c
- From: william.c.roberts@xxxxxxxxx
- Re: Request for a rebase of the linux-security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: fix invalid read when policy file is corrupt
- From: william.c.roberts@xxxxxxxxx
- Request for a rebase of the linux-security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] setroubleshoot: Fix sealert message for capability2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] setroubleshoot: Fix sealert message for capability2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Should port 3269 be ldap_port_t?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] module_to_cil: fix possible use of initialized value
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 09/12] policycoreutils: gettext compat for py2 and 3
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 08/12] policycoreutils: import sepolicy directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 12/12] semanage: Print usage when no args
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 11/12] policycoreutils/gui: py3 support for modules that changed name
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 10/12] policycoreutils/gui: update to python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 09/12] policycoreutils: gettext compat for py2 and 3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 07/12] sepolicy: dont alias sepolicy.search and sepolicy.info
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 06/12] sepolicy: update exceptions and print for python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 05/12] sepolicy: C Module init for python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 04/12] sepolicy: Add python3 PyInt and PyString defs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 03/12] semanage: misc style issues
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 02/12] seobject: use sorted() instead of .sort()
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 01/12] semanage: py3 support for print function and map/filter
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Python3 support in policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v3] module_to_cil: fix possible use of initialized value
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux/utils/Makefile: Fix in tree compilation
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] policycoreutils/sepolicy: Check get_rpm_nvr_list() return value
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: semodule - remove 'q' from getopt string
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux/utils/Makefile: Fix in tree compilation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: semodule - remove 'q' from getopt string
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: william.c.roberts@xxxxxxxxx
- RE: [PATCH] module_to_cil: fix possible use of initialized value
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] module_to_cil: fix possible use of initialized value
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- Should port 3269 be ldap_port_t?
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- [PATCH] policycoreutils: Don't use subprocess.getstatusoutput() in Python 2 code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for non-init userns capability checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- selinux custom mls label
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ignore object_r in userrole mappings when creating policy binary
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Ignore object_r in userrole mappings when creating policy binary
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH] security: lsm_audit: print pid and tid
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/2] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH V3 4/4] policycoreutils: restorecond - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 3/4] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 2/4] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 1/4] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/4] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] semanage: add auditing of changes in records
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH 2/2] semanage: fix modify action in node and interface
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: genhomedircon: some issues with a custom policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- genhomedircon: some issues with a custom policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Is there any SELinux support for labelled printing like with Trusted Extensions?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Is there any SELinux support for labelled printing like with Trusted Extensions?
- From: ileyd <ileyd@xxxxxxxxxx>
- Re: rpm running with MLS range?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- rpm running with MLS range?
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: redis - selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: redis - selinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Sheng Yang <sheng@xxxxxxxxxx>
- redis - selinux
- From: Kamil Boratyński <kboratynski@xxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Sheng Yang <sheng@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- RE: RFC Fuzzing SE Linux interfaces
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] Extend checkpolicy pathname matching.
- From: Inamdar Sharif <isharif@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] field-dictionary: add ioctlcmd
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RFC Fuzzing SE Linux interfaces
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] field-dictionary: add ioctlcmd
- From: william.c.roberts@xxxxxxxxx
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <pmoore@xxxxxxxxxx>
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v2] security: Add task_settimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v2] security: Add task_settimerslack LSM hook
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: william.c.roberts@xxxxxxxxx
- Re: Inconsistent RSS on Red Hat 7 but not 6.
- From: Todd Rinaldo <toddr@xxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Extend checkpolicy pathname matching.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] policycoreutils: Remove duplicate, empty translation files
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Inconsistent RSS on Red Hat 7 but not 6.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] open_init_pty: Do not error on EINTR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add missing return to sepol_node_query()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Inconsistent RSS on Red Hat 7 but not 6.
- From: Todd Rinaldo <toddr@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Add missing return to sepol_node_query()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]