SELinux - Date Index
[Prev Page][Next Page]
- Question on restricting file access
- From: Raj Srinivasan <raj@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: fix lax service context lookup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: android: fix lax service context lookup
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: fix unused variable error
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] libselinux: set DISABLE_RPM default to y.
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: rename EMFLAGS to DISABLE_FLAGS
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: fix unused variable error
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] libselinux: drop DISABLE_BOOL=y option
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libselinux: drop DISABLE_AVC=y
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libselinux: drop build config EMBEDDED=y
- From: william.c.roberts@xxxxxxxxx
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: DISABLE_AVC=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- DISABLE_AVC=y
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Do not always print a module name warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] libsemanage: Do not always print a module name warning
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Android Fork
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [Patch v2] sandbox: Use dbus-run-session instead of dbus-launch when available
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add ANDROID_HOST=y build option
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: add ANDROID_HOST=y build option
- From: william.c.roberts@xxxxxxxxx
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sefcontext_compile: do not fail silently
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android Fork
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: add ifdef'ing for ANDROID and BUILD_HOST
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] libselinux: introduce configurable backends
- From: william.c.roberts@xxxxxxxxx
- Android Fork
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Use pp module name instead of filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Utility to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Add function to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux: Add features to find security.restorecon_last entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/3] libselinux: sefcontext_compile: Add "-i" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 3/3] libselinux: sefcontext_compile invert semantics of "-r" flag
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add architecture string to file_context.bin
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl
- From: Paul Eggert <eggert@xxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: Use pp module name instead of filename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: setfiles - Add option to stop setting the digest
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol/tests: fix mispelling of optimization option
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] policycoreutils: Remove LDFLAGS from CFLAGS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsemanage/tests: do not force using gcc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: silent -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: drop unused stdio_ext.h header file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop unused stdio_ext.h header file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Libsepol Mac Build Errors
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: fix unitialized variable 'nread' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] libsepol: fix unused variable 'len' on mac build
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] libsepol: fix unused variable 'size' on mac build
- From: william.c.roberts@xxxxxxxxx
- Libsepol Mac Build Errors
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: kill logging check for selinux_enabled()
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN
- From: william.c.roberts@xxxxxxxxx
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] sandbox: create a new session for sandboxed processes
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] sandbox: do not try setup directories without -X or -M
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: setools4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: use pp module headers as a source for a module name
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 0/1] supporting RBACSEP in genhomedircon
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/1] genhomedircon: support policies using RBACSEP
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux sandbox escape via TIOCSTI ioctl
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [Secunia Research] policycoreutils Vulnerability - Request for Details
- From: "Secunia Research" <vuln@xxxxxxxxxxx>
- SELinux sandbox escape via TIOCSTI ioctl
- From: up201407890@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH] libsemanage: use pp module headers as a source for a module name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Killing The Android libselinux Fork (available)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] Add libsepol and secil host and device targets
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- [PATCH 1/2] libsepol, checkpolicy: Update Android.mk
- From: Bowgo Tsai <bowgotsai@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add openrc_contexts functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 5/7] sepolicy: make info() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/7] sepolicy: info() and search() will return generators
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/7] sepolicy: update setup.py to remove C module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] sepolicy: update some users of search() to use setools directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- setools4 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/7] sepolicy: make search() use setools4 api
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/7] sepolicy: initialize setools4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/7] sepolicy: rearrange vars together at the top
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix redefinition of XATTR_NAME_SELINUX
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2 0/1] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: unlocked stdio
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: unlocked stdio
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- unlocked stdio
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux 2.6-rc1 release planned 9/30
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] sandbox: do not run xmodmap in a new X session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux 2.6-rc1 release planned 9/30
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9 (#2)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] mmap file_contexts and property_contexts:
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RE: [RFC] mmap file_contexts and property_contexts:
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [RFC] mmap file_contexts and property_contexts:
- From: william.c.roberts@xxxxxxxxx
- Re: sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sandox -X not working with recent Xephyr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] sandbox: Use dbus-launch instead of dbus-run-session
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- sandox -X not working with recent Xephyr
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] sandbox: Use GObject introspection binding instead of pygtk2
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 4.9
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v5] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v4] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH v4] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Change semantic of -r in sefcontext_compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: correct error path to always try text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] sefcontext_compile: cleanup confusing usage message
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH] Change semantic of -r in sefcontext_compile
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: correct error path to always try text
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: correct error path to always try text
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] sandbox: fix file labels on copied files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dave Quigley <dquigley@xxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] sandbox: fix file labels on copied files
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] sandbox: tests - close stdout of p1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] sandbox: tests - use sandbox from cwd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NFSv4.2 unlabeled_t on mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- NFSv4.2 unlabeled_t on mountpoints
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix file/test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix file/test failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -next] SELinux: fix error return code in policydb_read()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH v3] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 5/5] libsepol: cil: Add cil_constraint_expr_to_policy()
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 4/5] libsepol: cil: Fix CIL_OP data assignment.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 3/5] libsepol: cil: Replace sensitivityorder statement.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 2/5] libsepol: cil: Remove duplicate sid policy declaration.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 1/5] libsepol: cil: Add userrole mapping to cil_gen_policy().
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 0/5] Fix some cil_gen_policy() bugs.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH v2] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: add support for pcre2
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- RE: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Liran Liss <liranl@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v2] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: "ira.weiny" <ira.weiny@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add support for pcre2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: fix memory leak on pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- [PATCH 1/2] libselinux: add support for pcre2
- From: Janis Danisevskis <jdanis@xxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v2] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] nodups_specs: speedup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 0/3] Make libsepol tests pass again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] genhomedircon: remove hardcoded refpolicy strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] remove system_u and s0 hardcoded strings
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: clean up process file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] selinux: Create policydb version for Infiniband support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- Re: Creating a new port type
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Creating a new port type
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: ileyd <ileyd@xxxxxxxxxx>
- Creating a new port type
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] audit: consistently record PIDs with task_tgid_nr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: SELinux MLS Policies
- From: Paul Bolton <paul.a.bolton@xxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux MLS Policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- SELinux MLS Policies
- From: "Paul Bolton" <paul.a.bolton@xxxxxxxxx>
- [PATCH v2] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Or Gerlitz <gerlitz.or@xxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/3] selinux: detect invalid ebitmap
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: initialize structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: detect invalid ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [RFC] nodups_specs: speedup
- From: william.c.roberts@xxxxxxxxx
- DBus
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH] libsepol: Produce more meaningful error messages for conflicting type rules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] Make libsepol tests pass again
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: make "make test" fails when a CUnit test fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: tests: fix g_b_role_2 test
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] checkpolicy: add types associated to a role in the current scope when parsing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] libselinux: clean up process file
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: clean up process file
- From: william.c.roberts@xxxxxxxxx
- [PATCH v5] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS Enforcing Problem
- From: ileyd <ileyd@xxxxxxxxxx>
- MLS Enforcing Problem
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 2/2] policycoreutils: setfiles - Add option to ignore restorecon_last
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- [PATCH 1/2] libselinux: Ignore restorecon_last in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] allow disabling "security.restorecon_last" extended attribute.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Build the SELinux testsuite on systems using the Reference Policy
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Embedded SELinux: SELinux via NFS with different policies on client and server
- From: Ralf Spenneberg <ralf@xxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] selinux: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/3] selinux: initialize structures
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/3] selinux: detect invalid ebitmap
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 2/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update libsepol to support the policy capability for AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: docker daemon type label issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH v4] Classify AF_ALG sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v4] Classify AF_ALG sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3 1/2] genhomedircon: generate contexts for logins mapped to the default user
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 1/2] genhomedircon: generate contexts for logins mapped to the default user
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH 0/2] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet Socket)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Bug Report - "sepolicy manage"
- From: Jordan Zebor <jzebor@xxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: docker daemon type label issue
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- docker daemon type label issue
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Differentiate between Unix Stream Socket and Sequential Packet Socket
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- (How to ) Change the context of user
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- Re: sepolicy and setools4
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: sepolicy and setools4
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol: calloc all the *_to_val_structs
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v2 2/2] libsepol: port str_read from kernel
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/2] libsepol: calloc all the *_to_val_structs
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- sepolicy and setools4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: port str_read from kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/3] audit2allow: tests should use local copy not system
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/3] audit2allow: fix audit2why import from seobject.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/3] audit2allow: remove audit2why so it gets symlinked
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: calloc all the *_to_val_structs
- From: william.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: port str_read from kernel
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] policycoreutils: import sepolicy directly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] semanage: Fix semanage fcontext -D
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] semanage: fix error message for fcontext -m
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] semanage: fix error message for fcontext -m
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] libsemanage: validate and compile file contexts before installing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: lsm_audit: print pid and tid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: validate and compile file contexts before installing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux, sefcontext_compile: handle NULL pcre study data
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: add auditing of changes in records
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fix AFL Found Bugs in libsepol v4
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] selinux-testsuite: fix cap_userns compiler warnings
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4 7/7] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 6/7] libsepol: fix unitialized jmp and invalid dereference
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 5/7] libsepol: bound attr_type_map access by nprim
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 3/7] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 4/7] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 2/7] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- Fix AFL Found Bugs in libsepol v4
- From: william.c.roberts@xxxxxxxxx
- [PATCH v4 1/7] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [Bug report] Semanage fcontext with incorrect regexp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: libselinux Python wrapper and SWIG 3.0.10
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- libselinux Python wrapper and SWIG 3.0.10
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [Bug report] Semanage fcontext with incorrect regexp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [Bug report] Semanage fcontext with incorrect regexp
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: drop SECURITY_SELINUX_POLICYDB_VERSION_MAX
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] genhomedircon: add support for %group syntax
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] semanage: use socket.getprotobyname for protocol
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: Fix AFL Found Bugs in libsepol
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH v3 5/7] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 2/7] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 7/7] libsepol: fix unitialized jmp and invalid dereference
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 6/7] libsepol: bound attr_type_map access by nprim
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 3/7] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 4/7] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 1/7] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- Fix AFL Found Bugs in libsepol
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH 2/2] semanage: default to "s0" if serange empty for port modify
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/2] semanage: default to "s0" if serange empty for port modify
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH 1/2] semanage: use socket.getprotobyname for protocol
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: correct fcontext auditing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] semanage: correct fcontext auditing
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Restricting network communications of mounted filesystems
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/4] Update setfiles/restorecon to support selinux_restorecon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: test personality(READ_IMPLIES_EXEC)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: mmap: add tests for hugetlb anon mappings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] semanage: fix modify action in node and interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restricting network communications of mounted filesystems
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Restricting network communications of mounted filesystems
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- [PATCH v2 4/5] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 5/5] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 3/5] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 1/5] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 2/5] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 5/5] libsepol: fix overflow and 0 length allocations
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/5] libsepol: ensure key is valid before doing search
- From: william.c.roberts@xxxxxxxxx
- [PATCH 5/5] libsepol: fix overflow and 0 length allocations
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/5] libsepol: fix invalid access of NULL on type_val_to_struct
- From: william.c.roberts@xxxxxxxxx
- [PATCH 3/5] ebitmap: detect invalid bitmap
- From: william.c.roberts@xxxxxxxxx
- [PATCH 4/5] genfs_read: fix use heap-use-after-free
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux/ChangeLog: Fix the author of the last libselinux change
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: swap tcp and udp protocol numbers
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux/ChangeLog: Fix the author of the last libselinux change
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semanage: swap tcp and udp protocol numbers
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix memory leak in expand.c
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: 'fixfiles check' should not change anything
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix invalid read when policy file is corrupt
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/sepolicy: Check get_rpm_nvr_list() return value
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: Don't use subprocess.getstatusoutput() in Python 2 code
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: add auditing of changes in records
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: 'fixfiles check' should not change anything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [PATCH] libsepol: fix memory leak in expand.c
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Any way to label /proc/self/mem with a different type then the process type.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Python3 support in policycoreutils
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Any way to label /proc/self/mem with a different type then the process type.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: --EXTERNAL--Any way to label /proc/self/mem with a different type then the process type.
- From: "Parker, Michael D." <Michael.D.Parker@xxxxxx>
- Any way to label /proc/self/mem with a different type then the process type.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [PATCH] libsepol: fix memory leak in expand.c
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: fix memory leak in expand.c
- From: william.c.roberts@xxxxxxxxx
- Re: Request for a rebase of the linux-security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: fix invalid read when policy file is corrupt
- From: william.c.roberts@xxxxxxxxx
- Request for a rebase of the linux-security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] setroubleshoot: Fix sealert message for capability2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] setroubleshoot: Fix sealert message for capability2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Should port 3269 be ldap_port_t?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] module_to_cil: fix possible use of initialized value
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 09/12] policycoreutils: gettext compat for py2 and 3
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 08/12] policycoreutils: import sepolicy directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]