SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- [PATCH] Allow libsepol C++ static library on device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.zhao@xxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: Ted Toth <txtoth@xxxxxxxxx>
- Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Improve check_assertions performance through hash tweaks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Mailing list etiquette
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ebitmap: map size does not match my size on s390x
- From: Johannes Segitz <jsegitz@xxxxxxxx>
- [PATCH v2 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 1/3] Build libsepol with -O2
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 0/3] Improve check_assertions performance through hash tweaks
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: [RFC][PATCH 6/9] gen_initramfs_list.sh: include xattrs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: ebitmap: map size does not match my size on s390x
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Alireza Keyhani <alireza.keyhanii@xxxxxxxxx>
- ebitmap: map size does not match my size on s390x
- From: Johannes Segitz <jsegitz@xxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Shahbaz khan <shazalive@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Alireza Keyhani <alireza.keyhanii@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Gaurav Gangwar <gauravgangwaar@xxxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH] selinux: quiet the filesystem labeling behavior message
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Build libsepol with -O2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: ss: mls: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Vincent Brillault <gentoo+selinux@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dave Jones <davej@xxxxxxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/3] Build libsepol with -O2
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 0/3] Improve check_assertions performance through hash tweaks
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] security: selinux: avc.c: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: Problem running "selinux sandbox" with java
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] run_init: fix open_init_pty avaibility check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Problem running "selinux sandbox" with java
- From: Bhuvan Gupta <bhuvangu@xxxxxxxxx>
- Re: could selinux satisfy my need?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- could selinux satisfy my need?
- From: jiangdahui <jdh1988@xxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: avc.c: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis.Kletnieks@xxxxxx
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis.Kletnieks@xxxxxx
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: open_init_pty function?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Andrew Gunnerson <andrewgunnerson@xxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis Kletnieks <Valdis.Kletnieks@xxxxxx>
- Process changes for the SELinux tree
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: open_init_pty function?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: open_init_pty function?
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: open_init_pty function?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- open_init_pty function?
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: How does device labeling work?
- From: "Paris, Eric" <eparis@xxxxxxxxxxxxxx>
- Re: [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.19
- From: James Morris <jmorris@xxxxxxxxx>
- ANN: SELinux Userspace Release: 20140826-rc7
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.19
- From: Paul Moore <pmoore@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libsemanage: ensure migrated files have the correct types
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: How does device labeling work?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 2/3] net: Extend security get/setsockopt entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 0/3] SELinux: Support the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 1/3] security: Extend security get/setsockopt entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Add "RuntimeDirectory=setrans" to the mcstrans.service
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: How does device labeling work?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How does device labeling work?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- How does device labeling work?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] Add "RuntimeDirectory=setrans" to the mcstrans.service
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libsemanage: close hll file descriptors
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permission requirements for semodule?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Permission requirements for semodule?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage_migrate_store: Python3 support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] semanage_migrate_store: Python3 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: pp: add roletype statements for both declared and required type/typeattributes
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Question on unconfined_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Question on unconfined_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Question on unconfined_t
- From: "Paddie O'Brien" <paddieobrien@xxxxxxxxx>
- Re: Question on unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Question on unconfined_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Question on unconfined_t
- From: "Paddie O'Brien" <paddieobrien@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18 #3
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: convert WARN_ONCE() to printk() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- SELinux Userspace Release: 20140826-rc6
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils: pp: define type aliases in the correct scope
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 1/2] policycoreutils: pp: mimic require block support in CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 0/2] Fix pp2cil bugs associated with optionals
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Patches to support the SELinux SCTP kernel patch
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: Support SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me? (there is some mistakes in my last emeil ,sorry! )
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 7/7] SELinux: Check against union and lower labels for file ops on lower files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/7] Security: Pass the union-layer file path into security_file_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- RE: squashfs files showing as unlabeled_t
- From: <Josh_Pennell@xxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Vinson Lee <vlee@xxxxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: squashfs files showing as unlabeled_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- user_r/sysadm_r/staff_r/unconfined_r
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- squashfs files showing as unlabeled_t
- From: <Josh_Pennell@xxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- ANN: SETools 4.0.0-alpha1
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux packaging
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsemanage: install to LIBDIR instead of SHLIBDIR
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 2/2] libselinux: libsepol: use ln --relative to create .so symlinks
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 0/2] Updates to Makefiles to fix bugs with LIBDIR/SHLIBDIR
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux packaging
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: cilc: name space inconsistency
- From: Dominick Grift <dac.override@xxxxxxxxx>
- libselinux packaging
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- cilc: name space inconsistency
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsepol: Report all neverallow violations.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- OpenSSH SELinux awareness: For your consideration
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: fs_use_trans
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Report all neverallow violations.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fs_use_trans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: fs_use_trans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18 #2
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] selinux: fix inode security list corruption
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux Notebook 4th Edition now available
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: fix inode security list corruption
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/hll/pp: only print certain roles when declared in base modules
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 3/3] policycoreutils/hll/pp: change printing behavior of typeattribute/sets
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 2/3] policycoreutils/hll/pp: fix '\n' parsing in filecon statements
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 1/3] policycoreutils/hll/pp: Fix role/roletype scoping
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 0/3] pp2cil fixes based on feedback
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- Re: [PATCH 00/20] Compiling userland lib & tools with hardened gcc flags
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: UPower dbus interface unavailable with enforcing SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.18
- From: James Morris <jmorris@xxxxxxxxx>
- UPower dbus interface unavailable with enforcing SELinux
- From: Tobias Bengfort <tobias.bengfort@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Updating the linux-security next branch
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Fwd: Query regarding role hierarchy SELinux
- From: Harpreet <harpreet20@xxxxxxxxx>
- Re: problem about making selinux userspace
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- problem about making selinux userspace
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: services: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] selinux: services: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Few issues we are facing when we are enabling selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Few issues we are facing when we are enabling selinux
- From: Avijit Das <avijitnsec@xxxxxxxx>
- [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 20/20] libsepol/tests: fix gcc -Warray-bounds warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 19/20] checkpolicy: fix gcc -Wunused-variable warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 18/20] Fix gcc -Wstrict-prototypes warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 17/20] policycoreutils: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 15/20] checkpolicy: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 16/20] policycoreutils/hll/pp: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 14/20] libsemanage: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 13/20] libsepol/cil: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 12/20] libsemanage: constify name and ext_lang parameters of semanage_module_install_hll
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 11/20] libsepol: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 10/20] checkpolicy: fix gcc -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 09/20] libselinux: fix gcc -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 08/20] checkpolicy: constify the message written by yyerror and yywarn
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 07/20] checkpolicy: add printf format attribute to relevant functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 05/20] policycoreutils/semodule_package: fix debug build
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 06/20] policycoreutils/hll/pp: add printf format attribute to relevant functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 04/20] policycoreutils/sandbox: fix debug build
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 03/20] policycoreutils/hll/pp: fix potential use of uninitialized variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 02/20] libsemanage: Fix use of unitialized variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 01/20] libsepol: fix potential free of uninitialized pointer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 00/20] Compiling userland lib & tools with hardened gcc flags
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix compilation with -Wformat-security
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: fix compilation with -Wformat-security
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Userspace Release 2014-08-26-rc2 - semodule(8) query
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Does selinuxfs support ACL?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Userspace Release 2014-08-26-rc2 - semodule(8) query
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Does selinuxfs support ACL?
- From: "Chengfei (Fixed Network R&D Mgmt Dept)" <chengfei999@xxxxxxxxxx>
- [PATCH] selinux: make the netif cache namespace aware
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [patch] selinux: register nf hooks with single nf_register_hooks call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 feedback on Arch
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- SELinux Userspace Release 2014-08-26-rc2 feedback on Arch
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix a problem with IPv6 traffic denials in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [patch] selinux: register nf hooks with single nf_register_hooks call
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- CIL policy for Android
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Trouble building a selinux toolchain
- From: Judd Meinders <judd.meinders@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: man: Add missing manpage links to security_load_policy.3
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux: man: Add missing manpage links to security_load_policy.3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Check files exist before sefcontext_compile
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Fwd: Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: semanage interface has no effect
- From: Dominick Grift <dac.override@xxxxxxxxx>
- semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: block_suspend everywhere...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: block_suspend everywhere...
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: block_suspend everywhere...
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: block_suspend everywhere...
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- block_suspend everywhere...
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Lots of audits for "selinux_audit_rule_match: stale rule"
- From: Andrew Ruch <adruch2002@xxxxxxxxx>
- Re: [PATCH] Security: List corruption occured during file system automation test
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Security: List corruption occured during file system automation test
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] Security: List corruption occured during file system automation test
- From: shivnandan.k@xxxxxxxxxxx
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: Check files exist before sefcontext_compile
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux/NetLabel fixes for 3.17 (attempt #2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux/NetLabel fixes for 3.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux/NetLabel fixes for 3.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove unused variabled in the netport, netnode, and netif caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: fix the netlbl_catmap_setlong() dummy function
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Query regarding role hierarchy SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: confusing policy in unconfineddomain.te SEAndroid kk4.4
- From: Russell Coker <russell@xxxxxxxxxxxx>
- confusing policy in unconfineddomain.te SEAndroid kk4.4
- From: Zhi Xin <xinzhi@xxxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Debugging sepolgen-ifgen?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.17
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix the NetLabel LSM category mappings
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.17
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix the NetLabel LSM category mappings
- From: David Miller <davem@xxxxxxxxxxxxx>
- tycho.nsa.gov mailing list memberships reminder
- From: mailman-owner@xxxxxxxxxxxxx
- Re: [PATCH 4/4] netlabel: shorter names for the NetLabel catmap funcs/structs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] netlabel: fix the catmap walking functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] netlabel: fix the horribly broken catmap functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] netlabel: fix a problem when setting bits below the previously lowest bit
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix the NetLabel LSM category mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/4] netlabel: shorter names for the NetLabel catmap funcs/structs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 3/4] netlabel: fix the catmap walking functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/4] netlabel: fix the horribly broken catmap functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/4] netlabel: fix a problem when setting bits below the previously lowest bit
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/4] Fix the NetLabel LSM category mappings
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] crypto: properly label AF_ALG socket
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: %u in format string (no. 1) requires 'unsigned int *' but the argument type is 'int *'.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- %u in format string (no. 1) requires 'unsigned int *' but the argument type is 'int *'.
- From: Toralf Förster <toralf.foerster@xxxxxx>
- Re: [PATCH] crypto: properly label AF_ALG socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] crypto: properly label AF_ALG socket
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- How to access the Access Vector Cache from a LKM?
- From: Thomas Coudray <amanone@xxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] Revert "selinux: fix the default socket labeling in sock_graft()"
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: do user space object managers really provide mandatory access control
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: do user space object managers really provide mandatory access control
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: do user space object managers really provide mandatory access control
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: do user space object managers really provide mandatory access control
- From: "Andy Warner" <warner@xxxxxxxxx>
- Re: do user space object managers really provide mandatory access control
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: do user space object managers really provide mandatory access control
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: do user space object managers really provide mandatory access control
- From: "Andy Warner" <warner@xxxxxxxxx>
- do user space object managers really provide mandatory access control
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC] [PATCH] libsemanage: Skip policy module re-link when only setting booleans.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [mcstransd] Fails after Reload Translations
- From: wenzong fan <wenzong.fan@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What's a policy capability?
- From: dE <de.techno@xxxxxxxxx>
- Re: What's a policy capability?
- From: dE <de.techno@xxxxxxxxx>
- RE: File-system is not mounting when I am enabling selinux
- From: Avijit Das <avijitnsec@xxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: What's a policy capability?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to build a simplified refpolicy?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: File-system is not mounting when I am enabling selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What's a policy capability?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: How to build a simplified refpolicy?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: File-system is not mounting when I am enabling selinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- How to build a simplified refpolicy?
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: What's a policy capability?
- From: dE <de.techno@xxxxxxxxx>
- Re: File-system is not mounting when I am enabling selinux
- From: dE <de.techno@xxxxxxxxx>
- File-system is not mounting when I am enabling selinux
- From: Avijit Das <avijitnsec@xxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: What's a policy capability?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- What's a policy capability?
- From: dE <de.techno@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.17
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Initial SIDs.
- From: dE <de.techno@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.17
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: why does kernel call setenforce
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: why does kernel call setenforce
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: why does kernel call setenforce
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: why does kernel call setenforce
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: why does kernel call setenforce
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- why does kernel call setenforce
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [mcstransd] Fails after Reload Translations
- From: Joe Nall <joe@xxxxxxxx>
- [mcstransd] Fails after Reload Translations
- From: wenzong fan <wenzong.fan@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fix for 3.16-rcX
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Initial SIDs.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Initial SIDs.
- From: dE <de.techno@xxxxxxxxx>
- Re: Where does semanage store changes?
- From: dE <de.techno@xxxxxxxxx>
- [GIT PULL] SELinux fix for 3.16-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: NetLabel lead to kernel panic with some SELinux levels
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2] selinux: fix the default socket labeling in sock_graft()
- From: Milan Broz <gmazyland@xxxxxxxxx>
- NetLabel lead to kernel panic with some SELinux levels
- From: Christian Evans <frodox@xxxxxxxx>
- Re: Fwd: [lca-announce] LCA CFP extended until Sunday 20th July 2014
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Showing port Labels
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Showing port Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Showing port Labels
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Showing port Labels
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Showing port Labels
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH v2] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Showing port Labels
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Where does semanage store changes?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Audit support on ARM
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Showing port Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fwd: [lca-announce] LCA CFP extended until Sunday 20th July 2014
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Showing port Labels
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Audit support on ARM
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Showing port Labels
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Where does semanage store changes?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What's a 'permission map'?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: What's a 'permission map'?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: What's a 'permission map'?
- From: dE <de.techno@xxxxxxxxx>
- Re: directory fcontext
- From: dE <de.techno@xxxxxxxxx>
- [PATCH] selinux: fix the default socket labeling in sock_graft()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]