SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] libsepol: bool_copy_callback set state on creation
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Fix logic in bunzip for uncompressed pp files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Fix logic in bunzip for uncompressed pp files
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Change bunzip to use heap instead of stack for buffer.
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- New Article on Future Docker Security.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: 答复: Got some problem when using the type_transition, look for some helps! thank you!
- From: Dominick Grift <dac.override@xxxxxxxxx>
- 答复: Got some problem when using the type_transition, look for some helps! thank you!
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Change bunzip to use heap instead of stack for buffer.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Change bunzip to use heap instead of stack for buffer.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Xen/FLASK policy updates for device contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: fix fname[] initialization in test_utilities.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Got some problem when using the type_transition, look for some helps! thank you!
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: Got some problem when using the type_transition, look for some helps! thank you!
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Got some problem when using the type_transition, look for some helps! thank you!
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- [PATCH 2/3] libsepol, checkpolicy: widen Xen IOMEM ocontext entries
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 3/3] libsepol, checkpolicy: add device tree ocontext nodes to Xen policy
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 1/3] checkpolicy: Expand allowed character set in paths
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH v3 0/3] Xen/FLASK policy updates for device contexts
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: SE Linux savvy union FS?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Linux savvy union FS?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: Saltstack and ipa-install on Centos7 failing
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] libsemanage: fix fname[] initialization in test_utilities.c
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: Saltstack and ipa-install on Centos7 failing
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Strange behavior: type boundaries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix -Wformat errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Strange behavior: type boundaries
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: Saltstack and ipa-install on Centos7 failing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux category relabel (puppet)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Saltstack and ipa-install on Centos7 failing
- From: Andrew Holway <andrew.holway@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] Fix -Wformat errors
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux category relabel (puppet)
- From: "Higgs, Stephen" <Stephen.Higgs@xxxxxxxx>
- Re: [PATCH] Fix -Wformat errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix -Wformat errors
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Fix -Wformat errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix -Wformat errors
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [Xen-devel] [PATCH 2/3] libsepol, checkpolicy: widen Xen IOMEM ocontext entries
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [Xen-devel] [PATCH 2/4] Add device tree ocontext nodes to Xen policy
- From: Julien Grall <julien.grall@xxxxxxxxxx>
- [PATCH 3/3] libsepol, checkpolicy: add device tree ocontext nodes to Xen policy
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 2/3] libsepol, checkpolicy: widen Xen IOMEM ocontext entries
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 1/3] checkpolicy: Expand allowed character set in paths
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH v2 0/3] Xen/FLASK policy updates for device contexts
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] checkpolicy: add output for Xen policy version support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Xen-devel] [PATCH 1/4] Expand Xen IOMEMCON to 64 bits
- From: Julien Grall <julien.grall@xxxxxxxxxx>
- Re: [Xen-devel] [PATCH 2/4] Add device tree ocontext nodes to Xen policy
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- Re: [Xen-devel] [PATCH 2/4] Add device tree ocontext nodes to Xen policy
- From: Julien Grall <julien.grall@xxxxxxxxxx>
- [PATCH 4/4] checkpolicy: Expand allowed character set in paths
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 1/4] Expand Xen IOMEMCON to 64 bits
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 2/4] Add device tree ocontext nodes to Xen policy
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 3/4] checkpolicy: add output for Xen policy version support
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- [PATCH 0/4] Xen/FLASK policy updates for device contexts
- From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix precedence between number and filesystem tokens.
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] checkpolicy: Fix precedence between number and filesystem tokens.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] avc: remove unnecessary pointer reassignment
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Tuning Docker with the newest security enhancements
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] avc: remove unnecessary pointer reassignment
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Cross-compile for arm architecture
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cross-compile for arm architecture
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cross-compile for arm architecture
- From: Emre Can Kucukoglu <eckucukoglu@xxxxxxxxx>
- [PATCH 1/2] libsepol: clean up the CIL API
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 2/2] libsemanage: use the new CIL API
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/2] Add option to remove HLL files and fix memory leaks
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] avc: remove unnecessary pointer reassignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] avc: remove unnecessary pointer reassignment
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [PATCH] avc: remove unnecessary pointer reassignment
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH 1/2] libsemanage: Add option to remove HLL files after compilation
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 2/2] libsemanage: Fix memory leaks when parsing semanage.conf
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 0/2] Add option to remove HLL files and fix memory leaks
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Change bunzip to use heap instead of stack for buffer.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libsemanage: Change bunzip to use heap instead of stack for buffer.
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: [PATCH] libsepol: Update CIL documentation
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Fwd: [PATCH] fgets function warnings fix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cross-compile for arm architecture
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Cross-compile for arm architecture
- From: Emre Can Kucukoglu <eckucukoglu@xxxxxxxxx>
- Re: [PATCH] libsepol: Update CIL documentation
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsepol: Update CIL documentation
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: typo in semanage-port.8 (patch)
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- typo in semanage-port.8 (patch)
- From: Andrew Spiers <andrew@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux: sefcontext_compile: handle newlines in file names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: label_file: handle newlines in file names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: label_file: handle newlines in file names
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux: label_file: handle newlines in file names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fwd: [PATCH] proc.5: Fix SELinux /proc/pid/attr/current example.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: getcon.3: Fix setcon description.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Fix error path in mls_semantic_level_expand().
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 1/1] Fix error path in mls_semantic_level_expand().
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Re: MCS error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MCS error
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: Odd occurrence of /sbin/setfiles running
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Odd occurrence of /sbin/setfiles running
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: MCS error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MCS error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Odd occurrence of /sbin/setfiles running
- From: Mark Lee <markleee50@xxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MCS error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- MCS error
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix audit2why error handling if SELinux is disabled.
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH] selinux: reconcile security_netlbl_secattr_to_sid() and mls_import_netlbl_cat()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] libselinux: fix audit2why error handling if SELinux is disabled.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.20 #1
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.20 #1
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.20 #1
- From: Paul Moore <pmoore@xxxxxxxxxx>
- ANN: SETools 4.0.0-alpha2
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: keywords in .fc files
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: keywords in .fc files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- keywords in .fc files
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- [PATCH 4/4] selinux-testsuite: allow unconfined_t entrypoint to test_nnp_bounded_exec_t
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 3/4] selinux-testsuite: enable task_setscheduler to work with cgroups
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/4] selinux-testsuite: allow the file test to work with all coreutils versions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/4] selinux-testsuite: add improved OS detection
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/4] Fix the selinux-testsuite for RHEL5,6,7 and Rawhide
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix RHEL detection
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix RHEL detection
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] cipso: don't use IPCB() to locate the CIPSO IP option
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] cipso: don't use IPCB() to locate the CIPSO IP option
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix RHEL detection
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update URLs for selinux userspace and refpolicy.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: split testcase list for rhel-6.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v3] selinux-testsuite: Add tests for exec transitions under NO_NEW_PRIVS.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] cipso: don't use IPCB() to locate the CIPSO IP option
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] cipso: don't use IPCB() to locate the CIPSO IP option
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Update URLs for selinux userspace and refpolicy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: split testcase list for rhel-6.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: split testcase list for rhel-6.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] selinux-testsuite: Add tests for exec transitions under NO_NEW_PRIVS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: Add tests for exec transitions under NO_NEW_PRIVS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for exec transitions under NO_NEW_PRIVS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.20
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.20
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Rebasing the selinux#upstream branch
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux Test Suite
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux Test Suite
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: SELinux Test Suite
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: virtualenv
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: virtualenv
- From: Andrew Holway <andrew.holway@xxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux Test Suite
- SELinux Test Suite
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] libsepol: Maybe fix MacOS X build.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Enable building CIL in the host libsepol.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: pcre_study can return NULL without error.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: Adjustments to android property backend.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Only check SELinux enabled status once in selinux_check_access().
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux Userspace Release: 20150202
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stefano Borini <stefano.borini@xxxxxxxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stefano Borini <stefano.borini@xxxxxxxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stefano Borini <stefano.borini@xxxxxxxxxxxxxxx>
- Re: virtualenv
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: virtualenv
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- virtualenv
- From: Andrew Holway <andrew.holway@xxxxxxxxxxxxxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] SELinux: fix error code in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- spinlock in centos 6.4 and redhat enterprise 6 using chcon
- From: Stefano Borini <stefano.borini@xxxxxxxxxxxxxxx>
- Re: [patch] SELinux: fix error code in policydb_init()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] SELinux: fix error code in policydb_init()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [patch] SELinux: fix error code in policydb_init()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH v3] SELinux SCTP protocol support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v3] SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- [PATCH] Add security hooks to binder and implement the hooks for SELinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: What did I do wrong?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.kernel@xxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: ethan zhao <ethan.zhao@xxxxxxxxxx>
- What did I do wrong?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- [PATCH] Allow libsepol C++ static library on device.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Selinux/hooks.c: Fix a NULL pointer dereference caused by semop()
- From: Ethan Zhao <ethan.zhao@xxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Selinux for Go
- From: Ted Toth <txtoth@xxxxxxxxx>
- Selinux for Go
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Improve check_assertions performance through hash tweaks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Mailing list etiquette
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ebitmap: map size does not match my size on s390x
- From: Johannes Segitz <jsegitz@xxxxxxxx>
- [PATCH v2 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 1/3] Build libsepol with -O2
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH v2 0/3] Improve check_assertions performance through hash tweaks
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: [RFC][PATCH 6/9] gen_initramfs_list.sh: include xattrs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: ebitmap: map size does not match my size on s390x
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Alireza Keyhani <alireza.keyhanii@xxxxxxxxx>
- ebitmap: map size does not match my size on s390x
- From: Johannes Segitz <jsegitz@xxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] pstore: selinux: add security in-core xattr support for pstore and debugfs
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Shahbaz khan <shazalive@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Alireza Keyhani <alireza.keyhanii@xxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Why SElinux use Racist Employee?
- From: Gaurav Gangwar <gauravgangwaar@xxxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH] selinux: quiet the filesystem labeling behavior message
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: ss: mls: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Build libsepol with -O2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: ss: mls: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Vincent Brillault <gentoo+selinux@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1174405
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Dave Jones <davej@xxxxxxxxxxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: noisy selinux messages on tmpfs mount.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/3] Build libsepol with -O2
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 3/3] Tweak avtab hash table parameters for better performance
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 2/3] Use a better hash function for libsepol's avtab
- From: John Brooks <john.brooks@xxxxxxxxx>
- [PATCH 0/3] Improve check_assertions performance through hash tweaks
- From: John Brooks <john.brooks@xxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] security: selinux: avc.c: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: Problem running "selinux sandbox" with java
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] run_init: fix open_init_pty avaibility check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Problem running "selinux sandbox" with java
- From: Bhuvan Gupta <bhuvangu@xxxxxxxxx>
- Re: could selinux satisfy my need?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- could selinux satisfy my need?
- From: jiangdahui <jdh1988@xxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: avc.c: Remove unused function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] run_init: Use a ring buffer in open_init_pty
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Some of our customers are looking to turn on SELinux but they also want to use CSP from Symantec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis.Kletnieks@xxxxxx
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis.Kletnieks@xxxxxx
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: open_init_pty function?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- "SELinux: ebitmap: truncated map" after editing with libsepol
- From: Andrew Gunnerson <andrewgunnerson@xxxxxxxxx>
- Re: linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Eric Paris <eparis@xxxxxxxxxx>
- linux-next 20141216 BUG: sleeping function called from invalid context at mm/slab.c:2849
- From: Valdis Kletnieks <Valdis.Kletnieks@xxxxxx>
- Process changes for the SELinux tree
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: open_init_pty function?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: open_init_pty function?
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: open_init_pty function?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- open_init_pty function?
- From: eric gisse <jowr.pi@xxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: ANN: SELinux Userspace Release: 20140826-rc7
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: How does device labeling work?
- From: "Paris, Eric" <eparis@xxxxxxxxxxxxxx>
- Re: [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.19
- From: James Morris <jmorris@xxxxxxxxx>
- ANN: SELinux Userspace Release: 20140826-rc7
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.19
- From: Paul Moore <pmoore@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libsemanage: ensure migrated files have the correct types
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: How does device labeling work?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- [PATCH] Update policy for selinux userspace moving the policy store to /var/lib/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [RFC-PATCH 3/3] selinux: Add support for the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 2/3] net: Extend security get/setsockopt entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 0/3] SELinux: Support the SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC-PATCH 1/3] security: Extend security get/setsockopt entries
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Add "RuntimeDirectory=setrans" to the mcstrans.service
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: How does device labeling work?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How does device labeling work?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- How does device labeling work?
- From: "Minear, Spencer" <Spencer_Minear@xxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] Add "RuntimeDirectory=setrans" to the mcstrans.service
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix expand logic for policy versions older than 24.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libsemanage: close hll file descriptors
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] Fix expand logic for policy versions older than 24.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permission requirements for semodule?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Permission requirements for semodule?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] semanage_migrate_store: Python3 support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] semanage_migrate_store: Python3 support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: pp: add roletype statements for both declared and required type/typeattributes
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC] systemd the userspace object manager
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Question on unconfined_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Question on unconfined_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Question on unconfined_t
- From: "Paddie O'Brien" <paddieobrien@xxxxxxxxx>
- Re: Question on unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Question on unconfined_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Question on unconfined_t
- From: "Paddie O'Brien" <paddieobrien@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc6
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18 #3
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: convert WARN_ONCE() to printk() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: convert WARN_ONCE() to printk_once() in selinux_nlmsg_perm()
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- SELinux Userspace Release: 20140826-rc6
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Support SCTP protocol
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils: pp: define type aliases in the correct scope
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 1/2] policycoreutils: pp: mimic require block support in CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 0/2] Fix pp2cil bugs associated with optionals
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Patches to support the SELinux SCTP kernel patch
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: Support SCTP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me? (there is some mistakes in my last emeil ,sorry! )
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Got Segmentation fault when use avc_context_to_sid() funtion!! can anyone help me?
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 7/7] SELinux: Check against union and lower labels for file ops on lower files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/7] Security: Pass the union-layer file path into security_file_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- RE: squashfs files showing as unlabeled_t
- From: <Josh_Pennell@xxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- "selinux_nlmsg_perm: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=30" warning on Linux 3.18-rc3
- From: Vinson Lee <vlee@xxxxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: squashfs files showing as unlabeled_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user_r/sysadm_r/staff_r/unconfined_r
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- user_r/sysadm_r/staff_r/unconfined_r
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- squashfs files showing as unlabeled_t
- From: <Josh_Pennell@xxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc5
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Missing security labels for socket objects?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Missing security labels for socket objects?
- From: peter enderborg <peter.enderborg@xxxxxxxxxxxxxx>
- ANN: SETools 4.0.0-alpha1
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux Userspace Release: 20140826-rc5
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux packaging
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Functions prefixed with security_ in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsemanage: install to LIBDIR instead of SHLIBDIR
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 2/2] libselinux: libsepol: use ln --relative to create .so symlinks
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 0/2] Updates to Makefiles to fix bugs with LIBDIR/SHLIBDIR
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux packaging
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: cilc: name space inconsistency
- From: Dominick Grift <dac.override@xxxxxxxxx>
- libselinux packaging
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- cilc: name space inconsistency
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsepol: Report all neverallow violations.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- OpenSSH SELinux awareness: For your consideration
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: fs_use_trans
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Report all neverallow violations.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fs_use_trans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: fs_use_trans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- fs_use_trans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18 #2
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Functions prefixed with security_ in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: Add permission for network MAC address
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] selinux: hooks: Add permission for network MAC address
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc4
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- SELinux Userspace Release: 20140826-rc4
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] selinux: fix inode security list corruption
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux Notebook 4th Edition now available
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: fix inode security list corruption
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/hll/pp: only print certain roles when declared in base modules
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] pp2cil fixes based on feedback
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 3/3] policycoreutils/hll/pp: change printing behavior of typeattribute/sets
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 2/3] policycoreutils/hll/pp: fix '\n' parsing in filecon statements
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 1/3] policycoreutils/hll/pp: Fix role/roletype scoping
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- [PATCH 0/3] pp2cil fixes based on feedback
- From: Yuli Khodorkovskiy <ykhodorkovskiy@xxxxxxxxxx>
- Re: [PATCH 00/20] Compiling userland lib & tools with hardened gcc flags
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: UPower dbus interface unavailable with enforcing SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.18
- From: James Morris <jmorris@xxxxxxxxx>
- UPower dbus interface unavailable with enforcing SELinux
- From: Tobias Bengfort <tobias.bengfort@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.18
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Updating the linux-security next branch
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Fwd: Query regarding role hierarchy SELinux
- From: Harpreet <harpreet20@xxxxxxxxx>
- Re: problem about making selinux userspace
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- problem about making selinux userspace
- From: kuangjiou <kuangjiou@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: services: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: hooks: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] selinux: services: cleanup orphan keywords in audit log text
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Few issues we are facing when we are enabling selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Few issues we are facing when we are enabling selinux
- From: Avijit Das <avijitnsec@xxxxxxxx>
- [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 20/20] libsepol/tests: fix gcc -Warray-bounds warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 19/20] checkpolicy: fix gcc -Wunused-variable warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 18/20] Fix gcc -Wstrict-prototypes warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 17/20] policycoreutils: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 15/20] checkpolicy: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 16/20] policycoreutils/hll/pp: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 14/20] libsemanage: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 13/20] libsepol/cil: fix gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 12/20] libsemanage: constify name and ext_lang parameters of semanage_module_install_hll
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 11/20] libsepol: fix most gcc -Wwrite-strings warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 10/20] checkpolicy: fix gcc -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 09/20] libselinux: fix gcc -Wsign-compare warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 08/20] checkpolicy: constify the message written by yyerror and yywarn
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 07/20] checkpolicy: add printf format attribute to relevant functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 05/20] policycoreutils/semodule_package: fix debug build
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 06/20] policycoreutils/hll/pp: add printf format attribute to relevant functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 04/20] policycoreutils/sandbox: fix debug build
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 03/20] policycoreutils/hll/pp: fix potential use of uninitialized variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 02/20] libsemanage: Fix use of unitialized variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 01/20] libsepol: fix potential free of uninitialized pointer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 00/20] Compiling userland lib & tools with hardened gcc flags
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix compilation with -Wformat-security
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: fix compilation with -Wformat-security
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Userspace Release 2014-08-26-rc2 - semodule(8) query
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Does selinuxfs support ACL?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Userspace Release 2014-08-26-rc2 - semodule(8) query
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Does selinuxfs support ACL?
- From: "Chengfei (Fixed Network R&D Mgmt Dept)" <chengfei999@xxxxxxxxxx>
- [PATCH] selinux: make the netif cache namespace aware
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] Use $(PYTHON) instead of "python" in every Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [patch] selinux: register nf hooks with single nf_register_hooks call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 feedback on Arch
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- SELinux Userspace Release 2014-08-26-rc2 feedback on Arch
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- SELinux Userspace Release 2014-08-26-rc2 HLL/CIL query
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix a problem with IPv6 traffic denials in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [patch] selinux: register nf hooks with single nf_register_hooks call
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- CIL policy for Android
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Trouble building a selinux toolchain
- From: Judd Meinders <judd.meinders@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: man: Add missing manpage links to security_load_policy.3
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux: man: Add missing manpage links to security_load_policy.3
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] file: replace 'ls -Z' with 'ls -lZ' for consistent results
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] policycoreutils: mcstrans: use string_to_av_perm() to calculate permission access vector
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux Userspace Release: 20140826-rc1
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- SELinux Userspace Release: 20140826-rc1
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Debugging sepolgen-ifgen?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Check files exist before sefcontext_compile
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Re: semanage interface has no effect
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Fwd: Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: Re: [PATCH] Security: List corruption occured during file system automation test
- From: Shivnandan Kumar <shivnandan.k@xxxxxxxxxxx>
- Re: semanage interface has no effect
- From: Dominick Grift <dac.override@xxxxxxxxx>
- semanage interface has no effect
- From: "Stepan G. Fedorov" <stfedorov@xxxxxxxxx>
- Currently we can end up with different permissions on the compiled file_context regex files than the original.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]