SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] Get rid of security_context_t and fix const declarations.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] ss: Add support for retrieving SELinux contexts
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Using genfscon's partial_path for other filesystems than proc
- From: Luis Ressel <aranea@xxxxxxxx>
- [PATCH] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- This past week I was doing a demo of how to build an Userspace Object Manager for firewalld
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: how to change the context of running process
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.14-rc1
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: SELinux question..
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux question..
- From: Victor Porton <porton@xxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Per Nystrom <pnystrom@xxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Brian Behlendorf <behlendorf1@xxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- [PATCH] selinux: add SOCK_DIAG_BY_FAMILY to the list of netlink message types
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: ole@xxxxxxxxxxxxxxx
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux linux-next tree changes
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: There should be multiple MLS
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- There should be multiple MLS
- From: Victor Porton <porton@xxxxxxxx>
- SELinux linux-next tree changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: runcon and setsid()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux tree changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Research Topics in Operating System Security
- From: Nainesh Patel <nainesh@xxxxxxxxx>
- runcon and setsid()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Fwd: SELINUX language suggestion for future goals
- From: Nainesh Patel <nainesh@xxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- As we move to use Linux Containers User Namespace
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Tawfiq Shah <tawfiqshah@xxxxxxxxx>
- Re: [PATCH 00/11] cross rename v3
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 00/11] cross rename v3
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Waiting for programs to stop
- Re: Web Application access to files in /mnt/
- Re: Waiting for programs to stop
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Create new NetFilter table
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Web Application access to files in /mnt/
- From: Ken Smith <kens@xxxxxxxxxxx>
- Re: Create new NetFilter table
- From: Victor Porton <porton@xxxxxxxx>
- Re: Create new NetFilter table
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Create new NetFilter table
- From: Victor Porton <porton@xxxxxxxx>
- Waiting for programs to stop
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: what is the default context of a program without selinux-aware
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: new to selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: new to selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: new to selinux
- From: Ilya Frolov <ilya.a.frolov@xxxxxxxxx>
- new to selinux
- From: Bryan Harris <bryanlharris@xxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Changing unlabeled_t on files to invalid_label_t.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: My proposal for a new feature in Linux kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: My proposal for a new feature in Linux kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- My proposal for a new feature in Linux kernel
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: what is the default context of a program without selinux-aware
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Tawfiq Shah <tawfiqshah@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- what is the default context of a program without selinux-aware
- From: bigclouds <bigclouds@xxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [PATCH] LSM: Pass commname via get_task_comm()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: how to use interface and node?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14 (part two)
- From: James Morris <jmorris@xxxxxxxxx>
- how to use interface and node?
- From: bigclouds <bigclouds@xxxxxxx>
- Re: any selinux program and architeture books
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.14 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: any selinux program and architeture books
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- any selinux program and architeture books
- From: bigclouds <bigclouds@xxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Mailing list etiquette
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libselinux: Refactor rpm_execcon() into a new setexecfilecon()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Mounting selinuxfs as read-only inside chroot
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- [PATCH] SELinux: Fix memory leak upon loading policy
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: Refactor rpm_execcon() into a new setexecfilecon()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Mounting selinuxfs as read-only inside chroot
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re:Re: question about basic selinux concept
- From: bigclouds <bigclouds@xxxxxxx>
- question about basic selinux concept
- From: bigclouds <bigclouds@xxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH libselinux] Fix a bug in the userspace AVC that broke per-domain permissive mode.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH libselinux] Fix a bug in the userspace AVC that broke per-domain permissive mode.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Change in list manager software
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepolicy-ifgen: Syntax error on line 179876 gen_context [type=GEN_CONTEXT]"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- New SELinux support in Coreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- RE: selinux control for network interface using SOCK_RAW
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- sepolicy-ifgen: Syntax error on line 179876 gen_context [type=GEN_CONTEXT]"
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: [PATCH v2] selinux: selinux_setprocattr()->ptrace_parent() needs rcu_read_lock()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] SELinux: remove duplicated include from hooks.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: revert 102aefdda4d8275ce7d7100bc16c88c74272b260
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Fix broken peer recv check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fix broken peer recv check
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- [PATCH 1/2] selinux: look for IPsec labels on both inbound and outbound packets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/2] Additional TCP SYN-ACK fixes for labeled IPsec
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 1/1] Ignore selevel/serange if MLS is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] Ignore selevel/serange if MLS is disabled
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avtab dense hash table
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avtab dense hash table
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: avtab dense hash table
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: avtab dense hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: subscribe selinux
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: subscribe selinux
- From: "Marino, Claudio" <cmarino@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/2] Fix TCP SYN-ACK labeling and access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- MLS required even when MLS is disabled?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: SELinux Coloring book?
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: SELinux Coloring book?
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: [PATCH 04/05] Add -P semodule option to man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/05] Make sure we do the polkit check on all dbus interfaces.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: [PATCH 05/05] Verify type being passed into semanage permissive is a valid domain.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/05] Verify type being passed into semanage permissive is a valid domain.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/05] Add -P semodule option to man page
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/05] selinux_current_policy_path will return none on a disabled SELinux system
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/05] Add new icons for sepolicy gui
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/05] Make sure we do the polkit check on all dbus interfaces.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 07/08] Cleanup whitespace
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Current upstreamable patch set from Fedora
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/08] Add domain to short list of domains, when -t and -d used together
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/08] Fix up desktop files to match current standards
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/08] Add support to return sesitivities and cats for python bindings.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/08] Call proper dbus function
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/08] Only return writeable files that are enabled
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Timothée Ravier <siosm99@xxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 2/2] checkpolicy: Add debug feature to display constraints / validatetrans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to remove default encoding patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Minor manpages improvements
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: kernel function to verify rootcontext
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] Minor manpages improvements
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] Add systemd unit file for mcstrans daemon
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/3] Improve restorecond systemd unit file
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- kernel function to verify rootcontext
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Patch to remove default encoding patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- No module named policycoreutils.default_encoding_utf8 ?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- review of a dbus-selinux patch
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 0/2] checkpolicy: Add constraint info to -d option
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: Add debug feature to display constraints / validatetrans
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Add sepol_validate_transition_reason_buffer function
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Fix valgrind errors in constraint_expr_eval_reason
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] src/libselinux.pc.in: Move -lpthread to Libs.private
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Android emulator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android emulator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Android emulator
- From: Gabriele Scotti <gabriele.sct@xxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Handling unknown permissions in userspace object managers
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Split policycoreutils up?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/01] Make yum/extract_rpms optional so that apt based systems can use tool
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 01/01] Make yum/extract_rpms optional so that apt based systems can use tool
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/01] Add test suite for audit2allow and sepolgen_ifgen
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/1] Add back attributes flag to fix exception crash.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/10] Add back attributes flag to fix exception crash.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 01/10] Add back attributes flag to fix exception crash.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Split policycoreutils up?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Split policycoreutils up?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Pruning dead/obsolete branches?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [ANN] SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Properly build the swig exception file even if the headers are missing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Properly build the swig exception file even if the headers are missing
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: rlpkg -a -r causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rlpkg -a -r causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Previous patch set, is complete Only sending 1-9.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH selinux-testsuite] fix policy Makefile for RHEL4/5
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/17] Have audit2allow output additional constraint
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/17] Fix line spacing on audit2allow output
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/17] Return the sections of the source and target context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/17] Change audit2why to return constraint information on
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 04/17] libsepol: V1 Allow constraint denials to be determined.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/17] Catch IOError errors within audit2allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/17] Make sure userdel cleans up after itself in test
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sven Vermeulen patch to fix sepolgen test code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Sven Vermeulen patch to fix sepolgen test code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Sven Vermeulen patch to fix sepolgen test code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Michal Trunecka patch to allow restorecon to accept {}
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Need to delete all managed objects before readding them
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 74/74] Make RANLIB variable overridable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] Need to delete all managed objects before readding them
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/2] semanage user customized should use -L not -l
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Re: Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Re: Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [PATCH 52/74] Add deleteall customizations field for modules.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 72/74] Mount sys before trying to mount selinuxfs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/74] Use power of 2 for STAR_COUNT
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 73/74] Update pkgconfig definition
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 71/74] Patch from Sven Vermeulen to use RANLIB.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 74/74] Make RANLIB variable overridable
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 69/74] Need to document -o filename in usage statement
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 66/74] Make setsebool be less verbose.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 68/74] setfiles should always return -1 on failures.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/74] Fix error when policy does not match the system.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/74] seinfo needs to work if mls is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/74] Change polgengui to use latest interfaces availabel in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 62/74] Return the type aliases.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/74] If users of seobject set serange or seuser to ""
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/74] Add new test suite for sepolicy tool set.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/74] Make sure file equivalance target and source do not end
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/74] Mv some of the setup we were doing in the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/74] Fix customized of fcontext and booleans to return
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/74] <<none>> should be a valid type to be used with the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/74] Return the level when looking at the customized changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/74] If a user specifies a module to add that does not exist
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/74] Only list disabled modules if the user ask for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/74] Add customized calls for modules to list disabled
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/74] Fix bug in logger.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/74] Add new FILE_STRING constands
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/74] Cleanup handling of translations code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/74] Fix lots of bugs in the bash completion script.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/74] Convert semanage command to use argparse
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/74] Add test script for testing semanage functionality.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/74] Lots of fixes for fixfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/74] genhomedircon is no longer a script
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/74] bash completsion scripts have moved.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/74] Break the semanage man page into different man pages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/74] Fix spelling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 37/74] Give people who use run_init or newrole an indicator to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/74] Handle cleanup of locks properly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/74] Add support for systemd service for restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/74] Allow users to have homedir as a symbolic link but
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/74] Xephry now supports resizable flag
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/74] Fix spelling mistake
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/74] Swith to using openbox for window manager rather then
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/74] Handle audit2allow and audit2why with the same
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/74] We were asked to open output file for append rather
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/74] Need to set the locale to current locale
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 27/74] Update Translations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/74] Fix test matching to use proper constants
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/74] sepolgen did not work with filename transitions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/74] fix bug in calls to attributes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/74] If you are pushing data onto the list that already
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/74] Pull auditing into libsemanage.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/74] Remove the policy.kern after policy is build and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/74] Add Laurent Bigonville fix to look at MAX_UID as well
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 19/74] Fix handling of temporary file in sefcontext_compile.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 18/74] Fixes for procattr calls to handle cache properly.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/74] Add decent constants for python for return of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 16/74] Fix label substituion to work with the equiv path of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/74] Add selinux_current_policy_path
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/74] Support udev-197 and higher
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/74] Change get_context_list to return an error rather then
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/74] Separate out the calling of local subs and dist subs in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/74] Patch to change *setfilecon to not return ENOSUP if
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/74] This patch fixes python parsing.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/74] define SELINUX_TRANS_DIR in selinux.h
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/74] Laurent Bigonville patch to fix various minor manpage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/74] Add selinux_systemd_contexts_path
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/74] Add selinux_set_policy_root sets an alternate policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/74] Add missing man page for sefcontext_compile
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/74] Allow " " and ":" in file name transtions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/74] handle-unknown should be an optional argument
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/74] Laurent Bigonville patch to allow overriding PATH
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Allow audit2allow to return constraint information from policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: filtering outgoing packets with SELinux and iptables
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [PATCH selinux-testsuite] fix policy Makefile for RHEL4/5
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [GIT PULL] SELinux updates for 3.12
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] --handle-unknown option takes a required argument
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][v3] libselinux: support building on older PCRE libs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux updates for 3.12
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Need information for building embedded system.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH][v3] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: support building on older PCRE libs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- [PATCH] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: support building on older PCRE libs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: avoid shadowing 'stat' in load_mmap
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux updates for 3.12
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC]: Stephen Smalley Facts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SELinux: Update policy version to support constraints info
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: avoid shadowing 'stat' in load_mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: support building on older PCRE libs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: avoid shadowing 'stat' in load_mmap
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- [PATCH 1/2] libselinux: support building on older PCRE libs
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- [PATCH 0/2] Repair two build failures on older host
- From: Joe MacDonald <joe@xxxxxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Request for a new CIL statement
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Update to CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Update to CIL
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux updates for 3.12
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Update to CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Update to CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Update to CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [GIT PULL] SELinux updates for 3.12
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [GIT PULL] SELinux updates for 3.12
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Common Intermediate Language (CIL) Update
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policycoreutils: refactoring Python 2.* to Python 3.*
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Common Intermediate Language (CIL) Update
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [PATCH 1/1] Fix referenced before assignment error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Open stdin as read/write
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] Current stable policycoreutils requires selinux_current_policy_path
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 16/16] policycoreutils: Do not include LDFLAGS in CFLAGS when building sepolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 06/16] libsemanage: Also check for the uppoer bound on user ids in login.defs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Policycoreutils: refactoring Python 2.* to Python 3.*
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: There is question about command semodule_deps
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MLS over loopback interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: MLS over loopback interface
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: MLS over loopback interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS over loopback interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS over loopback interface
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: MLS over loopback interface
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- MLS over loopback interface
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] conditionally reschedule while loading selinux policy.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] conditionally reschedule while loading selinux policy.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: Use kmemdup instead of kmalloc + memcpy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 1/1] Support user-provided RANLIB
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 2/5] Update pkgconfig definition
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 0/5] libselinux gentoo patches
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 5/5] Current stable policycoreutils requires selinux_current_policy_path
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 3/5] Make RANLIB variable overridable
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 4/5] Support udev-197 and higher
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 1/5] Mount sys before trying to mount selinuxfs
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 4/4] test_policy: create a "build" target
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 3/4] test_policy: use RHEL instead of REDHAT in Makefile
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 2/4] test_policy: general Makefile cleanup
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [selinux-testsuite RFC PATCH 4/4] test_policy: create a "build" target
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [selinux-testsuite RFC PATCH 3/4] test_policy: use RHEL instead of REDHAT in Makefile
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [selinux-testsuite RFC PATCH 0/4] selinux-testsuite patches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [selinux-testsuite RFC PATCH 2/4] test_policy: general Makefile cleanup
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [selinux-testsuite RFC PATCH 1/4] test_policy: test_global.te fix for Fedora Rawhide (Sept 24th, 2013)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Fwd: linux-next tree update for SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fwd: linux-next tree update for SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fwd: linux-next tree update for SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- linux-next tree update for SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] selinux: add Paul Moore as a SELinux maintainer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: RFC policycoreutils packaging
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RFC policycoreutils packaging
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: RFC policycoreutils packaging
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC policycoreutils packaging
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]