SELinux - Date Index
[Prev Page][Next Page]
- Re: [RFC PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v9 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] doc: context_new(3): fix the return value description
- From: Pádraig Brady <P@xxxxxxxxxxxxxx>
- Re: [PATCH] doc: context_new(3): fix the return value description
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 0/4] libselinux: Man pages cleanups and updates
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/4] libselinux: Man pages cleanups and updates
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- [PATCH] doc: context_new(3): fix the return value description
- From: Pádraig Brady <P@xxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] libselinux: Man pages cleanups and updates
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] Package script(let)s SELinux execution context
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: grift <dominick.grift@xxxxxxxxx>
- Re: policy for PowerDNS
- From: grift <dominick.grift@xxxxxxxxx>
- policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: [PATCH v9 0/2] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH v9 2/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v9 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v9 0/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Bisected regression: iterate_fd() selinux change affects flash plugin
- From: Pavel Roskin <proski@xxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 1/2] tun: correctly report an error in tun_flow_init()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 0/2] Fix some multiqueue TUN problems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 2/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 0/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH RFC] Package script(let)s SELinux execution context
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH 3/4] libselinux: Fix typo in man page
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH] libselinux: Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH 0/4] libselinux: Man pages cleanups and updates
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH 1/4] libselinux: Fix program synopsis and function prototypes in man pages
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH] libselinux: Refactor rpm_execcon() into a new setexecfilecon()
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [PATCH 4/4] libselinux: Add references and man page links to _raw function variants
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: Bisected regression: iterate_fd() selinux change affects flash plugin
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netnode_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "David P. Quigley" <selinux@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] NFSv4: Introduce new label structure
- From: "David P. Quigley" <selinux@xxxxxxxxxxxxxxx>
- Re: Bisected regression: iterate_fd() selinux change affects flash plugin
- From: Pavel Roskin <proski@xxxxxxx>
- Re: [PATCH 10/13] NFS: Add label lifecycle management
- From: "David P. Quigley" <selinux@xxxxxxxxxxxxxxx>
- Re: Labeled NFS [v5]
- From: "David P. Quigley" <selinux@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] NFSv4: Introduce new label structure
- From: "David P. Quigley" <selinux@xxxxxxxxxxxxxxx>
- Re: Bisected regression: iterate_fd() selinux change affects flash plugin
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 05/13] KConfig: Add KConfig entries for Labeled NFS
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/13] Security: Add hook to calculate context based on a negative dentry.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/13] SELinux: Add new labeling type native labels
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 08/13] NFSv4: Extend fattr bitmaps to support all 3 words
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 06/13] NFSv4: Add label recommended attribute and NFSv4 flags
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 09/13] NFS:Add labels to client function prototypes
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 03/13] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 11/13] NFS: Client implementation of Labeled-NFS
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 13/13] NFSD: Server implementation of MAC Labeling
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 01/13] Security: Add hook to calculate context based on a negative dentry.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 07/13] NFSv4: Introduce new label structure
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 05/13] KConfig: Add KConfig entries for Labeled NFS
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 10/13] NFS: Add label lifecycle management
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH 12/13] NFS: Extend NFS xattr handlers to accept the security namespace
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Labeled NFS [v5]
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Bisected regression: iterate_fd() selinux change affects flash plugin
- From: Pavel Roskin <proski@xxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: reload seandroid policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RE: reload seandroid policy
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- reload seandroid policy
- From: Shuiqing Wang <s.wang@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v6] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible issues with dpkg SELinux support
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Possible issues with dpkg SELinux support
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: [PATCH v6] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- semanage fails when conflicting types are in current or subdirectory
- From: Daniel Black <daniel.black@xxxxxxxxxxxxx>
- Re: [PATCH v6] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: With systemd taking care of starting services, is there any reason to continue to ship run_init?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: With systemd taking care of starting services, is there any reason to continue to ship run_init?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- With systemd taking care of starting services, is there any reason to continue to ship run_init?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] Update my email address.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update my email address.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Question about SELinux capability
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: Question about SELinux capability
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- Re: Question about SELinux capability
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- RE: Question about SELinux capability
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: Question about SELinux capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Question about SELinux capability
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- Re: Question about SELinux capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Question about SELinux capability
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- Re: [PATCH v5.1] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] setools-3.3.7:apol: Add constraints search tab
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Question about policy module error message
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Question about policy module error message
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Question about policy module error message
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Question about policy module error message
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Question about policy module error message
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- Re: Question about policy module error message
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Question about policy module error message
- From: "Moyer, Thomas - 0668 - MITLL" <thomas.moyer@xxxxxxxxxx>
- Fwd: Re: [libvirt] [PATCH] selinux: Don't fail RestoreAll if file doesn't have a default label
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Call for presentations LCA2013 Security Miniconf
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: First attempt for the patch on extending the plugin interface for rpm
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: First attempt for the patch on extending the plugin interface for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: First attempt for the patch on extending the plugin interface for rpm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: First attempt for the patch on extending the plugin interface for rpm
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- RE: First attempt for the patch on extending the plugin interface for rpm
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [selinux-testsuite][PATCH] fix execshare/parent segfault on ia64
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- RE: First attempt for the patch on extending the plugin interface for rpm
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- First attempt for the patch on extending the plugin interface for rpm
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use auth_read_passwd only if defined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use auth_read_passwd only if defined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use auth_read_passwd only if defined
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: run_init change in latest policycoreutils
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: run_init change in latest policycoreutils
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: run_init change in latest policycoreutils
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [selinux-testsuite][PATCH] corenet_all_recvfrom_unlabeled requires domain
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] test_ptrace: fix policy to allow building with relro
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- semanage not properly logging new seuser
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: Fix semange alternative logging code
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: apol permission map weights
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/15] policycoreutils: Add new open_init_pty that doesn't waste CPU time
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 04/15] policycoreutils: Add new open_init_pty that doesn't waste CPU time
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 13/15] libsemanage: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 01/15] Policycoreutils: Allow overriding INITDIR in restorecond Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 06/15] libsepol: Allow overriding LIBBASE in src/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 03/15] policycoreutils: Allow overriding CFLAGS in setfiles and sestatus Makefiles
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 11/15] libselinux: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 04/15] policycoreutils: Add new open_init_pty that doesn't waste CPU time
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 00/15] Patches from the Debian packages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 14/15] libsepol: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 08/15] libselinux: Allow overriding LIBBASE in src/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 07/15] libsemanage: Also check for the uppoer bound on user ids in login.defs
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 15/15] policycoreutils: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 10/15] libselinux: Fix various minor manpage issues and correct section numbering.
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 02/15] policycoreutils: Create correct man directory for run_init manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 12/15] checkpolicy: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 09/15] libselinux: Do not use LDFLAGS to set -lpcre
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 05/15] checkpolicy: Allow overriding LIBDIR in test/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: semanage: should -a imply -m?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- apol permission map weights
- From: Hayawardh Vijayakumar <hvijay@xxxxxxxxxxx>
- Re: [PATCH v4] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- run_init change in latest policycoreutils
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: semanage: should -a imply -m?
- From: "Sutton, Harry (GSE)" <harry.sutton@xxxxxx>
- semanage: should -a imply -m?
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Update to docs
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Wrap auth_read_passwd with ifdef(`distro_redhat') .
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [ANN] SELinux userspace release
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Wrap auth_read_passwd with ifdef(`distro_redhat') .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Source policy files for Tomcat?
- From: "Chris O'Neil" <support@xxxxxxxxxxxxxx>
- SE Android: New list set up
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: clean up in android.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: seandroid 4.1.1
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- [PATCH v3 5/6] LSM: SELinux changes to allow LSM stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC frameworks/base] Initial implementation of colored stripe.
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: clean up in android.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: clean up in android.c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: clean up in android.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: level
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: level
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Call for presentations at the 2013 LCA Security Miniconf
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux Branded USB Thumb Drives
- From: "Kevin W. Wall" <kevin.w.wall@xxxxxxxxx>
- Re: SELinux Branded USB Thumb Drives
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- level
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux Branded USB Thumb Drives
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Upstream changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Branded USB Thumb Drives
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux Branded USB Thumb Drives
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: signature clause in mac_permisions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid and policy version
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: seandroid and policy version
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: seandroid 4.1.1
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: signature clause in mac_permisions
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Upstream changes
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Upstream changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: clean up in android.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- seandroid 4.1.1
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Upstream changes
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: signature clause in mac_permisions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: signature clause in mac_permisions
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- signature clause in mac_permisions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path
- From: "Lentes, Bernd" <bernd.lentes@xxxxxxxxxxxxxxxxxxxxx>
- Re: ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path
- From: "Lentes, Bernd" <bernd.lentes@xxxxxxxxxxxxxxxxxxxxx>
- Re: policycoreutils build failure
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: clean up in android.c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: clean up in android.c
- From: Kenny Root <kroot@xxxxxxxxxx>
- clean up in android.c
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: Update to docs
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: [RFC] Add initial clipboard access control implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dev ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: dev ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: dev ion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- dev ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Update to docs
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] Add initial clipboard access control implementation
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [RFC] Add initial clipboard access control implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils build failure
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: policycoreutils build failure
- From: Pat McClory <pmcclory@xxxxxxxxxx>
- Re: policycoreutils build failure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Add initial clipboard access control implementation
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [RFC] Add initial clipboard access control implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to docs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- policycoreutils build failure
- From: Pat McClory <pmcclory@xxxxxxxxxx>
- RE: Update to docs
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Update to docs
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [RFC] Add initial clipboard access control implementation
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: Security hooks for rpm
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Update to docs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: system without libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- [PATCH v2 5/of5] LSM: SELinux changes to allow LSM stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Update to docs
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- system without libsepol
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Allow domain access to /dev/ion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Allow domain access to /dev/ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Allow test domains to read /etc/passwd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Allow domain access to /dev/ion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: extract old file (proprietary application, f.e. camera) for maguro 4.1.4
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: maguro 4.1.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: maguro 4.1.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- maguro 4.1.4
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Allow domain access to /dev/ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Allow domain access to /dev/ion
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Joman Chu <jcchu@xxxxxxxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Problem with SEManager app on Seandroid 4.0.4
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Problem with SEManager app on Seandroid 4.0.4
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: mmac-4.1.1?
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: mmac-4.1.1?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: mmac-4.1.1?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: mmac-4.1.1?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: "Richard.Johnson" <Richard.Johnson@xxxxxxxxxxx>
- Re: Security hooks for rpm
- From: "Richard.Johnson" <Richard.Johnson@xxxxxxxxxxx>
- Re: Security hooks for rpm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- mmac-4.1.1?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2]: setfiles/restorecon minor improvements
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: The SELinux Notebook 3rd Edition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2]: setfiles/restorecon minor improvements
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Security hooks for rpm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security hooks for rpm
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: SELinux book
- From: "Kevin W. Wall" <kevin.w.wall@xxxxxxxxx>
- Re: SELinux book
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- SELinux book
- From: "Kevin W. Wall" <kevin.w.wall@xxxxxxxxx>
- Re: [PATCH 5/5] LSM: SELinux changes to allow LSM stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] LSM: SELinux changes to allow LSM stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- New pull request for SEAndroid sepolicy
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: domain_kill_all_domains in login programs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- domain_kill_all_domains in login programs
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 5/5] LSM: SELinux changes to allow LSM stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] LSM: SELinux changes to allow LSM stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 5/5] LSM: SELinux changes to allow LSM stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Pull request for check_seapp
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: proof selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: An MCS policy
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- RE: RBAC to SELinux policy migration
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: Segmentation fault in context_type_get()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: An MCS policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RBAC to SELinux policy migration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- 'Context Separation'
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: RBAC to SELinux policy migration
- From: Marcel Butucea <marcelbutucea@xxxxxxxxx>
- Re: RBAC to SELinux policy migration
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: RBAC to SELinux policy migration
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RBAC to SELinux policy migration
- From: Larry <larry-lists@xxxxxxxxx>
- RBAC to SELinux policy migration
- From: Marcel Butucea <marcelbutucea@xxxxxxxxx>
- An MCS policy
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- The SELinux Notebook 3rd Edition
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- how to extract old files
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: [PATCH 01/18] libselinux: label_file: use PCRE instead of glibc regex functions
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Segmentation fault in context_type_get()
- From: Gaurav Kumar <gk@xxxxxxxxxxxxxxxxxxx>
- Segmentation fault in context_type_get()
- From: Gaurav Kumar <gk@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] libselinux: label_file: use PCRE instead of glibc regex functions
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH 04/18] libselinux: label_file: do string to mode_t conversion in a helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 06/18] libselinux: label_file: move stem/spec handling to header
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 07/18] libselinux: label_file: drop useless ncomp field from label_file data
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 16/18] libselinux: label_file: only run array once when sorting
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 01/18] libselinux: label_file: use PCRE instead of glibc regex functions
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 09/18] libselinux: label_file: fix potential read past buffer in spec_hasMetaChars
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 12/18] libselinux: label_file: only run regex files one time
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 11/18] libselinux: label_file: add accessors for the pcre extra data
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 13/18] libselinux: label_file: new process_file function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 10/18] libselinux: label_file: move regex sorting to the header
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 05/18] libselinux: label_file: move error reporting back into caller
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 02/18] libselinux: label_file: remove all typedefs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 08/18] libselinux: label_file: move spec_hasMetaChars to header
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 14/18] libselinux: label_file: break up find_stem_from_spec
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 18/18] libselinux: label_file: use precompiled filecontext when possible
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 03/18] libselinux: label_file: move definitions to include file
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 17/18] libselinux: utils: new file context regex compiler
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 15/18] libselinux: label_file: struct reorg
- From: Eric Paris <eparis@xxxxxxxxxx>
- PCRE work and results
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix neverallow checking
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- [PATCH] libsepol: fix neverallow checking
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: proof selinux
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: check_seapp sepolicy integration
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: network packet context
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- network packet context
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: proof selinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: proof selinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: proof selinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: proof selinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- proof selinux
- From: "Raul da Silva {Sp4wn}" <sp4wn.root@xxxxxxxxx>
- Re: selinux context_new return value question
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- selinux context_new return value question
- From: Gaurav Kumar <gk@xxxxxxxxxxxxxxxxxxx>
- Re: check_seapp sepolicy integration
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- check_seapp sepolicy integration
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: neverallow and attributes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- neverallow and attributes
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: sepol help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepol help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Unified set of RPM security hooks for different LSMs
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 4/7] SELinux: pass a sbsec to security_fs_use
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 5/7] SELinux: do all flags twiddling in one place
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/7] SELinux: remove crazy contortions around proc
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 7/7] SELinux: mount option to force xattr test
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/7] SELinux: make it harder to get the number of mnt opts wrong
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/7] SELinux: pass a sbsec to security_fs_use
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/7] SELinux: define bits in the mask in a header
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/7] SELinux: do not handle seclabel as a special flag
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libselinux: Only call regfree if regcomp was previously called on the regex
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Only call regfree if regcomp was previously called on the regex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Inheriting labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepol help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Inheriting labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepol help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepol help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- audit patches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Inheriting labels
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: sepol help
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: sepol help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Porting seandroid to qualcomm MSM8960
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Problems getting source using repo sync
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Problems getting source using repo sync
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- [PATCH v2]: genhomedircon manual page improvements (was Re: [PATCH] genhomedircon installation and manual page improvements)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2]: dynamically create genhomedircon (was Re: [PATCH] genhomedircon installation and manual page improvements)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2]: setfiles/restorecon minor improvements
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: Porting seandroid to qualcomm MSM8960
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: Porting seandroid to qualcomm MSM8960
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- Re: Porting seandroid to qualcomm MSM8960
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Porting seandroid to qualcomm MSM8960
- From: Cesar Maiorino <cesar.maiorino@xxxxxxxxx>
- [PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [UPDATE] Re: check_seapp script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: check_seapp script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH]: libselinux: improve the file_contexts.5 manual page
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH v2]: seobject.py must skip comments while reading external configuration files
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- [PATCH]: seobject.py must skip comments while reading external configuration files (was Re: [refpolicy] [PATCH]: clarify the file_contexts.subs_dist configuration file usage)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: [UPDATE] Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [UPDATE] Re: check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- check_seapp script
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: overriding booleans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: overriding booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- overriding booleans
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] per device seapp_context support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] per device seapp_context support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SE Android: Recent changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Support for device specific seapp_context additions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Support for device specific seapp_context additions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SE Android (Was: Re: Welcome to selinux)
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid policy question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- SEAndroid policy question
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: Alexandra Test <testalexandrainstitute@xxxxxxxxx>
- I think we need to quiet SELinux in log files on setattr.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: system_app should be signed platform
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- system_app should be signed platform
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SE Android (Was: Re: Welcome to selinux)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Possible bug in finding default context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Possible bug in finding default context?
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv4: tcp: security_sk_alloc() needed for unicast_sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Don't audit debugfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Adam Tkac <atkac@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: A filename to label translation daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- A filename to label translation daemon
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: NULL pointer dereference in selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: seinfo tag label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Don't audit debugfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux performance depending on type count
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- SELinux performance depending on type count
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Information about XSELinux
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Don't audit debugfs
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: re-loadable policy support
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- seinfo tag label
- From: Leonard Miyata <l.miyata@xxxxxxxxxxxxxxx>
- re-loadable policy support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: repo commit broke repo init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- repo commit broke repo init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: init and /data/system policies
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: init and /data/system policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH build/] Fix mkyaffs2image call to add a '/' to the mount point
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- init and /data/system policies
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- repo commands changing could break mirror scripts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android ZoneInfo Errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android ZoneInfo Errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Spelling correction and formatting fixed.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Consistent crash in selinux_ipv4_postroute?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Spelling correction and formatting fixed.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SE Android ZoneInfo Errors
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Consistent crash in selinux_ipv4_postroute?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Ensure that we only close the selinux netlink socket once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Allow release_app getattr of netlink_selinux sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Nexus 7 not getting past bootloader
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cloning Android repo's from bitbucket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Cloning Android repo's from bitbucket
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] Allow release_app getattr of netlink_selinux sockets
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 1/1] Untrusted_app gets route information
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Questions about the following denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] domain writes to cgroup pseudo filesystem
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Questions about the following denials
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Is the CIL project still active
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] read permission over lnk_file to devices when android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- [PATCH 2/2] untrusted_app reads logs when android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Nexus 7 not getting past bootloader
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid 4.0.4 make error since the code move
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SEAndroid 4.0.4 make error since the code move
- From: "Gia T. Nguyen" <gia.nguyen@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is the CIL project still active
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Allow non-matched apps to launch when no match found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Allow CTS Test apps to access to system_data_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] socket permissions to untrusted_app
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tuna bitbucket repository wont git clone
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Appdomain write to cgroup on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mirrors
- From: Robert Craig <robertpcraig@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]