SELinux - Date Index
[Prev Page][Next Page]
- Re: sepolgen requires unofficial setools patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- sepolgen requires unofficial setools patch
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- RE: local_mainfest.xml
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: local_mainfest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: local_mainfest.xml
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: local_mainfest.xml
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- local_mainfest.xml
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Tuna policy files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: Tuna policy files
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Tuna policy files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: fail to get seandroid code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- fail to get seandroid code
- From: <ken.masumitsu@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Trying to support Python 3 but fails on libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: david caplan <dac@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: david caplan <dac@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: fix a RCU dereference in sel_netnode_insert()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] test_file: fix policy to allow building with relro
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Trying to support Python 3 but fails on libsemanage
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: regression test of security policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: RFC: packet checks always on option
- From: Chad Hanson <chanson@xxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Assertion failed in checkmodule
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: labeled NFS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- labeled NFS
- From: zyxel <zyx1984@xxxxxxxxx>
- Re: RFC: packet checks always on option
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: tag avc cache alloc as non-critical
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: execute system-config-selinux while enforcing
- From: Andy Warner <warner@xxxxxxxxx>
- Re: regression test of security policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: execute system-config-selinux while enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- execute system-config-selinux while enforcing
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RFC: packet checks always on option
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Mounting /sys within libselinux?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [1/4] sepgsql - add connection pooling server support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: regression test of security policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- regression test of security policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [1/4] sepgsql - add connection pooling server support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [3/4] sepgsql - Add temporary objects support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Can't login the embedded linux with seliux support
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Can't login the embedded linux with seliux support
- From: casinee app <appcasinee@xxxxxxxxx>
- an't login
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Fred Aguirre <2playerfootball@xxxxxxxxx>
- Re: [3/4] sepgsql - Add temporary objects support
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: generate the policy for embedded device by seedit-cross
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: generate the policy for embedded device by seedit-cross
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: compile the libselinux for embedded device
- From: casinee <appcasinee@xxxxxxxxx>
- generate the policy for embedded device by seedit-cross
- From: casinee app <appcasinee@xxxxxxxxx>
- Re: compile the libselinux for embedded device
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Success - SEAndroid on Galaxy Nexus maguro
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Success - SEAndroid on Galaxy Nexus maguro
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 49/49] libsepol: allocate enough space to hold filename in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: remove all unneeded AVC callback code
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [UPDATED] Patch for SE Android Manager AVC logging feature
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Any SELinux policy development/analysis training workshops?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Any SELinux policy development/analysis training workshops?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- [ANN] Linux Security Summit 2012 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- [UPDATED] Patch for SE Android Manager AVC logging feature
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libselinux: Provide new labeling backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- libselinux: Provide new labeling backend
- From: rpcraig <rpcraig@xxxxxxxxxxxxxx>
- Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- upcoming patch bomb!
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] make the RHEL4,5-only testcases exceptions obvious
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 1/1] XSELinux: Fix initialisation of polyinstantiated properties and selections
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Adding a booleans.subs file to selinux policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: michael <0xffdc@xxxxxxxxx>
- Re: DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: Robert Craig <robertpcraig@xxxxxxxxx>
- DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx
- From: michael <0xffdc@xxxxxxxxx>
- Re: [PATCH 4/4] policycoreutils -- Make restorecon return 0 when a file has changed context with no error
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Requesting for materials regarding "SE Android"
- From: Fred Aguirre <2playerfootball@xxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Adding a booleans.subs file to selinux policy.
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] libsepol: introduce new policy capability ptrace_child
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: apply a different permission to ptrace a child vs non-child
- From: Eric Paris <eparis@xxxxxxxxxx>
- Adding a booleans.subs file to selinux policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- seandroid-4.0.4 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Requesting for materials regarding "SE Android"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libsemanage test failure on several architectures
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- User Mode Linux
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Colin Walters <walters@xxxxxxxxxx>
- Android ashmem driver update
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: VirtualGL and selinux
- From: Mark Dalton <mdalton@xxxxxxxxxxxxx>
- Since we are sending patches for setools upstream.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 34/73] libselinux: Update Makefiles to handle /usrmove
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/73] policycoreutils: mcstrans: creating a pid file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 34/73] libselinux: Update Makefiles to handle /usrmove
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 55/73] policycoreutils: Disable user restorecond by default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: copy-up xattr (Re: [RFC][PATCH 00/73] Union Mount [ver #2])
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/73] libselinux: utils: Enable many more gcc warnings for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 43/73] libselinux: avc_netlink_recieve handle EINTR FIXME
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH 29/73] libselinux: Change annotation on include/selinux/avc.h
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH 43/73] libselinux: avc_netlink_recieve handle EINTR FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/73] policycoreutils: mcstransd: write a pid file FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux -- Do not link against python library, this is considered bad practice in debian
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- [PATCH 72/73] libselinux -- Hide unnecessarily-exported library
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 71/73] libselinux -- Do not link against python library
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/73] policycoreutils -- Only run setfiles if we found Only run setfiles if we found read-write filesystems to run it on
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 66/73] policycoreutils -- Fix infinite loop i watch code Fix infinite loop i watch code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 55/73] policycoreutils: Disable user restorecond by default
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH 67/73] policycoreutils -- fix ftbfs with hardening flags fix ftbfs with hardening flags
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/73] libsemanage -- fallback-user-level
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/73] libsemanage -- Allow to build for several ruby version
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 62/73] libsemanage -- Do not link against libpython
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/73] sepolgen: fix detection of policy loads
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/73] libselinux: take security_deny_unknown into account
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/73] Use correct capng calls in newrole
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/73] policycoreutils: Add bash-completion scripts for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/73] sepolgen: Make use of setools optional within sepolgen
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/73] libselinux: assert if avc_init() not called
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/73] policycoreutils: Disable user restorecond by default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/73] policycoreutils: seunshare: Only drop caps not the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/73] libselinux: build with either ruby 1.9 or ruby 1.8
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/73] libselinux: pkg-config to figure out where ruby
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/73] policycoreutils: semanage: Cleanup man page to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/73] policycoreutils: mcstrans: Version should have been
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH 39/73] policycoreutils: load_policy: Stop making link for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/73] sepolgen: do not use md5 when calculating hash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/73] policycoreutils: setfiles: If you are not changing any
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 37/73] policycoreutils: scripts: Don't syslog setfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/73] policycoreutils: semanage: Change semanage to produce
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/73] libselinux: Update Makefiles to handle /usrmove
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/73] libselinux: utils: Stop separating out matchpathcon as
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/73] policycoreutils: semanage: audit message to show what
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/73] policycoreutils: scripts: Update Makefiles to handle
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/73] policycoreutils: restorecond: wrong options should
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/73] libselinux: Add printf format attribute annotation to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 27/73] libselinux: Enable many more gcc warnings for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/73] libselinux: Fix const-ness of parameters & make
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/73] libselinux: Add more printf format annotations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/73] libselinux: Add prototype decl for destructor
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/73] libselinux: Remove unused flush_class_cache method
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 19/73] libselinux: Ensure there is a prototype for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/73] libselinux: Fix const-correctness
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/73] libselinux: Fix old style function definitions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/73] sepolgen: audit.py Dont crash if empty data is passed
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 18/73] libselinux: Remove jump over variable declaration
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/73] libsemanage: Alternate path for semanage.conf
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 16/73] policycoreutils: sandbox: Removing sandbox init
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/73] checkpolicy: libselinux: Fix dead links to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/73] libsepol: checkpolicy: implement new default labeling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/73] policycoreutils: sandbox: do not propogate inside
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/4] libsemanage -- Do not link against libpython, this is considered bad in Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/4] policycoreutils -- Only run setfiles if we found read-write filesystems to run it on
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] libsemanage -- fallback-user-level
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Debian patches to userspace components
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: copy-up xattr (Re: [RFC][PATCH 00/73] Union Mount [ver #2])
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Please update .po files in policycoreutils source tree
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux -- Hide unnecessarily-exported library destructors
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: copy-up xattr (Re: [RFC][PATCH 00/73] Union Mount [ver #2])
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SEAndroidManager Patches for AVC denied message logging.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux -- Hide unnecessarily-exported library destructors
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux -- Hide unnecessarily-exported library destructors
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- [PATCH 8/8] setools -- Preserve ABI between GCC 4.3 and GCC 4.4
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 7/8] setools -- Missing function prototypes
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 6/8] setools -- Do not build java module with a soname and do not generate symlinks
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 5/8] setools -- Do not build tcl module with a soname and do not generate symlinks
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 4/8] setools -- Do not built python module with a soname and do not create symlinks
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/8] setools -- Fix FTBFS when compiling with -Werror=format-security
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/8] setools -- Fix FTBFS with swig >= 2.0
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/8] setools -- Fix build failure with ld --as-needed
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] libselinux -- Hide unnecessarily-exported library destructors
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] libselinux -- Do not link against python library, this is considered bad practice in debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Debian patches to userspace components
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] policycoreutils -- Only run setfiles if we found read-write filesystems to run it on
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 4/4] policycoreutils -- Make restorecon return 0 when a file has changed context with no error
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] policycoreutils -- Only run setfiles if we found read-write filesystems to run it on
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 4/4] policycoreutils -- Make restorecon return 0 when a file has changed context with no error
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/4] policycoreutils -- fix ftbfs with hardening flags
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/4] policycoreutils -- Fix infinite loop i watch code
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/4] policycoreutils -- Only run setfiles if we found read-write filesystems to run it on
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 2/4] libsemanage -- max-uid
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/4] libsemanage -- fallback-user-level
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: copy-up xattr (Re: [RFC][PATCH 00/73] Union Mount [ver #2])
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/4] libsemanage -- Allow to build for several ruby version
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/4] libsemanage -- Do not link against libpython, this is considered bad in Debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/4] libsemanage -- max-uid
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/4] libsemanage -- fallback-user-level
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/1] sepolgen -- fix detection of policy loads
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Debian patches to userspace components
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: selinux/xfrm.h needs net/flow.h
- From: David Howells <dhowells@xxxxxxxxxx>
- Debian patches to userspace components
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: security_compute_create_name(3)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [4/4] sepgsql -redefinition of use permission onto system objects
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [2/4] sepgsql - foreign data wrapper support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [1/4] sepgsql - add connection pooling server support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [3/4] sepgsql - Add temporary objects support
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: security_compute_create_name(3)
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- security_compute_create_name(3)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: 3.3.0-next-20120321 crash in mls_compute_sid at boot time...
- From: Valdis.Kletnieks@xxxxxx
- Re: 3.3.0-next-20120321 crash in mls_compute_sid at boot time...
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- 3.3.0-next-20120321 crash in mls_compute_sid at boot time...
- From: Valdis.Kletnieks@xxxxxx
- Re: [next] Null pointer dereference in mls_compute_sid()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [next] Null pointer dereference in mls_compute_sid()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: VirtualGL and selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux-testsuite patches for RHEL5/6/7a
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- seandroid-4.0.3 branch created
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid init.rc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] SELinux: add default_type statements
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] SELinux: allow default source/target selectors for user/role/range
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: VirtualGL and selinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SEAndroid init.rc
- From: 乜聚虎 <niejuhu@xxxxxxxxx>
- Re: Maguro SE Manager app crash
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- VirtualGL and selinux
- From: Mark Dalton <mdalton@xxxxxxxxxxxxx>
- Re: selinux-testsuite patches for RHEL5/6/7a
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Maguro SE Manager app crash
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Maguro SE Manager app crash
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: global name 'seinfo' is not defined
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: global name 'seinfo' is not defined
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SE Linux file system relabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: global name 'seinfo' is not defined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- global name 'seinfo' is not defined
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SE Linux file system relabel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/2] SELinux: allow default source/target selectors for user/role/range
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: add default_type statements
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: newrole: Fix drop_capabilities().
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: B2G
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: B2G
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: [PATCH] policycoreutils: newrole: Fix drop_capabilities().
- From: Mikhail Efremov <mikhefr@xxxxxxxxx>
- Re: B2G
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: B2G
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: [PATCH] policycoreutils: newrole: Fix drop_capabilities().
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: B2G
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: B2G
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: newrole: Fix drop_capabilities().
- From: Mikhail Efremov <mikhefr@xxxxxxxxx>
- Re: B2G
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- B2G
- From: lkcl luke <luke.leighton@xxxxxxxxx>
- Re: [PATCH] libselinux init functions
- From: Xin Ouyang <xinpascal@xxxxxxxxx>
- Re: [PATCH] libselinux init functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux init functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux init functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Bug Reports?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux init functions
- From: Xin Ouyang <xinpascal@xxxxxxxxx>
- SE Android Bug Reports?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- policycoreutils: setfiles: Fix process_glob error handling
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: coderman <coderman@xxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Fred Aguirre <2playerfootball@xxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [SEAndroid] checkpolicy missing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [SEAndroid] checkpolicy missing
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid make_ext4fs fails with new changes
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: SEAndroid make_ext4fs fails with new changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid make_ext4fs fails with new changes
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: SEAndroid make_ext4fs fails with new changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SEAndroid make_ext4fs fails with new changes
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: A few questions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A few questions
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: A few questions
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- A few questions
- From: Yao <yffbrave@xxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: CTS failure on SEAndroid Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- CTS failure on SEAndroid Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH] (SCH-i515 US LTE) Modified init.tuna.rc for proper labeling of /factory/* files.[PUBLIC DOMAIN]
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- [PATCH] (SCH-i515 US LTE) Added device specific policy and file context files.[PUBLIC DOMAIN]
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- [PATCH] SELinux: allow default source/target selectors for user/role/range
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Login context for a VNC connection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Login context for a VNC connection
- From: Andy Warner <warner@xxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SETools not compiling, refpolicy modules not loading
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: Suppressing selinux label getxattrs on FUSE
- From: Han-Wen Nienhuys <hanwenn@xxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Suppressing selinux label getxattrs on FUSE
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Suppressing selinux label getxattrs on FUSE
- From: Han-Wen Nienhuys <hanwenn@xxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SETools not compiling, refpolicy modules not loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Performance optimization of libsepol and the need for detailed policydb docs.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Performance optimization of libsepol and the need for detailed policydb docs.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SE Android and Finer Grained Permissions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- SE Android and Finer Grained Permissions
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: Performance optimization of libsepol and the need for detailed policydb docs.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Performance optimization of libsepol and the need for detailed policydb docs.
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- SETools not compiling, refpolicy modules not loading
- From: Kovacsics Róbert <kovirobi@xxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: SE Android on Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SE Android on Galaxy Nexus
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: setools' seinfo/sesearch and role_attribute support?
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Suggestion on fixing a old libselinux problem.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Suggestion on fixing a old libselinux problem.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- setools' seinfo/sesearch and role_attribute support?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [v1 PATCH 1/1] role_fix_callback skips out-of-scope roles during expansion.
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- [v1 PATCH 1/1] role_fix_callback skips out-of-scope roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] role_fix_callback skips out-of-scope roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: libsemanage/libsepol still supported for non-MLS/MCS setups?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 1/1] role_fix_callback skips out-of-scope roles during expansion.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Policy to Allowing another process to only read a UDP port
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base - base VS loadable module
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] role_fix_callback skips out-of-scope roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base - base VS loadable module
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Policy to Allowing another process to only read a UDP port
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: libsemanage/libsepol still supported for non-MLS/MCS setups?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage/libsepol still supported for non-MLS/MCS setups?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- libsemanage/libsepol still supported for non-MLS/MCS setups?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH checkpolicy] Android/MacOS X build support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH libsepol] Android/MacOS X build support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base - base VS loadable module
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: No feedback when cloning `http://oss.tresys.com/git/selinux.git`
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base - base VS loadable module
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: No feedback when cloning `http://oss.tresys.com/git/selinux.git`
- From: Joe Nall <joe@xxxxxxxx>
- Re: No feedback when cloning `http://oss.tresys.com/git/selinux.git`
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- No feedback when cloning `http://oss.tresys.com/git/selinux.git`
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- selinux policy and alloc_security function
- From: Subramani Venkatesh <selinuxv31@xxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Another change we would like to make to libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils build error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Force avc_has_perm to return success if enforcing == 0;
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android Issue Compiling Kernel for the Emulator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: signed source
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- RE: SE Android Issue Compiling Kernel for the Emulator
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- SE Android Issue Compiling Kernel for the Emulator
- From: "Fullen, Jason" <jason.fullen@xxxxxxxxx>
- signed source
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: role_fix_callback assertion with sysadm in base - base VS loadable module
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [ANN} SELinux Userspace Release
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] selinux: include flow.h where used rather than get it indirectly
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Force avc_has_perm to return success if enforcing == 0;
- From: Colin Walters <walters@xxxxxxxxxx>
- Another change we would like to make to libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Force avc_has_perm to return success if enforcing == 0;
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Force avc_has_perm to return success if enforcing == 0;
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage from fc17
- From: Budanov Eugene <eugene.budanov@xxxxxxxxxx>
- selinux system with configfs and cgroup support
- From: "Alain Toussaint" <alain.toussaint@xxxxxxxxxxx>
- [PATCH 1/2] selinux: allow seek operations on the file exposing policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] selinux: loosen DAC perms on reading policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Force avc_has_perm to return success if enforcing == 0;
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libsemanage from fc17
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- libsemanage from fc17
- From: Budanov Eugene <eugene.budanov@xxxxxxxxxx>
- Force avc_has_perm to return success if enforcing == 0;
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Building multiple custom modules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Building multiple custom modules
- From: Julian Onions <Julian.Onions@xxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: role_fix_callback assertion with sysadm in base
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- [no subject]
- From: Kovacsics Róbert <kovirobi@xxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- role_fix_callback assertion with sysadm in base
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Checkpolicy: Allow filesystem names to start with a digit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- RE: SELinux query
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux query
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux query
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: SELinux on Wheezy
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux on Wheezy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux on Wheezy
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: restorecon -R default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: restorecon -R default
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X server in enforcing x_drawable avcs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- restorecon -R default
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SLIDE for RHEL6 and Derivatives
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: SLIDE for RHEL6 and Derivatives
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SLIDE for RHEL6 and Derivatives
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: Compiler cannot find ruby.h
- From: Budanov Eugene <eugene.budanov@xxxxxxxxxx>
- Re: Compiler cannot find ruby.h
- From: Budanov Eugene <eugene.budanov@xxxxxxxxxx>
- Compiler cannot find ruby.h
- From: Budanov Eugene <eugene.budanov@xxxxxxxxxx>
- Re: SEAndroid app data labeling
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SEAndroid Build for Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Re: SEAndroid app data labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid Build for Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid app data labeling
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SEAndroid app data labeling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SEAndroid app data labeling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- SEAndroid app data labeling
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: time for a new release?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SEAndroid Build for Galaxy Nexus
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Recent /proc/pid/mem exploit
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Recent /proc/pid/mem exploit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SEAndroid Build for Galaxy Nexus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: auditd patches from Debian
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- X server in enforcing x_drawable avcs
- From: Ted Toth <txtoth@xxxxxxxxx>
- SEAndroid Build for Galaxy Nexus
- From: Bryan Hinton <bryan@xxxxxxxxxxxxxxx>
- Recent /proc/pid/mem exploit
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: time for a new release?
- From: "C.J. Adams-Collier KF7BMP" <cjac@xxxxxxxxxxxxxxx>
- Re: How I download SEandroid?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How I download SEandroid?
- From: Álvaro Castillo <midgoon@xxxxxxxxx>
- time for a new release?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- auditd patches from Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux with initramfs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/11] Change annotation on include/selinux/avc.h to avoid upsetting SWIG
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [PATCH 00/11] Two bug fixes & misc code cleanup fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 00/11] Two bug fixes & misc code cleanup fixes
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 07/11] Add more printf format annotations
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 08/11] Add printf format attribute annotation to die() method
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 05/11] Remove unused flush_class_cache method
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 06/11] Add prototype decl for destructor
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 04/11] Fix const-correctness
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 09/11] Fix const-ness of parameters & make usage() methods static
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 01/11] Remove jump over variable declaration
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 10/11] Enable many more gcc warnings for libselinux/src/ builds
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 02/11] Ensure there is a prototype for 'matchpathcon_lib_destructor'
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 11/11] Enable many more gcc warnings for libselinux/utils builds
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [PATCH libselinux 03/11] Fix old style function definitions
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: SELinux with initramfs
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: CIL policy - Error: Duplicate rule defined
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Phone calls
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux with initramfs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux with initramfs
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: SELinux with initramfs
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- SELinux with initramfs
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux for Mandriva Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 20/25] libsemanage: Fallback_user_level can be NULL if you
- From: Pascal Ouyang <Xin.Ouyang@xxxxxxxxxxxxx>
- Re: [PATCH 20/25] libsemanage: Fallback_user_level can be NULL if you
- From: Xin Ouyang <xinpascal@xxxxxxxxx>
- SELinux for Mandriva Linux
- From: Eugene Budanov <eugene.budanov@xxxxxxxxxx>
- SE Android release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use specified semanage.conf for cross compiling
- From: Xin Ouyang <xinpascal@xxxxxxxxx>
- Re: Use specified semanage.conf for cross compiling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Use specified semanage.conf for cross compiling
- From: Xin Ouyang <xinpascal@xxxxxxxxx>
- Re: transition from crond
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: transition from crond
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- transition from crond
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: CIL policy - Error: Duplicate rule defined
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [refpolicy] semodule segfaults with ubuntu
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 24/25] libselinux - correct selabel invalid context logging
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/25] libselinux: Fix setenforce man page to refer to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/25] policycoreutils: Remove excess whitespace
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/25] policycoreutils: Fix Makefile to match other
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/25] libsemanage: Fallback_user_level can be NULL if you
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/25] libsepol: checkpolicy: implement new default labeling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 19/25] checkpolicy: add new helper to translate class sets
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 18/25] policycoreutils: FIXME Change restorecon to just
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/25] policycoreutils: semanage: FIXME whitespace changes in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/25] libsemanage: add ignoredirs config for genhomedircon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/25] libselinux: FIXME Allow SELinux labelling to support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/25] policycoreutils: sandbox: FIXME Add back in .
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/1] libselinux - correct selabel invalid context logging
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Libsemanage genhomedircon to allow fallback users with no level
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- For a long time /root has been treated differently in Red Hat Distributions then upstream policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: We are seeing more and more programs accessing sysfs_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- We are seeing more and more programs accessing sysfs_t.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Proper use of get_default_context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Proper use of get_default_context
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 1/1] libselinux: Add new libselinux(7) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] libselinux: Add new libselinux(7) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: pp2te
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- CIL policy - Error: Duplicate rule defined
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: pp2te
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pp2te
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- pp2te
- From: Tim <elatllat@xxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: [2/2] libselinux: fix case of names with whitespace/multibytes on /selinux/create
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- [PATCH 48/48] libselinux: Updated selabel_x(5) man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/48] libselinux: Updated selabel_file(5) man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/48] libselinux: Updated selabel_media(5) man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/48] libselinux: Updated selabel_db(5) man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/48] policycoreutils: add clean target to man Makefile
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/48] policycoreutils: Added SELinux config file man page.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/48] policycoreutils: sestatus: Updated sestatus and man
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/48] libselinux: return EINVAL if invalid role selected
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/48] libselinux: get_default_type now sets EINVAL if no
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/48] libselinux: Mapped compute functions now obey
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/48] libselinux: Remove assert in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 37/48] policycoreutils: semanage: change src
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/48] policycoreutils: semanage: Make sure semanage fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/48] libselinux: selinuxswig_python.i: don't make syscall
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/48] policycoreutils: semanage: check file equivalence
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/48] policycoreutils: semanage: print local and dristo
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/48] sepolgen: Allow ~ as a file identifier
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/48] checkpolicy: dismod: fix unused parameter errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/48] policycoreutils: sandbox: init script run twice is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/48] policycoreutils: sandbox: make sure the domain
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 27/48] policycoreutils: sandbox: Allow user to specify the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/48] checkpolicy: dis* fixed signed vs unsigned errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/48] policycoreutils: sandbox: do not try forever to find
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/48] checkpolicy: test: Makefile: include -W and -Werror
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/48] policycoreutils: po: Makefile use -p to preserve times
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/48] policycoreutils: sandbox: only complain if sandbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/48] policycoreutils: sandbox: move sandbox.conf.5 to just
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/48] checkpolicy: allow ~ in filename transition rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: CIL/SELinux Userspace Integration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: Add man/man5 man pages
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: Add man/man5 man pages
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: Add man/man5 man pages
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: Add man/man5 man pages
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: Add man/man5 man pages
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux - get_default_type now sets EINVAL if no entry.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux - Mapped compute functions now obey deny_unknown flag
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux - Mapped compute functions now obey deny_unknown flag
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Updated selabel_db(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: sestatus: Updated sestatus and man pages.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] policycoreutils: Added SELinux config file man page.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux - Remove assert in security_get_boolean_names(3)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux - return EINVAL if invalid role selected
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- [PATCH 1/1] libselinux: Updated selabel_file(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Updated selabel_x(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Updated selabel_media(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_x(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_db(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_file(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_media(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- First forays in to writing a module to lock down PowerDNS.
- [PATCH 1/1] policycoreutils: sestatus: Updated sestatus and man pages.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] policycoreutils: Added SELinux config file man page.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] policycoreutils: Added SELinux config file man page.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - Mapped compute functions now obey deny_unknown flag
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - return EINVAL if invalid role selected
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - Remove assert in security_get_boolean_names(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - get_default_type now sets EINVAL if no entry.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Russell Coker <russell@xxxxxxxxxxxx>
- CIL/SELinux Userspace Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- [PATCH] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Russell Coker <russell@xxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]