SELinux - Date Index
[Prev Page][Next Page]
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Writing a program to monitor the SELinux log
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: [PATCH] bluetooth: Properly clone LSM attributes to newly created child connections
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] bluetooth: Properly clone LSM attributes to newly created child connections
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #3]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Context Relabeling Authorization
- From: Matt Benke <mbenke@xxxxxxxxxxxxxxxx>
- Re: Puzzling SELinux problem
- From: Joe Zeff <joe@xxxxxxx>
- Re: Puzzling SELinux problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Puzzling SELinux problem
- From: Joe Zeff <joe@xxxxxxx>
- New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: David Windsor <dwindsor@xxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: David Windsor <dwindsor@xxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Indentation error for Python module seobject (fix typo)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Role attribute status
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Role attribute status
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: Role attribute status
- From: Eric Paris <eparis@xxxxxxxxxx>
- Role attribute status
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v3] semanage.conf manual page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC 2/2] refpolicy: add systemd support to tresys main policy.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] policycoreutils: cleaning of semodule_unpackage
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: CIL compiler
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: CIL compiler
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 67/67] libsemanage: fix semanage_store_access_check calling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 66/67] whole tree: default make target to all not install
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 65/67] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/67] policycoreutils: semanage: FIXME If you do a semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/67] policycoreutils: semanage: FIXME Catch RuntimeErrors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/67] policycoreutils: sepolgen: FIXME audit2allow is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/67] policycoreutils: semanage: FIXME: Dont print heading
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 53/67] policycoreutils: semanage: FIXME Stop showing heading
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/67] libsepol: FIXME setools expects expand_module_avrules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/67] libsepol: libsemanage: policycoreutils: Create a new
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/67] libsepol: Skip tunable identifier and cond_node_t in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/67] libsepol: Permanently discard disabled branches of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/67] libsepol: Copy and check the cond_bool_datum_t.flags
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/67] libsepol: Write and read TUNABLE flags in related data
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/67] checkpolicy: Separate tunable from boolean during
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/67] libsepol: Indicate when boolean is indeed a tunable.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/67] sepolgen: FIXME Change analysys of sepolgen to return
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/67] sepolgen: FIXME Change perm-map and add open to try to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/67] policycoreutils: sandbox: cntrl-c should kill entire
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/67] policycoreutils: sandbox: FIXME do not bind mount so
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/67] policycoreutils: sandbox: add -Wall and -Werror to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/67] policycoreutils: restorecon: Always check return code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/67] policycoreutils: audit2allow: FIXME sepolgen-ifgen use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/67] policycoreutils: audit2allow: use alternate policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/67] policycoreutils: sepolgen-ifgen: FIXME new attr-helper
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/67] libsemanage: change module disabled from rename to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 05/67] libsepol: Skip writing role attributes for policy.X
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL compiler
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] policycoreutils: fix sandbox Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL compiler
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH v5] Fix makefiles for the userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix symbolic link creation for the userspace libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v3] semanage.conf manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v5] Fix makefiles for the userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Change default make target for the man directory of policycoreutils/mcstrans (was Re: [PATCH] Change default make target for sepolgen)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Change default make target for some directories in the libraries (was Re: [PATCH] Change default make target for sepolgen)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC v2] semanage.conf manual page (was Re: [RFC] semanage.conf manual page)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Fix includes for userspace tools and libraries (was Re: [PATCH v2] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- sshd problem
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] genhomedircon installation and manual page improvements (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC v2] Userspace git local build (was Re: [RFC] Userspace git local build)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] Userspace git local build (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] Fix LIBDIR usage for load_policy (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: ANN: Reference Policy contrib repository
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: ANN: Reference Policy contrib repository
- From: Robert Lee <robert.lee@xxxxxxxxxx>
- ANN: Reference Policy contrib repository
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v2 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v2 Discard unused tunables from raw policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 0/1] Modify 'mdp' to output MLS and CIL policy source files.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] Modify 'mdp' to output MLS and CIL policy source files.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: sepgsql and process transition
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: no new-line in setfiles/restorecon patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: sepgsql and process transition
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- policycoreutils manpages needed
- From: Russell Coker <russell@xxxxxxxxxxxx>
- no new-line in setfiles/restorecon patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [v2 PATCH 2/8] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 5/8] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 7/8] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 4/8] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/8] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v2 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 8/8] Preserve tunables when required by semodule program.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- policycoreutils man pages patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Dump the sock's security context
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 0/2] Dump the sock's security context
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 1/2] Define security_sk_getsecctx
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: <rongqing.li@xxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [PATCH 17/48] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/48] policycoreutils: sandbox: rewrite /tmp handling FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/48] policycoreutils: sandbox: add -Wall and -Werror to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: hidden_def and libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- hidden_def and libselinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v1 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/7] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [PATCH 76/77] sepolgen: FIXME Allow sepolgen to handle file name
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/77] policycoreutils: setfiles: Fix process_glob to handle
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 69/77] policycoreutils: sandbox: Closedir on failures
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 65/77] policycoreutils: sandbox: trap sigterm to make sure
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/77] policycoreutils: sandbox: cntrl-c should kill entire
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/77] policycoreutils: sandbox: pass DPI from the desktop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/77] policycoreutils: sandbox: seunshare: introduce helper
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/77] policycoreutils: sandbox: add -C option to not drop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/77] policycoreutils: sandbox: split seunshare caps
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/77] policycoreutils: sandbox: use dbus-launch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/77] policycoreutils: sandbox: numerous simple updates to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/77] policycoreutils: sandbox: Makefile: new man pages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/77] policycoreutils: sandbox: whitespace fix
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/77] policycoreutils: sandbox: do not require selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/77] policycoreutils: semodule_package: Add
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/77] policycoreutils: sandbox: check for paths up front
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/77] policycoreutils: sandbox: allow users specify sandbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/77] policycoreutils: sandbox: move seunshare globals to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/77] policycoreutils: restorecon: Always check return code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/77] policycoreutils: sandbox: rename dir to srcdir
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/77] policycoreutils: sandbox: use defined values for paths
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/77] policycoreutils: setfiles: get rid of some stupid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/77] policycoreutils: setfiles: move
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/77] global: Makefile: create global 'all' target
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/77] checkpolicy: fix spacing in output message
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/77] libselinux: selinux_file_context_verify function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/77] libselinux: move realpath helper to matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/77] libsemanage: python wrapper makefile changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/77] libselinux: python wrapper makefile changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- We have an interesting problem with pam_namespace on mls boxes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: GProcunier@xxxxxxxxxx
- Re: v0 Separate tunables from booleans
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux Common Intermediate Language Update
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v0 PATCH 4/6] Permanently enable the if or else branch of a tunable during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 5/6] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/6] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/6] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/6] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxx>
- SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: GProcunier@xxxxxxxxxx
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: v2 Skip role attributes for policy.X and downgraded pp
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: What is /selinux/null?
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: install
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: install
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy memory error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- install
- From: Russell Coker <russell@xxxxxxxxxxxx>
- load_policy memory error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: su vs runuser
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inclusion of selinux.h in cred.h
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inclusion of selinux.h in cred.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: rarob@xxxxxxxxxxxxxxxxxxxxxx
- Re: su vs runuser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- su vs runuser
- From: Ted Toth <txtoth@xxxxxxxxx>
- RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: rarob@xxxxxxxxxxxxxxxxxxxxxx
- Re: inclusion of selinux.h in cred.h
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- inclusion of selinux.h in cred.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v2 PATCH 1/1] Skip writing role attributes for policy.X and downgraded pp.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v2 Skip role attributes for policy.X and downgraded pp
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- v1 Skip role attributes for policy.X
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Skip role attributes for policy.X
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 69/96] policycoreutils: semodule_package: Add
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/96] policycoreutils: run_init: clarification of the usage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/96] policycoreutils: semanage: fix usage header around
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/96] policycoreutils: semanage: remove useless empty lines
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/96] policycoreutils: semanage: add -e to fcontext usage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/96] policycoreutils: semanage: update man page with new
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/96] policycoreutils: semanage: update usage text
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/96] policycoreutils: semanage: introduce file context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/96] policycoreutils: semanage: enable and disable modules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/96] policycoreutils: semanage: output all local
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/96] policycoreutils: semanage: introduce extraction of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/96] policycoreutils: semanage: cleanup error on invalid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/96] policycoreutils: semanage: handle being called with no
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/96] policycoreutils: semanage: return sooner to save CPU
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/96] policycoreutils: semanage: surround getopt with
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/96] policycoreutils: semanage: use define/raise instead of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/96] policycoreutils: semanage: some options are only valid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/96] policycoreutils: semanage: introduce better deleteall
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/96] policycoreutils: semanage: do not allow spaces in file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/96] policycoreutils: semanage: distinguish between builtin
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/96] policycoreutils: semanage: centralized ip node
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/96] policycoreutils: setfiles: make the restore function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/96] policycoreutils: setfiles: use glob to handle ~ and .
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/96] policycoreutils: fixfiles: do not hard code types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/96] policycoreutils: fixfiles: stop trying to be smart
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/96] policycoreutils: fixfiles: use new kernel seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/96] policycoreutils: fixfiles: pipe everything to cat
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/96] policycoreutils: fixfiles: introduce
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 19/96] policycoreutils: semodule: support for alternative
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/96] libsemanage: print error debug info for buggy fc files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/96] libsemanage: introduce semanage_set_root and friends
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/96] libsemanage: throw exceptions in python rather than
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/96] libsemanage: python3 support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/96] libsemanage: patch for MCS/MLS in user files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/96] libselinux: mapping fix for invalid class/perms after
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/96] libselinux: audit2why: work around python bug not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/96] libselinux: resolv symlinks and dot directories before
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/96] checkpolicy: add missing ; to attribute_role_def
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 01/96] checkpolicy: Redo filename/filesystem syntax to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Export the tcp sock's security context to proc.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 6/6] Export the tcp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 1/6] Security: define security_sk_getsecid.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 5/6] Export the unix sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 2/6] Define the function to write sock's security context to seq_file.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [v2 PATCH 0/6] Export the sock's security context to proc
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 4/6] Export the udp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 3/6] Export the raw sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: checkpolicy is broken (which is not)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- RE: checkpolicy is broken (which is not)
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] Export the raw sock's security context to proc.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 4/5] Export the unix sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 2/5] Export the raw sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 1/5] Define the function to write sock's security context to seq_file.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 0/5] Export the sock's security context to proc
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 3/5] Export the udp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 5/5] Export the tcp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: checkpolicy is broken (which is not)
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux policy regarding LD_LIBRARY_PATH
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux policy regarding LD_LIBRARY_PATH
- From: Aaron Sowry <aaron@xxxxxxxxx>
- Re: SELinux policy regarding LD_LIBRARY_PATH
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux policy regarding LD_LIBRARY_PATH
- From: Aaron Sowry <aaron@xxxxxxxxx>
- Re: Howto transition socket
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- Re: SELinux policy regarding LD_LIBRARY_PATH
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Howto transition socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux policy regarding LD_LIBRARY_PATH
- From: Aaron Sowry <aaron@xxxxxxxxx>
- [PATCH 090/155] policycoreutils: semanage: whitespace changes in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 087/155] policycoreutils: semanage: fix indention
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 088/155] policycoreutils: semanage: remove useless empty
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 080/155] libsepol: Only call role_fix_callback for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 078/155] policycoreutils: semodule_package: fix man page typo
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 077/155] policycoreutils: semodule_expand: update man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 068/155] policycoreutils: semanage: handle os errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 067/155] policycoreutils: semanage: fix traceback with bad
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 063/155] policycoreutils: semanage: show usage on -h or
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 056/155] policycoreutils: semanage: introduce more deleteall
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 049/155] policycoreutils: semanage: verify ports < 65536
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 047/155] policycoreutils: transaction into semanageRecords
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 046/155] policycoreutils: make get_handle a method of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 044/155] policycoreutils: remove a needless blank line
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 043/155] policycoreutils: make process_one error if not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 037/155] policycoreutils: fixfiles: correct usage for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 036/155] policycoreutils: put -p in help for restorecon and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 033/155] policycoreutils: fixfiles stop trying to be smart
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 034/155] policycoreutils: fixfiles: do not try to only label
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 028/155] policycoreutils: fixfiles delete tmp sockets and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 027/155] policycoreutils: fixfile use find -delete instead of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 025/155] policycoreutils: chcat man page typo
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 024/155] policycoreutils: add man page for genhomedircon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 023/155] policycoreutils: setfiles fix typo
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 022/155] policycoreutils: setsebool should inform users they
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 021/155] policycoreutils: setsebool typos
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 020/155] policycoreutils: open_init_tty man page typos
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 019/155] policycoreutils: Don't add user site directory to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 018/155] policycoreutils: newrole retain CAP_SETPCAP
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 013/155] libsemanage: throw exceptions in python rather than
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 011/155] audit2allow: do not print statistics
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 010/155] libselinux: make python bindings for restorecon work
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 009/155] libselinux: fix python audit2why binding error
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 006/155] libselinux: do not check fcontext duplicates on use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 007/155] libselinux: support new python3 functions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 153/155] Allow seunshare to run as root
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 153/155] Allow seunshare to run as root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 91/92] policycoreutils: sandbox: FIXME update sandbox
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 91/92] policycoreutils: sandbox: FIXME update sandbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/92] policycoreutils: make ignore_enoent do something
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 14/92] libselinux: move .gitignore into utils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/92] libselinux: new setexecon utility
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/92] libselinux: selabel_open fix processing of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/92] libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/92] checkmodule: Add note to checkmodule man page about
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/92] restorecond: first user logged in is not noticed
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/92] libselinux: simplify SRCS in Makefile
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/92] Repo: update .gitignore
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/92] checkpolicy: dispol: print role transition rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Only call role_fix_callback for base.p_roles during expansion
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: Error in monolithic role attribute
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: Howto transition socket
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [PATCH 0/2] Series short description
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] doc: Update the MAINTAINERS info for Paul Moore
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] doc: Update the email address for Paul Moore in various source files
- From: Paul Moore <paul.moore@xxxxxx>
- Re: chown affecting type_transition?
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: chown affecting type_transition?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: chown affecting type_transition?
- From: Joe Nall <joe@xxxxxxxx>
- Howto transition socket
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- chown affecting type_transition?
- From: Ted Toth <txtoth@xxxxxxxxx>
- Error in monolithic role attribute
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Fwd: How to extract file context patterns from selinux module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: How to extract file context patterns from selinux module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fwd: How to extract file context patterns from selinux module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fwd: How to extract file context patterns from selinux module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fwd: How to extract file context patterns from selinux module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- ANN: SELinux Userspace Release
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Bumping Version Numbers
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]