SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 1/1] libselinux - return EINVAL if invalid role selected
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- [PATCH 1/1] libselinux: Updated selabel_file(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Updated selabel_x(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Updated selabel_media(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_x(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_db(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_file(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Updated selabel_media(5) man page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- Re: First forays in to writing a module to lock down PowerDNS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- First forays in to writing a module to lock down PowerDNS.
- [PATCH 1/1] policycoreutils: sestatus: Updated sestatus and man pages.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] policycoreutils: Added SELinux config file man page.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] policycoreutils: Added SELinux config file man page.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - Mapped compute functions now obey deny_unknown flag
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - return EINVAL if invalid role selected
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - Remove assert in security_get_boolean_names(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux - get_default_type now sets EINVAL if no entry.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Russell Coker <russell@xxxxxxxxxxxx>
- CIL/SELinux Userspace Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- [PATCH] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: libselinux version bump past 99
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] semodule segfaults with ubuntu
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- [PATCH 24/24] checkpolicy: test: Makefile: include -W and -Werror
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/24] checkpolicy: dismod: fix unused parameter errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/24] checkpolicy: dis* fixed signed vs unsigned errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux on Android
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SELinux on Android
- From: Bhargava Shastry <bshas3@xxxxxxxxx>
- Re: [PATCH 01/63] checkpolicy: the " is not part of the filename for
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 01/63] checkpolicy: the " is not part of the filename for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 50/63] checkpolicy: parse for default_file_trans rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 50/63] checkpolicy: parse for default_file_trans rules
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 01/63] checkpolicy: the " is not part of the filename for
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- [PATCH 16/63] policycoreutils: semanage: FIXME set modified
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/63] policycoreutils: semanage: FIXME whitespace changes in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/63] libselinux: rename and export symlink_realpath
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/63] libselinux: load_policy: handle selinux=0 and
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/63] policycoreutils: semanage: Add -o description to the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/63] tree: Makefiles: syntax
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/63] policycoreutils: fix sandbox Makefile
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/63] libsemanage: create man5dir if not exist
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/63] libsemanage: semanage.conf man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/63] policycoreutils: semodule_package: remove
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/63] policycoreutils: restorecond: make restorecond -u exit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/63] policycoreutils: semodule: Document semodule -p in man
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/63] libselinux: label: cosmetic cleanups
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/63] policycoreutils: label_file: style changes to make
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/63] policycoreutils: setfiles: close /proc/mounts file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/63] policycoreutils: do not leak memory in restore
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/63] libselinux: libsemanage: libsepol: regenerate .pc on
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/63] policycoreutils: make use of the new
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/63] policycoreutils: setfiles: fix use before initialized
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/63] libselinux: audit2why: close fd on enomem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/63] libselinux: seusers: fix to handle large sets of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/63] libselinux: Don't reinitialize avc_init if it has been
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/63] libselinux: simple interface for access checks
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/63] Checkin Stephen Smalley's Fix for making sure we
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/63] libselinux: maintain mode even if umask is tighter
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/63] sepolgen: Return name field in avc data
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/63] checkpolicy: parse for default_file_trans rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/63] libsepol: Move ebitmap_* functions from mcstrans to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/63] checkpolicy: drop libsepol dynamic link in checkpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 62/63] libsepol: expand: do filename_trans type comparison on
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/63] policycoreutils: restorecond: Add .local/share as a
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/63] checkpolicy: the " is not part of the filename for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Where does linux kernel call initial policy load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: audit failed attempts to set invalid labels
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Where does linux kernel call initial policy load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Where does linux kernel call initial policy load
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [PATCH 1/2] LSM: Do not apply mmap_min_addr check to PROT_NONE mappings
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: passwd, chfn and chsh not reporting AVC's
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help Please with SELinux fail report
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- passwd, chfn and chsh not reporting AVC's
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Help Please with SELinux fail report
- From: Ken Smith <kens@xxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: David Windsor <dwindsor@xxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 1/1] libsepol: Move ebitmap_* functions from mcstrans to libsepol
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Upstart not transitioning to target domain
- From: "Damian Gerow" <dgerow@xxxxxxxxxxxxxxx>
- Re: Upstart not transitioning to target domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Upstart not transitioning to target domain
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Upstart not transitioning to target domain
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Upstart not transitioning to target domain
- From: "Damian Gerow" <dgerow@xxxxxxxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am working to further shrink the size of policy in Fedora 17.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Writing a program to monitor the SELinux log
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Writing a program to monitor the SELinux log
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: [PATCH] bluetooth: Properly clone LSM attributes to newly created child connections
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] bluetooth: Properly clone LSM attributes to newly created child connections
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- I am working to further shrink the size of policy in Fedora 17.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #3]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Context Relabeling Authorization
- From: Matt Benke <mbenke@xxxxxxxxxxxxxxxx>
- Re: Puzzling SELinux problem
- From: Joe Zeff <joe@xxxxxxx>
- Re: Puzzling SELinux problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: New HIPS based on SELinux
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Puzzling SELinux problem
- From: Joe Zeff <joe@xxxxxxx>
- New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- New HIPS based on SELinux
- From: Hramchenko <hramchenko@xxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- I am trying an experiment of making allow_ptrace boolean actually do something useful.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert() [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: Fix RCU deref check warning in sel_netport_insert()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: David Windsor <dwindsor@xxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: David Windsor <dwindsor@xxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Indentation error for Python module seobject (fix typo)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Indentation error for Python module seobject (fix typo)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: I would like to change the behavior of MCS label creations in directory.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- I would like to change the behavior of MCS label creations in directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Role attribute status
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Role attribute status
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: Role attribute status
- From: Eric Paris <eparis@xxxxxxxxxx>
- Role attribute status
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v3] semanage.conf manual page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC 2/2] refpolicy: add systemd support to tresys main policy.
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] policycoreutils: cleaning of semodule_unpackage
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: CIL compiler
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: CIL compiler
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 67/67] libsemanage: fix semanage_store_access_check calling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 66/67] whole tree: default make target to all not install
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 65/67] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/67] policycoreutils: semanage: FIXME If you do a semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/67] policycoreutils: semanage: FIXME Catch RuntimeErrors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/67] policycoreutils: sepolgen: FIXME audit2allow is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/67] policycoreutils: semanage: FIXME: Dont print heading
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 53/67] policycoreutils: semanage: FIXME Stop showing heading
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/67] libsepol: FIXME setools expects expand_module_avrules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/67] libsepol: Preserve tunables when required by semodule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/67] libsepol: libsemanage: policycoreutils: Create a new
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/67] libsepol: Skip tunable identifier and cond_node_t in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/67] libsepol: Permanently discard disabled branches of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/67] libsepol: Copy and check the cond_bool_datum_t.flags
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/67] libsepol: Write and read TUNABLE flags in related data
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/67] checkpolicy: Separate tunable from boolean during
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/67] libsepol: Indicate when boolean is indeed a tunable.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/67] sepolgen: FIXME Change analysys of sepolgen to return
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/67] sepolgen: FIXME Change perm-map and add open to try to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/67] policycoreutils: sandbox: cntrl-c should kill entire
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/67] policycoreutils: sandbox: FIXME do not bind mount so
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/67] policycoreutils: sandbox: add -Wall and -Werror to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/67] policycoreutils: restorecon: Always check return code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/67] policycoreutils: audit2allow: FIXME sepolgen-ifgen use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/67] policycoreutils: audit2allow: use alternate policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/67] policycoreutils: sepolgen-ifgen: FIXME new attr-helper
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/67] libsemanage: change module disabled from rename to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 05/67] libsepol: Skip writing role attributes for policy.X
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL compiler
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
- From: dave w <nullcore@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix sandbox Makefile
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] policycoreutils: fix sandbox Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL compiler
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH v5] Fix makefiles for the userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix symbolic link creation for the userspace libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v3] semanage.conf manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v5] Fix makefiles for the userspace tools and libraries
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Change default make target for the man directory of policycoreutils/mcstrans (was Re: [PATCH] Change default make target for sepolgen)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Change default make target for some directories in the libraries (was Re: [PATCH] Change default make target for sepolgen)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC v2] semanage.conf manual page (was Re: [RFC] semanage.conf manual page)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Fix includes for userspace tools and libraries (was Re: [PATCH v2] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix includes for userspace tools and libraries)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- sshd problem
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] genhomedircon installation and manual page improvements (was Re: policycoreutils manpages needed)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC v2] Userspace git local build (was Re: [RFC] Userspace git local build)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] Userspace git local build (was Re: [RFC] Userspace top-level Makefile)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] Fix LIBDIR usage for load_policy (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: ANN: Reference Policy contrib repository
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: ANN: Reference Policy contrib repository
- From: Robert Lee <robert.lee@xxxxxxxxxx>
- ANN: Reference Policy contrib repository
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v2 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v2 Discard unused tunables from raw policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 0/1] Modify 'mdp' to output MLS and CIL policy source files.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] Modify 'mdp' to output MLS and CIL policy source files.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: sepgsql and process transition
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: no new-line in setfiles/restorecon patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils manpages needed
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: sepgsql and process transition
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- policycoreutils manpages needed
- From: Russell Coker <russell@xxxxxxxxxxxx>
- no new-line in setfiles/restorecon patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [v2 PATCH 2/8] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 5/8] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 7/8] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 4/8] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/8] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v2 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 8/8] Preserve tunables when required by semodule program.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- policycoreutils man pages patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5 RBAC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- CentOS 5 RBAC
- From: Roy Badami <roy.badami@xxxxxxxxxxxx>
- Re: [PATCH 1/2] Define security_sk_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Dump the sock's security context
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 0/2] Dump the sock's security context
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 1/2] Define security_sk_getsecctx
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
- From: <rongqing.li@xxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sepgsql and process transition
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [PATCH 17/48] policycoreutils: setfiles: FIXME Fix potential crash
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/48] policycoreutils: sandbox: rewrite /tmp handling FIXME
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/48] policycoreutils: sandbox: add -Wall and -Werror to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- sepgsql and process transition
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: hidden_def and libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- hidden_def and libselinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v1 Discard unused tunables from raw policy
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/7] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/7] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Toolchain is broken?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Toolchain is broken?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [PATCH 76/77] sepolgen: FIXME Allow sepolgen to handle file name
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/77] policycoreutils: setfiles: Fix process_glob to handle
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 69/77] policycoreutils: sandbox: Closedir on failures
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 65/77] policycoreutils: sandbox: trap sigterm to make sure
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/77] policycoreutils: sandbox: cntrl-c should kill entire
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/77] policycoreutils: sandbox: pass DPI from the desktop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/77] policycoreutils: sandbox: seunshare: introduce helper
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/77] policycoreutils: sandbox: add -C option to not drop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/77] policycoreutils: sandbox: split seunshare caps
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/77] policycoreutils: sandbox: use dbus-launch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/77] policycoreutils: sandbox: numerous simple updates to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/77] policycoreutils: sandbox: Makefile: new man pages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/77] policycoreutils: sandbox: whitespace fix
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/77] policycoreutils: sandbox: do not require selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/77] policycoreutils: semodule_package: Add
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/77] policycoreutils: sandbox: check for paths up front
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/77] policycoreutils: sandbox: allow users specify sandbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/77] policycoreutils: sandbox: move seunshare globals to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/77] policycoreutils: restorecon: Always check return code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/77] policycoreutils: sandbox: rename dir to srcdir
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/77] policycoreutils: sandbox: use defined values for paths
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/77] policycoreutils: setfiles: get rid of some stupid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/77] policycoreutils: setfiles: move
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 17/77] global: Makefile: create global 'all' target
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/77] checkpolicy: fix spacing in output message
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/77] libselinux: selinux_file_context_verify function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/77] libselinux: move realpath helper to matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/77] libsemanage: python wrapper makefile changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/77] libselinux: python wrapper makefile changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- We have an interesting problem with pam_namespace on mls boxes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: GProcunier@xxxxxxxxxx
- Re: v0 Separate tunables from booleans
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux Common Intermediate Language Update
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: v0 Separate tunables from booleans
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] My patchset to test "Separating tunables from booleans"
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [refpolicy] My patchset to test "Separating tunables from booleans"
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v0 PATCH 4/6] Permanently enable the if or else branch of a tunable during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Separate tunables from booleans
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 5/6] Copy and check the cond_bool_datum_t.flags during link.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/6] Separate tunable from boolean during compile.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/6] Write and read TUNABLE flags in related data structures.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/6] Indicate when boolean is indeed a tunable.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxx>
- SELinux+IPTables+Non SELINUX Aware Network Daemon
- From: GProcunier@xxxxxxxxxx
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v2 Skip role attributes for policy.X and downgraded pp
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: v2 Skip role attributes for policy.X and downgraded pp
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: What is /selinux/null?
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: install
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: install
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy memory error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- install
- From: Russell Coker <russell@xxxxxxxxxxxx>
- load_policy memory error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: su vs runuser
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inclusion of selinux.h in cred.h
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inclusion of selinux.h in cred.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: rarob@xxxxxxxxxxxxxxxxxxxxxx
- Re: su vs runuser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- su vs runuser
- From: Ted Toth <txtoth@xxxxxxxxx>
- RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
- From: rarob@xxxxxxxxxxxxxxxxxxxxxx
- Re: inclusion of selinux.h in cred.h
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- inclusion of selinux.h in cred.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v2 PATCH 1/1] Skip writing role attributes for policy.X and downgraded pp.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v2 Skip role attributes for policy.X and downgraded pp
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- v1 Skip role attributes for policy.X
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v0 PATCH 1/1] Skip writing role attributes for policy.X.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Skip role attributes for policy.X
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 69/96] policycoreutils: semodule_package: Add
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/96] policycoreutils: run_init: clarification of the usage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 60/96] policycoreutils: semanage: fix usage header around
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/96] policycoreutils: semanage: remove useless empty lines
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/96] policycoreutils: semanage: add -e to fcontext usage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/96] policycoreutils: semanage: update man page with new
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/96] policycoreutils: semanage: update usage text
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/96] policycoreutils: semanage: introduce file context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/96] policycoreutils: semanage: enable and disable modules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/96] policycoreutils: semanage: output all local
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/96] policycoreutils: semanage: introduce extraction of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/96] policycoreutils: semanage: cleanup error on invalid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/96] policycoreutils: semanage: handle being called with no
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/96] policycoreutils: semanage: return sooner to save CPU
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/96] policycoreutils: semanage: surround getopt with
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/96] policycoreutils: semanage: use define/raise instead of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/96] policycoreutils: semanage: some options are only valid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/96] policycoreutils: semanage: introduce better deleteall
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/96] policycoreutils: semanage: do not allow spaces in file
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/96] policycoreutils: semanage: distinguish between builtin
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 32/96] policycoreutils: semanage: centralized ip node
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/96] policycoreutils: setfiles: make the restore function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 28/96] policycoreutils: setfiles: use glob to handle ~ and .
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/96] policycoreutils: fixfiles: do not hard code types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/96] policycoreutils: fixfiles: stop trying to be smart
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/96] policycoreutils: fixfiles: use new kernel seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/96] policycoreutils: fixfiles: pipe everything to cat
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/96] policycoreutils: fixfiles: introduce
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 19/96] policycoreutils: semodule: support for alternative
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 15/96] libsemanage: print error debug info for buggy fc files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/96] libsemanage: introduce semanage_set_root and friends
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 11/96] libsemanage: throw exceptions in python rather than
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 10/96] libsemanage: python3 support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/96] libsemanage: patch for MCS/MLS in user files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/96] libselinux: mapping fix for invalid class/perms after
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/96] libselinux: audit2why: work around python bug not
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/96] libselinux: resolv symlinks and dot directories before
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/96] checkpolicy: add missing ; to attribute_role_def
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 01/96] checkpolicy: Redo filename/filesystem syntax to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Security: define security_sk_getsecid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Export the tcp sock's security context to proc.
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 6/6] Export the tcp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 1/6] Security: define security_sk_getsecid.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 5/6] Export the unix sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 2/6] Define the function to write sock's security context to seq_file.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [v2 PATCH 0/6] Export the sock's security context to proc
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 4/6] Export the udp sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [PATCH 3/6] Export the raw sock's security context to proc.
- From: <rongqing.li@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]