SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: David Windsor <dwindsor@xxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Indentation error for Python module seobject (fix typo)
From
: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
Re: [PATCH] Indentation error for Python module seobject (fix typo)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Indentation error for Python module seobject (fix typo)
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] Indentation error for Python module seobject (fix typo)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: I would like to change the behavior of MCS label creations in directory.
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
I would like to change the behavior of MCS label creations in directory.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Role attribute status
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Role attribute status
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: Role attribute status
From
: Eric Paris <eparis@xxxxxxxxxx>
Role attribute status
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH v3] semanage.conf manual page
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [RFC 2/2] refpolicy: add systemd support to tresys main policy.
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] policycoreutils: cleaning of semodule_unpackage
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v6] Fix includes for userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: CIL compiler
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: CIL compiler
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: dave w <nullcore@xxxxxxxxx>
Re: policycoreutils manpages needed
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 51/67] libsepol: Preserve tunables when required by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: dave w <nullcore@xxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH 67/67] libsemanage: fix semanage_store_access_check calling
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH 66/67] whole tree: default make target to all not install
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 65/67] libselinux: put libselinux.so.1 in /lib not /usr/lib
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 58/67] policycoreutils: semanage: FIXME If you do a semanage
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 57/67] policycoreutils: semanage: FIXME Catch RuntimeErrors
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 55/67] policycoreutils: sepolgen: FIXME audit2allow is
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 54/67] policycoreutils: semanage: FIXME: Dont print heading
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 53/67] policycoreutils: semanage: FIXME Stop showing heading
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 52/67] libsepol: FIXME setools expects expand_module_avrules
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 51/67] libsepol: Preserve tunables when required by semodule
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 50/67] libsepol: libsemanage: policycoreutils: Create a new
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 49/67] libsepol: Skip tunable identifier and cond_node_t in
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 48/67] libsepol: Permanently discard disabled branches of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 47/67] libsepol: Copy and check the cond_bool_datum_t.flags
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 46/67] libsepol: Write and read TUNABLE flags in related data
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 45/67] checkpolicy: Separate tunable from boolean during
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 44/67] libsepol: Indicate when boolean is indeed a tunable.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 39/67] sepolgen: FIXME Change analysys of sepolgen to return
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 38/67] sepolgen: FIXME Change perm-map and add open to try to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 35/67] policycoreutils: sandbox: FIXME add level based kill
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 36/67] policycoreutils: sandbox: cntrl-c should kill entire
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 34/67] policycoreutils: sandbox: FIXME do not bind mount so
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 33/67] policycoreutils: sandbox: FIXME rewrite /tmp handling
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 30/67] policycoreutils: sandbox: add -Wall and -Werror to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 29/67] policycoreutils: restorecon: Always check return code
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 12/67] policycoreutils: setfiles: FIXME Fix potential crash
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 11/67] policycoreutils: setfiles: FIXME switch from stat to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 10/67] policycoreutils: fixfiles: FIXME label /root but not
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 09/67] policycoreutils: audit2allow: FIXME sepolgen-ifgen use
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 07/67] policycoreutils: audit2allow: use alternate policy
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 06/67] policycoreutils: sepolgen-ifgen: FIXME new attr-helper
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 03/67] libsemanage: change module disabled from rename to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH 05/67] libsepol: Skip writing role attributes for policy.X
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: fix sandbox Makefile
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] policycoreutils: fix sandbox Makefile
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CIL compiler
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
[PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare
From
: dave w <nullcore@xxxxxxxxx>
Re: [PATCH] policycoreutils: fix sandbox Makefile
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] policycoreutils: fix sandbox Makefile
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CIL compiler
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
[PATCH v5] Fix makefiles for the userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Fix symbolic link creation for the userspace libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH v3] semanage.conf manual page
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH v5] Fix makefiles for the userspace tools and libraries
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v5] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH 1/2] libselinux: put libselinux.so.1 in /lib not /usr/lib
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/2] libselinux: do not use relative path when creating libselinux symlinks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] Change default make target for the man directory of policycoreutils/mcstrans (was Re: [PATCH] Change default make target for sepolgen)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Change default make target for some directories in the libraries (was Re: [PATCH] Change default make target for sepolgen)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Change default make target for sepolgen (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Fix function arguments in libsemanage tests (was Re: [PATCH v4] Fix includes for userspace tools and libraries)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v4] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (and possible security issue)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC v2] semanage.conf manual page (was Re: [RFC] semanage.conf manual page)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[RFC] semanage.conf manual page (was Re: policycoreutils manpages needed)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v3] Fix includes for userspace tools and libraries (was Re: [PATCH v2] Fix includes for userspace tools and libraries)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix includes for userspace tools and libraries)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Fix includes for userspace tools and libraries (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Improve installation of userspace shared libraries (was Re: [RFC] Userspace top-level Makefile)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
sshd problem
From
: Russell Coker <russell@xxxxxxxxxxxx>
[PATCH] genhomedircon installation and manual page improvements (was Re: policycoreutils manpages needed)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [RFC v2] Userspace git local build (was Re: [RFC] Userspace git local build)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[RFC] Userspace git local build (was Re: [RFC] Userspace top-level Makefile)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [RFC] Userspace top-level Makefile (was Re: [PATCH] Fix LIBDIR usage for load_policy)
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[PATCH] Fix LIBDIR usage for load_policy (was Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule)
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[PATCH] Fix include semanage/handle.h for semanage_set_root() as used by semodule
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: ANN: Reference Policy contrib repository
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: ANN: Reference Policy contrib repository
From
: Robert Lee <robert.lee@xxxxxxxxxx>
ANN: Reference Policy contrib repository
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: v2 Discard unused tunables from raw policy
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: v2 Discard unused tunables from raw policy
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
RE: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: Toolchain is broken?
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH 0/1] Modify 'mdp' to output MLS and CIL policy source files.
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 1/1] Modify 'mdp' to output MLS and CIL policy source files.
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 1/1] CIL compiler - Generate initial SIDs correctly in binary policy.
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: SELinux Common Intermediate Language Update
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
RE: sepgsql and process transition
From
: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: no new-line in setfiles/restorecon patch
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: policycoreutils manpages needed
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
RE: sepgsql and process transition
From
: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
policycoreutils manpages needed
From
: Russell Coker <russell@xxxxxxxxxxxx>
no new-line in setfiles/restorecon patch
From
: Russell Coker <russell@xxxxxxxxxxxx>
[v2 PATCH 2/8] Separate tunable from boolean during compile.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 5/8] Permanently discard disabled branches of tunables in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 7/8] Create a new preserve_tunables flag in sepol_handle_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 3/8] Write and read TUNABLE flags in related data structures.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 4/8] Copy and check the cond_bool_datum_t.flags during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 1/8] Indicate when boolean is indeed a tunable.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v2 Discard unused tunables from raw policy
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 6/8] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v2 PATCH 8/8] Preserve tunables when required by semodule program.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
policycoreutils man pages patch
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] Define security_sk_getsecctx
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] Define security_sk_getsecctx
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: CentOS 5 RBAC
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CentOS 5 RBAC
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
CentOS 5 RBAC
From
: Roy Badami <roy.badami@xxxxxxxxxxxx>
Re: [PATCH 1/2] Define security_sk_getsecctx
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Dump the sock's security context
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
[PATCH 0/2] Dump the sock's security context
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 1/2] Define security_sk_getsecctx
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 2/2] Add a netlink attribute INET_DIAG_SECCTX
From
: <rongqing.li@xxxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: sepgsql and process transition
From
: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
[PATCH 17/48] policycoreutils: setfiles: FIXME Fix potential crash
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 38/48] policycoreutils: sandbox: rewrite /tmp handling FIXME
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 35/48] policycoreutils: sandbox: add -Wall and -Werror to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: SELinux Common Intermediate Language Update
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
sepgsql and process transition
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
RE: Toolchain is broken?
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
[v0 PATCH 1/1] Fix compile errors when DEBUG is turned on.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: SELinux Common Intermediate Language Update
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: hidden_def and libselinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
hidden_def and libselinux
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: Toolchain is broken?
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v1 Discard unused tunables from raw policy
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v1 PATCH 2/7] Separate tunable from boolean during compile.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 2/7] Separate tunable from boolean during compile.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 1/7] Indicate when boolean is indeed a tunable.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 4/7] Copy and check the cond_bool_datum_t.flags during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 6/7] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 7/7] Create a new preserve_tunables flag in sepol_handle_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 2/7] Separate tunable from boolean during compile.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 3/7] Write and read TUNABLE flags in related data structures.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[PATCH 5/7] Permanently discard disabled branches of tunables in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
RE: Toolchain is broken?
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: Toolchain is broken?
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
RE: Toolchain is broken?
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Toolchain is broken?
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Toolchain is broken?
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
[PATCH 76/77] sepolgen: FIXME Allow sepolgen to handle file name
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 70/77] policycoreutils: setfiles: Fix process_glob to handle
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[PATCH 69/77] policycoreutils: sandbox: Closedir on failures
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 65/77] policycoreutils: sandbox: trap sigterm to make sure
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 64/77] policycoreutils: sandbox: cntrl-c should kill entire
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 60/77] policycoreutils: sandbox: pass DPI from the desktop
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 59/77] policycoreutils: sandbox: seunshare: introduce helper
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 57/77] policycoreutils: sandbox: add -C option to not drop
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 56/77] policycoreutils: sandbox: split seunshare caps
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 54/77] policycoreutils: sandbox: use dbus-launch
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 53/77] policycoreutils: sandbox: numerous simple updates to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 51/77] policycoreutils: sandbox: Makefile: new man pages
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 44/77] policycoreutils: sandbox: whitespace fix
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 52/77] policycoreutils: sandbox: do not require selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 43/77] policycoreutils: semodule_package: Add
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 48/77] policycoreutils: sandbox: check for paths up front
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 49/77] policycoreutils: sandbox: allow users specify sandbox
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 45/77] policycoreutils: sandbox: move seunshare globals to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 42/77] policycoreutils: restorecon: Always check return code
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 50/77] policycoreutils: sandbox: rename dir to srcdir
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 47/77] policycoreutils: sandbox: use defined values for paths
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 24/77] policycoreutils: setfiles: get rid of some stupid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 22/77] policycoreutils: setfiles: move
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 17/77] global: Makefile: create global 'all' target
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 09/77] checkpolicy: fix spacing in output message
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 03/77] libselinux: selinux_file_context_verify function
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 02/77] libselinux: move realpath helper to matchpathcon
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 06/77] libsemanage: python wrapper makefile changes
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 01/77] libselinux: python wrapper makefile changes
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: SELinux Common Intermediate Language Update
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: SELinux Common Intermediate Language Update
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
We have an interesting problem with pam_namespace on mls boxes
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
From
: GProcunier@xxxxxxxxxx
Re: v0 Separate tunables from booleans
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [refpolicy] My patchset to test "Separating tunables from booleans"
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
RE: [refpolicy] My patchset to test "Separating tunables from booleans"
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
SELinux Common Intermediate Language Update
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: v0 Separate tunables from booleans
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [refpolicy] My patchset to test "Separating tunables from booleans"
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
RE: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
RE: [refpolicy] My patchset to test "Separating tunables from booleans"
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: SELinux+IPTables+Non SELINUX Aware Network Daemon
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: v2 Skip role attributes for policy.X and downgraded pp
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [refpolicy] My patchset to test "Separating tunables from booleans"
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
[refpolicy] My patchset to test "Separating tunables from booleans"
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
[v0 PATCH 4/6] Permanently enable the if or else branch of a tunable during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v0 Separate tunables from booleans
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v0 PATCH 6/6] Skip tunable identifier and cond_node_t in expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v0 PATCH 5/6] Copy and check the cond_bool_datum_t.flags during link.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v0 PATCH 2/6] Separate tunable from boolean during compile.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v0 PATCH 3/6] Write and read TUNABLE flags in related data structures.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v0 PATCH 1/6] Indicate when boolean is indeed a tunable.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: v2 Skip role attributes for policy.X and downgraded pp
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Eric Paris <eparis@xxxxxxxxxx>
SELinux+IPTables+Non SELINUX Aware Network Daemon
From
: GProcunier@xxxxxxxxxx
Re: libselinux mountpoint changing patch.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: libselinux mountpoint changing patch.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: v2 Skip role attributes for policy.X and downgraded pp
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: v2 Skip role attributes for policy.X and downgraded pp
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
RE: v2 Skip role attributes for policy.X and downgraded pp
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: What is /selinux/null?
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
Re: install
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: install
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: load_policy memory error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
install
From
: Russell Coker <russell@xxxxxxxxxxxx>
load_policy memory error
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: su vs runuser
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: inclusion of selinux.h in cred.h
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: inclusion of selinux.h in cred.h
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
From
: rarob@xxxxxxxxxxxxxxxxxxxxxx
Re: su vs runuser
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
su vs runuser
From
: Ted Toth <txtoth@xxxxxxxxx>
RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue
From
: rarob@xxxxxxxxxxxxxxxxxxxxxx
Re: inclusion of selinux.h in cred.h
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
inclusion of selinux.h in cred.h
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[v2 PATCH 1/1] Skip writing role attributes for policy.X and downgraded pp.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v2 Skip role attributes for policy.X and downgraded pp
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
v1 Skip role attributes for policy.X
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v1 PATCH 1/1] Skip writing role attributes for policy.X.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
RE: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Skip writing role attributes for policy.X.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[v0 PATCH 1/1] Skip writing role attributes for policy.X.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v0 Skip role attributes for policy.X
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH 69/96] policycoreutils: semodule_package: Add
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 61/96] policycoreutils: run_init: clarification of the usage
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 60/96] policycoreutils: semanage: fix usage header around
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 57/96] policycoreutils: semanage: remove useless empty lines
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 55/96] policycoreutils: semanage: add -e to fcontext usage
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 54/96] policycoreutils: semanage: update man page with new
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 53/96] policycoreutils: semanage: update usage text
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 52/96] policycoreutils: semanage: introduce file context
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 51/96] policycoreutils: semanage: enable and disable modules
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 50/96] policycoreutils: semanage: output all local
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 49/96] policycoreutils: semanage: introduce extraction of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 47/96] policycoreutils: semanage: cleanup error on invalid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 45/96] policycoreutils: semanage: handle being called with no
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 43/96] policycoreutils: semanage: return sooner to save CPU
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 42/96] policycoreutils: semanage: surround getopt with
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 41/96] policycoreutils: semanage: use define/raise instead of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 40/96] policycoreutils: semanage: some options are only valid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 39/96] policycoreutils: semanage: introduce better deleteall
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 35/96] policycoreutils: semanage: do not allow spaces in file
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 33/96] policycoreutils: semanage: distinguish between builtin
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 32/96] policycoreutils: semanage: centralized ip node
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 30/96] policycoreutils: setfiles: make the restore function
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 28/96] policycoreutils: setfiles: use glob to handle ~ and .
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 25/96] policycoreutils: fixfiles: do not hard code types
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 23/96] policycoreutils: fixfiles: stop trying to be smart
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 22/96] policycoreutils: fixfiles: use new kernel seclabel
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 21/96] policycoreutils: fixfiles: pipe everything to cat
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 20/96] policycoreutils: fixfiles: introduce
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 19/96] policycoreutils: semodule: support for alternative
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 15/96] libsemanage: print error debug info for buggy fc files
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 12/96] libsemanage: introduce semanage_set_root and friends
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 11/96] libsemanage: throw exceptions in python rather than
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 10/96] libsemanage: python3 support.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 09/96] libsemanage: patch for MCS/MLS in user files
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 07/96] libselinux: mapping fix for invalid class/perms after
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 06/96] libselinux: audit2why: work around python bug not
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 04/96] libselinux: resolv symlinks and dot directories before
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 02/96] checkpolicy: add missing ; to attribute_role_def
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
[PATCH 01/96] checkpolicy: Redo filename/filesystem syntax to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
Re: [PATCH 1/6] Security: define security_sk_getsecid.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 6/6] Export the tcp sock's security context to proc.
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
[PATCH 6/6] Export the tcp sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 1/6] Security: define security_sk_getsecid.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 5/6] Export the unix sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 2/6] Define the function to write sock's security context to seq_file.
From
: <rongqing.li@xxxxxxxxxxxxx>
[v2 PATCH 0/6] Export the sock's security context to proc
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 4/6] Export the udp sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 3/6] Export the raw sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: checkpolicy is broken (which is not)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
RE: checkpolicy is broken (which is not)
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/5] Export the raw sock's security context to proc.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/5] Define the function to write sock's security context to seq_file.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 4/5] Export the unix sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 2/5] Export the raw sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 1/5] Define the function to write sock's security context to seq_file.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 0/5] Export the sock's security context to proc
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 3/5] Export the udp sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
[PATCH 5/5] Export the tcp sock's security context to proc.
From
: <rongqing.li@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: checkpolicy is broken (which is not)
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 006/155] libselinux: do not check fcontext duplicates on use
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux policy regarding LD_LIBRARY_PATH
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux policy regarding LD_LIBRARY_PATH
From
: Aaron Sowry <aaron@xxxxxxxxx>
Re: SELinux policy regarding LD_LIBRARY_PATH
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux policy regarding LD_LIBRARY_PATH
From
: Aaron Sowry <aaron@xxxxxxxxx>
Re: Howto transition socket
From
: Martin Christian <martin.christian@xxxxxxxxxxx>
Re: SELinux policy regarding LD_LIBRARY_PATH
From
: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
Re: Howto transition socket
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
SELinux policy regarding LD_LIBRARY_PATH
From
: Aaron Sowry <aaron@xxxxxxxxx>
[PATCH 090/155] policycoreutils: semanage: whitespace changes in
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 087/155] policycoreutils: semanage: fix indention
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 088/155] policycoreutils: semanage: remove useless empty
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 080/155] libsepol: Only call role_fix_callback for
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 078/155] policycoreutils: semodule_package: fix man page typo
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 077/155] policycoreutils: semodule_expand: update man page
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 068/155] policycoreutils: semanage: handle os errors
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 067/155] policycoreutils: semanage: fix traceback with bad
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 063/155] policycoreutils: semanage: show usage on -h or
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 056/155] policycoreutils: semanage: introduce more deleteall
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 049/155] policycoreutils: semanage: verify ports < 65536
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 047/155] policycoreutils: transaction into semanageRecords
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 046/155] policycoreutils: make get_handle a method of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 044/155] policycoreutils: remove a needless blank line
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 043/155] policycoreutils: make process_one error if not
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 037/155] policycoreutils: fixfiles: correct usage for
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 036/155] policycoreutils: put -p in help for restorecon and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 033/155] policycoreutils: fixfiles stop trying to be smart
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 034/155] policycoreutils: fixfiles: do not try to only label
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 029/155] policycoreutils: fixfiles clean up /var/run and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 028/155] policycoreutils: fixfiles delete tmp sockets and
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 027/155] policycoreutils: fixfile use find -delete instead of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 025/155] policycoreutils: chcat man page typo
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 024/155] policycoreutils: add man page for genhomedircon
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 023/155] policycoreutils: setfiles fix typo
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 022/155] policycoreutils: setsebool should inform users they
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 021/155] policycoreutils: setsebool typos
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 020/155] policycoreutils: open_init_tty man page typos
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 019/155] policycoreutils: Don't add user site directory to
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 018/155] policycoreutils: newrole retain CAP_SETPCAP
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 013/155] libsemanage: throw exceptions in python rather than
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 011/155] audit2allow: do not print statistics
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 010/155] libselinux: make python bindings for restorecon work
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 009/155] libselinux: fix python audit2why binding error
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 006/155] libselinux: do not check fcontext duplicates on use
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 007/155] libselinux: support new python3 functions
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 153/155] Allow seunshare to run as root
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 153/155] Allow seunshare to run as root
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 91/92] policycoreutils: sandbox: FIXME update sandbox
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 91/92] policycoreutils: sandbox: FIXME update sandbox
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 46/92] policycoreutils: make ignore_enoent do something
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 14/92] libselinux: move .gitignore into utils
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 13/92] libselinux: new setexecon utility
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 12/92] libselinux: selabel_open fix processing of
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 10/92] libselinux mountpoint changing patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 09/92] checkmodule: Add note to checkmodule man page about
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 08/92] restorecond: first user logged in is not noticed
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 05/92] libselinux: simplify SRCS in Makefile
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 03/92] Repo: update .gitignore
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 02/92] checkpolicy: dispol: print role transition rules
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[v0 PATCH 1/1] Only call role_fix_callback for base.p_roles during expansion.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v0 Only call role_fix_callback for base.p_roles during expansion
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
RE: Error in monolithic role attribute
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
RE: Howto transition socket
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
[PATCH 0/2] Series short description
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 1/2] doc: Update the MAINTAINERS info for Paul Moore
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 2/2] doc: Update the email address for Paul Moore in various source files
From
: Paul Moore <paul.moore@xxxxxx>
Re: chown affecting type_transition?
From
: Ted Toth <txtoth@xxxxxxxxx>
Re: chown affecting type_transition?
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: chown affecting type_transition?
From
: Joe Nall <joe@xxxxxxxx>
Howto transition socket
From
: Martin Christian <martin.christian@xxxxxxxxxxx>
chown affecting type_transition?
From
: Ted Toth <txtoth@xxxxxxxxx>
Error in monolithic role attribute
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Fwd: How to extract file context patterns from selinux module
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fwd: How to extract file context patterns from selinux module
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fwd: How to extract file context patterns from selinux module
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fwd: How to extract file context patterns from selinux module
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Fwd: How to extract file context patterns from selinux module
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
ANN: SELinux Userspace Release
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: Bumping Version Numbers
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: "netstat -Z" reimplementation
From
: Martin Christian <martin.christian@xxxxxxxxxxx>
"netstat -Z" reimplementation
From
: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
ANN: Reference Policy Release
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Bumping Version Numbers
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Bumping Version Numbers
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: Bumping Version Numbers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Incoming flood of updates to SELinux userspace - Missing patch
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Bumping Version Numbers
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: v4 Add role attribute support to libsepol
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: apol and active modules
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: apol and active modules
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: apol and active modules
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: apol and active modules
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: apol and active modules
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: apol and active modules
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
[v4 PATCH 4/6] Add role attribute support when expanding role_datum_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v4 PATCH 5/6] Add role attribute support when expanding role_set_t.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v4 PATCH 1/6] Add role attribute support when compiling modules.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v4 PATCH 6/6] Support adding one role attribute into another.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
v4 Add role attribute support to libsepol
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v4 PATCH 3/6] Add role attribute support when linking modules.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
[v4 PATCH 2/6] Add role attribute support when generating pp files.
From
: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
apol and active modules
From
: Russell Coker <russell@xxxxxxxxxxxx>
RE: v3 Add role attribute support to libsepol
From
: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
Re: v3 Add role attribute support to libsepol
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: is "type poisoning" possible?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: PythonSELinux binding problem
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: PythonSELinux binding problem
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: PythonSELinux binding problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
PythonSELinux binding problem
From
: rarob@xxxxxxxxxxxxxxxxxxxxxx
RE: subs_dist and libselinux releases
From
: Stephen Lawrence <slawrence@xxxxxxxxxx>
[PATCH 16/93] semanage: update manpage to explain transactions
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 13/93] libsemanage: drop the -no-unused-parameter build flag
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 12/93] libsemanage: use -Werror
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Incoming flood of updates to SELinux userspace
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 08/93] restorecond: Ignore IN_IGNORED inotify events
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 07/93] Rearranged audit2allow.1 to match the newer ways we
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 02/93] libsepol: store all filename transition rules when
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH 03/93] checkpolicy: fix dispol/dismod display for filename
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: What is /selinux/null?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: What is /selinux/null?
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
What is /selinux/null?
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
Re: [PATCH] Further clarification of the usage of run_init in the manual page
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]