SELinux - Date Index
[Prev Page][Next Page]
- Re: "netstat -Z" reimplementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "netstat -Z" reimplementation
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- "netstat -Z" reimplementation
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Bumping Version Numbers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bumping Version Numbers
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Bumping Version Numbers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Incoming flood of updates to SELinux userspace - Missing patch
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Bumping Version Numbers
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: v4 Add role attribute support to libsepol
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: apol and active modules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: apol and active modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: apol and active modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: apol and active modules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: apol and active modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: apol and active modules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [v4 PATCH 4/6] Add role attribute support when expanding role_datum_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v4 PATCH 5/6] Add role attribute support when expanding role_set_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v4 PATCH 1/6] Add role attribute support when compiling modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v4 PATCH 6/6] Support adding one role attribute into another.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v4 Add role attribute support to libsepol
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v4 PATCH 3/6] Add role attribute support when linking modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v4 PATCH 2/6] Add role attribute support when generating pp files.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- apol and active modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: v3 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: v3 Add role attribute support to libsepol
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: is "type poisoning" possible?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PythonSELinux binding problem
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: PythonSELinux binding problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PythonSELinux binding problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PythonSELinux binding problem
- From: rarob@xxxxxxxxxxxxxxxxxxxxxx
- RE: subs_dist and libselinux releases
- From: Stephen Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 16/93] semanage: update manpage to explain transactions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/93] libsemanage: drop the -no-unused-parameter build flag
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/93] libsemanage: use -Werror
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Incoming flood of updates to SELinux userspace
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 08/93] restorecond: Ignore IN_IGNORED inotify events
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/93] Rearranged audit2allow.1 to match the newer ways we
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/93] libsepol: store all filename transition rules when
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/93] checkpolicy: fix dispol/dismod display for filename
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What is /selinux/null?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What is /selinux/null?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- What is /selinux/null?
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH] Further clarification of the usage of run_init in the manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Further clarification of the usage of run_init in the manual page
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] Further clarification of the usage of run_init in the manual page
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: is "type poisoning" possible?
- From: mohit verma <mohit89mlnc@xxxxxxxxx>
- is "type poisoning" possible?
- From: Zoltan Arnold NAGY <zoltan.arnold.nagy@xxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: subs_dist and libselinux releases
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: subs_dist and libselinux releases
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: subs_dist and libselinux releases
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- subs_dist and libselinux releases
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Matthew Ife <deleriux@xxxxxxxxxxxxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sec context of unix domain sockets
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: As we move to systemd, we are loosing some functionality from init scripts.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Sec context of unix domain sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- As we move to systemd, we are loosing some functionality from init scripts.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sec context of unix domain sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Sec context of unix domain sockets
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- Re: mailing list: hypermail generated archive ends Thu 18 Feb 2010
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- mailing list: hypermail generated archive ends Thu 18 Feb 2010
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux and CGI scripts
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux and CGI scripts
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: Making new roles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Making new roles
- From: Julian Onions <Julian.Onions@xxxxxxxxx>
- Re: Sec context of unix domain sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Best base policy to use
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: context NFS mounts
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: context NFS mounts
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Best base policy to use
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- context NFS mounts
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: MLS Not enforcing secadm and auditadm
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Best base policy to use
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Best base policy to use
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Best base policy to use
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: MLS Not enforcing secadm and auditadm
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Best base policy to use
- From: Russell Coker <russell@xxxxxxxxxxxx>
- MLS Not enforcing secadm and auditadm
- From: <Kurt.Nelson@xxxxxxxxxxxxxxx>
- Re: Best base policy to use
- From: Dominick Grift <domg472@xxxxxxxxx>
- Best base policy to use
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Sec context of unix domain sockets
- From: Martin Christian <martin.christian@xxxxxxxxxxx>
- Re: Linux kernel 2.6.32 from Debian Squeeze and Xen: SELinux seems to hang around 10 minutes during boot
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: context of files not adapted to new directory when moved (was: htpasswd file outside of standard Apache location)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: v3 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- context of files not adapted to new directory when moved (was: htpasswd file outside of standard Apache location)
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: htpasswd file outside of standard Apache location
- From: Dominick Grift <domg472@xxxxxxxxx>
- htpasswd file outside of standard Apache location
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: v3 Add role attribute support to libsepol
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Linux kernel 2.6.32 from Debian Squeeze and Xen: SELinux seems to hang around 10 minutes during boot
- From: Paul Menzel <paulepanter@xxxxxxxxxxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- RE: v3 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- v3 Add role attribute support to libsepol
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 5/6] Add role attribute support when expanding role_set_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 1/6] Add role attribute support when compiling modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 4/6] Add role attribute support when expanding role_datum_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 6/6] Support adding one role attribute into another.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 2/6] Add role attribute support when generating pp files.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v3 PATCH 3/6] Add role attribute support when linking modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: login process unable to execute /bin/sh
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- login process unable to execute /bin/sh
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- RE: [v2 PATCH 1/6] Add role attribute support when compiling modules.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Wrong context for user
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [v2 PATCH 1/6] Add role attribute support when compiling modules.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Wrong context for user
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong context for user
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Wrong context for user
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Missing configure script and instructions?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Missing configure script and instructions?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Missing configure script and instructions?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Missing configure script and instructions?
- From: David Doria <daviddoria@xxxxxxxxx>
- Re: Missing configure script and instructions?
- From: David Doria <daviddoria@xxxxxxxxx>
- Re: Missing configure script and instructions?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Missing configure script and instructions?
- From: David Doria <daviddoria@xxxxxxxxx>
- Re: Patch for python3 for libselinux
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: /etc/selinux/$P/users/local.users and system.users are they deprecated?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: /etc/selinux/$P/users/local.users and system.users are they deprecated?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: /etc/selinux/$P/users/local.users and system.users are they deprecated?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: /etc/selinux/$P/users/local.users and system.users are they deprecated?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /etc/selinux/$P/users/local.users and system.users are they deprecated?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- [GIT PULL] SELinux: for 3.0
- From: Eric Paris <eparis@xxxxxxxxxx>
- Updated libselinux man pages
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Why user/type/role identifiers duplicated to a block/decl's symtab?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Justin Ethier <justin.ethier@xxxxxxxxx>
- Re: SELinux Common Intermediate Language Update
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux Common Intermediate Language Update
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- I wrote up an semanage bash command completion script.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This is a patch to allow libsemanage to handle an alternate root.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Is there way to set some specific domain to have all permissions?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Why user/type/role identifiers duplicated to a block/decl's symtab?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Is there way to set some specific domain to have all permissions?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Is there way to set some specific domain to have all permissions?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Is there way to set some specific domain to have all permissions?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Is there way to set some specific domain to have all permissions?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Can we eliminate or optimize nodups_specs within libselinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Can we eliminate or optimize nodups_specs within libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Can we eliminate or optimize nodups_specs within libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [v2 PATCH 6/6] Support adding one role attribute into another.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v2 PATCH 6/6] Support adding one role attribute into another
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 3/6] Add role attribute support when linking modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/6] Add role attribute support when generating pp files.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 5/6] Add role attribute support when expanding role_set_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 6/6] Support adding one role attribute into another
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 4/6] Add role attribute support when expanding role_datum_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/6] Add role attribute support when compiling modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v1 PATCH 1/6] Add role attribute support when compiling modules.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v1 PATCH 1/6] Add role attribute support when compiling modules.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: v1 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: v1 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: v0 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v1 PATCH 4/6] Add role attribute support when expanding role_datum_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/6] Add role attribute support when compiling modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/6] Add role attribute support when generating pp files.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v1 Add role attribute support to libsepol
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/6] Add role attribute support when linking modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 5/6] Add role attribute support when expanding role_set_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: Regarding SELinux User mapping
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Regarding SELinux User mapping
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: v0 Add role attribute support to libsepol
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: v0 Add role attribute support to libsepol
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: v0 Add role attribute support to libsepol
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Regarding SELinux User mapping
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- Re: Regarding SELinux User mapping
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Regarding SELinux User mapping
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Regarding SELinux User mapping
- From: "c.r.madhusudhanan@xxxxxxxxx" <c.r.madhusudhanan@xxxxxxxxx>
- RE: [PATCH 1/1] Fix arguments when expanding user_datum_t.roles
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: v0 Add role attribute support to libsepol
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v0 PATCH 1/5] Add role attribute support when compiling modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/5] Add role attribute support when generating pp files.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 4/5] Add role attribute support when expanding role_datum_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 5/5] Add role attribute support when expanding role_set_t.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Add role attribute support to libsepol
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/5] Add role attribute support when linking modules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [PATCH] cgroupfs: use init_cred when populating new cgroupfs mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] cgroupfs: use init_cred when populating new cgroupfs mount
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [Rhel6-cc-external-list] mounting cgroupfs causes directory search before sb initialization
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: mounting cgroupfs causes directory search before sb initialization
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- mounting cgroupfs causes directory search before sb initialization
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux: Fix arguments when expanding user_datum_t.roles
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] Fix arguments when expanding user_datum_t.roles
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v0 PATCH 0/2] Review request for reorganizing the role transition rule
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Is it possible to assign different labels to symbolic links and actual files?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Is it possible to assign different labels to symbolic links and actual files?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [git] pull selinux tree for 2.6.40
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [v0 PATCH 0/2] Review request for reorganizing the role transition rule
- From: Eric Paris <eparis@xxxxxxxxxx>
- [v0 PATCH 2/2] SELinux: Modify the searching of the role transition rule
- From: <rongqing.li@xxxxxxxxxxxxx>
- [v0 PATCH 1/2] SELinux: Reorganize the role transition rule
- From: <rongqing.li@xxxxxxxxxxxxx>
- [v0 PATCH 0/2] Review request for reorganizing the role transition rule
- From: <rongqing.li@xxxxxxxxxxxxx>
- [git] pull selinux tree for 2.6.40
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: A few questions about module compile/link source code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: A few questions about module compile/link source code
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: selinux_inode_init_security() initialises XATTR_SELINUX_SUFFIX and not XATTR_NAME_SELINUX?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v0 PATCH 1/1] SELinux: skip file_name_trans_write() when policy downgraded.
- From: <rongqing.li@xxxxxxxxxxxxx>
- [v0 PATCH 0/1] Review request for skipping file_name_trans_write() when policy downgraded
- From: <rongqing.li@xxxxxxxxxxxxx>
- Re: A few questions about module compile/link source code
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- selinux_inode_init_security() initialises XATTR_SELINUX_SUFFIX and not XATTR_NAME_SELINUX?
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Patch Review Process
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] Checkpolicy: Allow filesystem names to start with a digit
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch Review Process
- From: Greg Smith <greg@xxxxxxxxxxxxxxx>
- RE: Patch Review Process
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: Patch Review Process
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: FUSE and SELinux labeling
- From: Dominick Grift <domg472@xxxxxxxxx>
- FUSE and SELinux labeling
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: Patch Review Process
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- RE: Patch Review Process
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- Re: Patch Review Process - Missing patch for selinux_set_mapping
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] selinux tree for linus
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- A few questions about module compile/link source code
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I believe you will need this patch also to build reference policy.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [2/2] libselinux: fix case of names with whitespace/multibytes on /selinux/create
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- [1/2] selinux: fix case of names with whitespace/multibytes on /selinux/create
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxxxx>
- [PATCH] SELinux: Fix an RCU dereference warning in selinux_setprocattr()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2]: setfiles should provide an option to avoid abortion on a missing file
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 2/2 v2]: improve the manual page for setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/2 v2]: clean-up setfiles source code and document two options
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/2 v2]: minor improvements and clean-ups for policycoreutils/setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: alternative configuration file support for sestatus
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Patch Review Process
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH v2] policycoreutils: alternative configuration file support for sestatus
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Patch Review Process
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Patch Review Process
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Patch Review Process
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux mountpoint changing patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libselinux mountpoint changing patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: This is the current libsepol-patch after the update.
- From: Eric Paris <eparis@xxxxxxxxxx>
- This is the current libsepol-patch after the update.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I believe you will need this patch also to build reference policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [GIT PULL REQUEST] selinux tree for linus
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v2] flex_arrays: allow zero length flex arrays
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH -v2] flex_arrays: allow zero length flex arrays
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs
- From: Greg KH <greg@xxxxxxxxx>
- Re: Now that we have an updated libsepol lets get the checkpolicy patch to match in.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Checkpolicy patch to allow version of single digit.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: use #define for dismod selections
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: xattr support in cgroupfs
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: xattr support in cgroupfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: xattr support in cgroupfs
- From: Matthew Ife <deleriux@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: xattr support in cgroupfs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- xattr support in cgroupfs
- From: Matthew Ife <deleriux@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] policy module for atop
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Is there difference betweek sefiles and restorecon in terms of labels
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC][PATCH 3/4] eCryptfs: override prepared credentials
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 0/4] eCryptfs credentials patches
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 2/4] eCryptfs: introduce per-filesystem credentials
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 4/4] eCryptfs: added ima_file_check() call to ecryptfs_init_lower_file()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/4] fs: preserve S_IMA inode flag in fsstack_copy_attr_all()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [PATCH] SELinux: introduce path_has_perm
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2] flex_arrays: allow zero length flex arrays
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: pass last path component in may_create
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] policy module for atop
- From: Dominick Grift <domg472@xxxxxxxxx>
- [PATCH] policy module for atop
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: [RFC][PATCH 7/7] ima: added new LSM conditions in the policy
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 7/7] ima: added new LSM conditions in the policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] policy module for atop
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- [PATCH] Delete redundant role system_r assignments after init_daemon_domain
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 6/7] security: new LSM hook security_file_getsecid()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 4/7] smack: fix label check in smack_kernel_act_as()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 3/7] smack: assign the label set in file->f_cred to new file descriptors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] SELinux: skip filename trans rules if ttype does not match parent dir
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/6] SELinux: skip filename trans rules if ttype does not match parent dir
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] SELinux: generic hashtab entry counter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 4/6] SELinux: calculate and print hashtab stats with a generic function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH 6/7] security: new LSM hook security_file_getsecid()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] SELinux: skip filename trans rules if ttype does not match parent dir
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/6] SELinux: rename filename_compute_type argument to *type instead of *con
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH 5/7] smack: import the security label in smack_secctx_to_secid()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Is there difference betweek sefiles and restorecon in terms of labels
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Is there difference betweek sefiles and restorecon in terms of labels
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/7] smack: assign the label set in file->f_cred to new file descriptors
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/7] smack: fix label check in smack_kernel_act_as()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Is there difference betweek sefiles and restorecon in terms of labels
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] File descriptor labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] fix description of init_system_domain in init.if
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] fix description of init_system_domain in init.if
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- [RFC][PATCH 7/7] ima: added new LSM conditions in the policy
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/7] fs: initialize file->f_cred with credentials provided
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 4/7] smack: fix label check in smack_kernel_act_as()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 2/7] selinux: label new file descriptors using file->f_cred
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 5/7] smack: import the security label in smack_secctx_to_secid()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 3/7] smack: assign the label set in file->f_cred to new file descriptors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 6/7] security: new LSM hook security_file_getsecid()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 0/7] File descriptor labeling
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH 2/3] flex_arrays: allow zero length flex arrays
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] flex_array: flex_array_prealloc takes a number of elements, not an end
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/6] SELinux: fix comment to state filename_compute_type takes an objname not a qstr
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/6] SELinux: skip filename trans rules if ttype does not match parent dir
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/6] SELinux: rename filename_compute_type argument to *type instead of *con
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/6] SELinux: generic hashtab entry counter
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/6] SELinux: calculate and print hashtab stats with a generic function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/6] SELinux: put name based create rules in a hashtable
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] flex_arrays: allow zero length flex arrays
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] flex_array: flex_array_prealloc takes a number of elements, not an end
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] flex_array: allow 0 length elements
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELINUX: Make selinux cache VFS RCU walks safe
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Help with toolchain
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: suspicious rcu_dereference_check in security/selinux/netnode.c
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/9] LSM: Permit commit_creds() to take a const pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/9] Open loaders and interpreters with new creds during exec
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/9] LSM: Make the linux_binfmt creds pointer const and pass creds to bprm_set_creds
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/9] LSM: Install the new credentials earlier in the exec procedure
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/9] TOMOYO: Fix tomoyo_dentry_open() to use the right creds
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 9/9] LSM: Use derived creds for accessing an executable's interpreter and binary loader
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/9] LSM: Pass linux_binprm pointer to kernel_read() so creds are available
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 7/9] LSM: Allow an LSM to indicate that it wants bprm->file reopening with new creds
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/9] TOMOYO: Derive the new domain for an exec'd process in tomoyo_bprm_set_creds()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: security_read_policy should take a size_t not ssize_t
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: silence build warning when !CONFIG_BUG
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: suspicious rcu_dereference_check in security/selinux/netnode.c
- From: Paul Moore <paul.moore@xxxxxx>
- Re: suspicious rcu_dereference_check in security/selinux/netnode.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: security_read_policy should take a size_t not ssize_t
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] SELinux: silence build warning when !CONFIG_BUG
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: This patch adds a new subs_dist file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/1] selabel_open fix processing of substitution files (update)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: This patch adds a new subs_dist file.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Writing SEPostGreSQL Database Policies
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Writing SEPostGreSQL Database Policies
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Now that we have an updated libsepol lets get the checkpolicy patch to match in.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Generating policy for embedded platforms.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Generating policy for embedded platforms.
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: Generating policy for embedded platforms.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Generating policy for embedded platforms.
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Now that we have an updated libsepol lets get the checkpolicy patch to match in.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: add support for filenametrans rule
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: Here is an updated Eric Paris patch for adding named file trans rules.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH] libsepol: support policy modules when roletrans rules not supported
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Here is an updated Eric Paris patch for adding named file trans rules.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: Only write role trans classes if policy version supports it
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] libsepol: add support for filenametrans rule
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] libsepol: Only write role trans classes if policy version supports it
- From: Eric Paris <eparis@xxxxxxxxxx>
- Here is an updated Eric Paris patch for adding named file trans rules.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v2 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [v2 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds a new subs_dist file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch cleans up a couple of crashes caused by libselinux
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: This patch adds a new subs_dist file.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Resend: This patch causes the mount points created in load_policy to have a proper name
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: v2 Add class support to the role_transition rule
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 1/1] Add libselinux man pages for colour functions
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 1/1] mcstransd select correct colour range.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: SELinux mixed/virtualisation policy
- From: <chanson@xxxxxxxxxxxxx>
- Re: Named TYPE_TRANSITION and userspace AVC
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux mixed/virtualisation policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] mcstransd select correct colour range.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] Add libselinux man pages for colour functions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- SELinux mixed/virtualisation policy
- From: Ramon de Carvalho Valle <rcvalle@xxxxxxxxxxxxxxxxxx>
- Re: [Rhel6-cc-external-list] Processes executing as qemu_t SELinux type are not allowed to access vhost_device_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: [PATCH 1/1] Initialize policydb.process_class eariler.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- [PATCH] Permit fixfiles to skip configurable directory from relabelling
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- [PATCH 1/1] Initialize policydb.process_class eariler.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- SELinux: Initialize process_class earlier
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v2 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: [v2 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Eric Paris <eparis@xxxxxxxxxx>
- Resend: This patch causes the mount points created in load_policy to have a proper name
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch causes the mount points created in load_policy to have a proper name
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch adds a new subs_dist file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch cleans up a couple of crashes caused by libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Minor query on selabel_x(5) man page
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [ANN] Linux Security Summit 2011 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Named TYPE_TRANSITION and userspace AVC
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] selinux: add type_transition with name extension support for selinuxfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fwknop, fwknopd, fwknop_serv
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: fwknop, fwknopd, fwknop_serv
- From: Dominick Grift <domg472@xxxxxxxxx>
- fwknop, fwknopd, fwknop_serv
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- RE: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [PATCH] libselinux: fix a noise in manpage
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [PATCH] libselinux: add security_compute_create_name() API
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [PATCH] selinux: add type_transition with name extension support for selinuxfs
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re: How to make restorecon/matchpathcon recognize role_transition rule for non-process classes?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to make restorecon/matchpathcon recognize role_transition rule for non-process classes?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [PATCH 1/1] mapping fix for invalid class/perms after selinux_set_mapping call
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- RE: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v2 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] libsepol: add support for filenametrans rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] checkpolicy: add support for using last path component in type transition rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] checkpolicy: use #define for dismod selections
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re:Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: Fix regression for Xorg
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Fix regression for Xorg
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re:Re: Re:Re: Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- [v2 PATCH 3/5] Userspace: handle the class field in role_trans struct
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/5] Userspace: add class to role_trans & role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 4/5] Userspace: handle the class in role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/5] Userspace: role_transition parser to handle class field
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v2 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v1 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/5] Userspace: add class to role_trans & role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/5] Userspace: handle the class in role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v1 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/5] Userspace: role_transition parser to handle class field
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/5] Userspace: handle the class field in role_trans struct
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Re:Re: Re:Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: v0 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 4/5] Handle the class in role_trans_rule structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/5] Add class to role_trans & role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 5/5] Display the class in role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re:Re: Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- Re: [PATCH] selinux: select correct default LSM_MMAP_MIN_ADDR on ARM.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Re:Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Re:Re: about ss
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- [PATCH] policycoreutils: alternative configuration file support for sestatus
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] selabel_open fix for processing the substitution file
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- about ss
- From: Yao <yffbrave@xxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: I have been asked for a use case that says I want to allow X domain to only be able to use eth1.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I have been asked for a use case that says I want to allow X domain to only be able to use eth1.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH] selinux: select correct default LSM_MMAP_MIN_ADDR on ARM.
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Files and dirs objects could retain user role.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [v2] [SELinux] Discussions about rbacsep
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2] [SELinux] Discussions about rbacsep
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [v2] [SELinux] Discussions about rbacsep
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v2] [SELinux] Discussions about rbacsep
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/2] role_transition for newly created files or dirs.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/2] Auto-generate security_is_filedir_class().
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] Files and dirs objects could retain user role.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 2/2] Consider role_transition for newly created files or dirs.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 2/2] Consider role_transition for newly created files or dirs.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/2] Auto-generate security_is_filedir_class().
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] file_type objects retain user role.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Discussions about rbacsep
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: Russell Coker <russell@xxxxxxxxxxxx>
- libselinux version bump past 99
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Flask Policy Parser (FPP) support to convert Refpolicy to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: James Morris <jmorris@xxxxxxxxx>
- RE: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [GIT PULL] selinux for 2.6.39
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Further questions about configuring contexts differently for variant classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Further questions about configuring contexts differently for variant classes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Further questions about configuring contexts differently for variant classes
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Jingkang Zhou <yoyocubeyo@xxxxxxxxx>
- Need Help Compiling Reference Policy on Mobile Device
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- RE: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Eric Paris <eparis@xxxxxxxxxx>
- Sorry about cross posting to multiple lists.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]