SELinux - Date Index
[Prev Page][Next Page]
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Suppress avc denial logs
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Suppress avc denial logs
- From: Avijit Das <avijitnsec@xxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pcre compiled context files invalid with pcre updates?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: pcre compiled context files invalid with pcre updates?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libselinux 2.3 incompatibility
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: pcre compiled context files invalid with pcre updates?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: pcre compiled context files invalid with pcre updates?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- pcre compiled context files invalid with pcre updates?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux with overlayfs between squashfs and jffs2
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: SELinux with overlayfs between squashfs and jffs2
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- SELinux with overlayfs between squashfs and jffs2
- From: Antoine MOISE <antoine.moise@xxxxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- ANN: SETools 4 open-sourced
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- genhomedircon support for groups
- From: Cretu Adrian <adycrt@xxxxxxxxx>
- Re: What's a 'permission map'?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: What's a 'permission map'?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- What's a 'permission map'?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC PATCH] selinux: reduce the number of calls to synchronize_net() when flushing caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Listing restrictions on roles.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] LSM: Generalize existing module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: reduce the number of calls to synchronize_net() when flushing caches
- From: Jaejyn Shin <flagon22bass@xxxxxxxxx>
- Re: secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Listing restrictions on roles.
- From: dE <de.techno@xxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- secilc: is anyone able to confirm that type_change ...
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Enforcing default_user, default_role, default_type, default_range
- From: dE <de.techno@xxxxxxxxx>
- Re: Enforcing default_user, default_role, default_type, default_range
- From: dE <de.techno@xxxxxxxxx>
- Re: Enforcing default_user, default_role, default_type, default_range
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Enforcing default_user, default_role, default_type, default_range
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Enforcing default_user, default_role, default_type, default_range
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Listing restrictions on roles.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Enforcing default_user, default_role, default_type, default_range
- From: dE <de.techno@xxxxxxxxx>
- Re: semanage commit forces CPU to 100%
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: semanage commit forces CPU to 100%
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- semanage commit forces CPU to 100%
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Listing restrictions on roles.
- From: dE <de.techno@xxxxxxxxx>
- Re: Weird un-audited denial on tmp_t
- From: dE <de.techno@xxxxxxxxx>
- semanage commit forces CPU to 100%
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- libselinux-2.0.94-2.el6.i686 issue
- From: Sebastian Brestin <sebastianbrestin@xxxxxxxxx>
- Re: Where's the class defined in file_contexts*
- From: dE <de.techno@xxxxxxxxx>
- Re: Where's the class defined in file_contexts*
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Where's the class defined in file_contexts*
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Where's the class defined in file_contexts*
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Where's the class defined in file_contexts*
- From: dE <de.techno@xxxxxxxxx>
- [RFC PATCH] selinux: reduce the number of calls to synchronize_net() when flushing caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux Userspace moved to GitHub
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] Add db_exception and db_datatype support to label_db backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Jaejyn Shin <flagon22bass@xxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Fwd: Booting time is increased after applying kernel 3.10
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Booting time is increased after applying kernel 3.10
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH] Add db_exception and db_datatype support to label_db backend
- From: Artyom Smirnov <artyom.smirnov@xxxxxxxxxxxx>
- strange AVC message
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 0/2] Bug fixes for libsemanage/src/pywrap-test.py
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Different authentication with different user roles
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Different authentication with different user roles
- From: Krzysztof Katowicz-Kowalewski <vnd@xxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: simple cleanup for cond_read_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: simple cleanup for cond_read_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: simple cleanup for cond_read_node()
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH] selinux: introduce str_read() helper
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix a possible memory leak in cond_read_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: simple cleanup for cond_read_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Deprecating policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: use ARRAY_SIZE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: use ARRAY_SIZE
- From: Himangi Saraogi <himangi774@xxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for exec transitions under NO_NEW_PRIVS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: introduce str_read() helper
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH 2/2] selinux: fix a possible memory leak in cond_read_node()
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH 1/2] selinux: simple cleanup for cond_read_node()
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH 2/2] libsemanage: use semanage_bool_get_value to print a boolean
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsemanage: fix src/pywrap-test.py -v -F
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/2] Bug fixes for libsemanage/src/pywrap-test.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [refpolicy] ANN: Reference Policy moved to GitHub
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [refpolicy] ANN: Reference Policy moved to GitHub
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: ANN: Reference Policy moved to GitHub
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v2] selinux: Permit exec transitions under NO_NEW_PRIVS or NOSUID under certain circumstances.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Permit transitions under NO_NEW_PRIVS or NOSUID under certain, circumstances.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH] selinux: Permit transitions under NO_NEW_PRIVS or NOSUID under certain, circumstances.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SETools patch for libselinux-2.3
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SETools patch for libselinux-2.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: SETools patch for libselinux-2.3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Default context with context mount option.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Default context with context mount option.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: Default context with context mount option.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Default context with context mount option.
- From: David Caplan <dac@xxxxxxxxxx>
- Re: Default context with context mount option.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: SETools patch for libselinux-2.3
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Deprecating policy capabilities
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: SETools moved to GitHub
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ANN: Reference Policy moved to GitHub
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Default context with context mount option.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RBAC along with MLS?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- Re: Default context with context mount option.
- From: Christian Evans <Frodox@xxxxxxxx>
- Default context with context mount option.
- From: dE <de.techno@xxxxxxxxx>
- RBAC along with MLS?
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Masahiro Yamada <yamada.m@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Masahiro Yamada <yamada.m@xxxxxxxxxxxxxxxx>
- Re: How does matchpathcon/setfiles work?
- From: dE <de.techno@xxxxxxxxx>
- Re: How does matchpathcon/setfiles work?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How does matchpathcon/setfiles work?
- From: dE <de.techno@xxxxxxxxx>
- Re: How does matchpathcon/setfiles work?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- How does matchpathcon/setfiles work?
- From: dE <de.techno@xxxxxxxxx>
- Re: [refpolicy] user_t more restrictive than sshd_t (e.g.)?
- From: dE <de.techno@xxxxxxxxx>
- SETools patch for libselinux-2.3
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: attempting to run a sftpserver in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- attempting to run a sftpserver in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: change selinux user's roles
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: change selinux user's roles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: change selinux user's roles
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: change selinux user's roles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- change selinux user's roles
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: AVCs errors generated when CLI comands executed
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: user_t more restrictive than sshd_t (e.g.)?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The use of fscontext(iso9660_t)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- AVCs errors generated when CLI comands executed
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: user_t more restrictive than sshd_t (e.g.)?
- From: dE <de.techno@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.16
- From: James Morris <jmorris@xxxxxxxxx>
- The use of fscontext(iso9660_t)
- From: dE <de.techno@xxxxxxxxx>
- secilc: issues with policy compiled by secilc
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: dE <de.techno@xxxxxxxxx>
- Re: SAMBA WITH SELINUX
- From: dE <de.techno@xxxxxxxxx>
- Re: SAMBA WITH SELINUX
- From: dE <de.techno@xxxxxxxxx>
- SAMBA WITH SELINUX
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- [PATCH] libselinux: fix typo in man page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: dE <de.techno@xxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- user_t more restrictive than sshd_t (e.g.)?
- From: dE <de.techno@xxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: dE <de.techno@xxxxxxxxx>
- Re: secilc CIL Reference Guide patches
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- secilc CIL Reference Guide patches
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.16
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: dE <de.techno@xxxxxxxxx>
- Re: secilc: classmappings do not work
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: secilc: classmappings do not work
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: secilc: in statement ordering limitations
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: secilc: classmappings do not work
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- secilc: in statement ordering limitations
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: classmappings do not work
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: secilc: classmappings do not work
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux:cleanup redundant code in selinux_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Significance of SELinux user and roles on objects.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Significance of SELinux user and roles on objects.
- From: dE <de.techno@xxxxxxxxx>
- Re: How does SELinux work without roles?
- From: dE <de.techno@xxxxxxxxx>
- Re: How does SELinux work without roles?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- system_u process does not have system_r
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH (for 3.15) 5/5] LSM: Remove duplicated rename handling.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH (for 3.15) 3/5] AppArmor: Handle the rename flags.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH (for 3.15) 1/5] LSM: Pass the rename flags to each LSM module.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- How does SELinux work without roles?
- From: dE <de.techno@xxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: dE <de.techno@xxxxxxxxx>
- semanage: TypeError: cannot concatenate 'str' and 'NoneType' objects
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: create new roles for user
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: create new roles for user
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- create new roles for user
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: secilc: classmappings do not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: secilc: classmappings do not work
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: secilc: classmappings do not work
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- secilc: classmappings do not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Single init script for multiple daemons
- From: Mladen Sekara <dev@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Single init script for multiple daemons
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Single init script for multiple daemons
- From: Mladen Sekara <dev@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Single init script for multiple daemons
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Single init script for multiple daemons
- From: Mladen Sekara <dev@xxxxxxxxxx>
- [RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: dE <de.techno@xxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH] selinux_init_load_policy: setenforce(0) if security_disable() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patches from Fedora on the sandbox package.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Presidency of user/role/type permissions.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Presidency of user/role/type permissions.
- From: dE <de.techno@xxxxxxxxx>
- [PATCH (for 3.15) 5/5] LSM: Remove duplicated rename handling.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH (for 3.15) 4/5] TOMOYO: Handle the rename flags.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH (for 3.15) 1/5] LSM: Pass the rename flags to each LSM module.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH (for 3.15) 3/5] AppArmor: Handle the rename flags.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH (for 3.15) 0/5] Fix cross rename regressions for LSM.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH (for 3.15) 2/5] SELinux: Handle the rename flags.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH (for 3.15) 0/5] Fix cross rename race window for LSM.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] seunshare: Try to use setcurrent before setexec
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 3/4] Remove handling of cgroups from sandbox
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 2/4] Update XDG_RUNTIME_DIR directory
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Patches from Fedora on the sandbox package.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Refactor installation of policies and modules
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Refactor installation of policies and modules
- From: Victor Porton <porton@xxxxxxxx>
- Re: svirt & labeled network
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: sshd and default security context.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- svirt & labeled network
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: sshd and default security context.
- From: dE <de.techno@xxxxxxxxx>
- Re: selinux and static label for sVirt
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: selinux and static label for sVirt
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- selinux and static label for sVirt
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: [PATCH 1/1] add module for the entropy key daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sshd and default security context.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] add module for the entropy key daemon
- From: Petre Rodan <petre.rodan@xxxxxxxxxx>
- [PATCH 1/1] add ekeyd related rules
- From: Petre Rodan <petre.rodan@xxxxxxxxxx>
- sshd and default security context.
- From: dE <de.techno@xxxxxxxxx>
- Re: staff_u permission
- From: Steve Huston <huston@xxxxxxxxxxxxxxxxxxx>
- Re: PAM modules ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: PAM modules ordering
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [ANN] SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PAM modules ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- RE: No AVCs written to /var/log/messages
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: No AVCs written to /var/log/messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: No AVCs written to /var/log/messages
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- No AVCs written to /var/log/messages
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: How does policy loading work at bootup?
- From: dE <de.techno@xxxxxxxxx>
- Re: How does policy loading work at bootup?
- From: dE <de.techno@xxxxxxxxx>
- Re: What's a module exactly?
- From: dE <de.techno@xxxxxxxxx>
- Re: staff_u permission
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- staff_u permission
- From: Steve Huston <huston@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH (for 3.15) 0/5] Fix cross rename race window for LSM.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: How does policy loading work at bootup?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: What's a module exactly?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- What's a module exactly?
- From: dE <de.techno@xxxxxxxxx>
- How does policy loading work at bootup?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: What's a policy configuration file?
- From: dE <de.techno@xxxxxxxxx>
- Re: What's a policy configuration file?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: What's a policy configuration file?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: What's a policy configuration file?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: What's a policy configuration file?
- From: dE <de.techno@xxxxxxxxx>
- Re: AVC cache size unit?
- From: dE <de.techno@xxxxxxxxx>
- Re: What's a policy configuration file?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: AVC cache size unit?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- What's a policy configuration file?
- From: dE <de.techno@xxxxxxxxx>
- Re: AVC cache size unit?
- From: dE <de.techno@xxxxxxxxx>
- Re: AVC cache size unit?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] Source Policy, CIL, and High Level Languages
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- tycho.nsa.gov mailing list memberships reminder
- From: mailman-owner@xxxxxxxxxxxxx
- AVC cache size unit?
- From: dE <de.techno@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] selinux_init_load_policy: setenforce(0) if security_disable() fails
- From: Will Woods <wwoods@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] selinux_init_load_policy: setenforce(0) if security_disable() fails
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Report result in avc messages
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [RFC][PATCH] selinux: Report result in avc messages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: selinux_check_access() and unknown classes/perms
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- selinux_check_access() and unknown classes/perms
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- SELINUX=disabled vs. "enforce=1"
- From: Will Woods <wwoods@xxxxxxxxxx>
- [PATCH] selinux_init_load_policy: setenforce(0) if security_disable() fails
- From: Will Woods <wwoods@xxxxxxxxxx>
- [RFC] Source Policy, CIL, and High Level Languages
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] setools: Update to load v29 policy source files.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: No chance of using SELinux on rootfs without security namespace?
- From: dE <de.techno@xxxxxxxxx>
- Re: No chance of using SELinux on rootfs without security namespace?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- No chance of using SELinux on rootfs without security namespace?
- From: dE <de.techno@xxxxxxxxx>
- fpp/cilpolicy potential bug
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Cannot enable selinux.
- From: dE <de.techno@xxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: dE <de.techno@xxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH] setools: Update to load v29 policy source files.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] setools: Update to load v29 policy source files.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 6/6][v2] audit: send multicast messages only if there are listeners
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 5/6][v2] audit: add netlink multicast group for log read
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 4/6][v2] audit: add netlink audit protocol bind to check capabilities on multicast join
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 2/6][v2] netlink: have netlink per-protocol bind function return an error code.
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 3/6][v2] netlink: implement unbind to netlink_setsockopt NETLINK_DROP_MEMBERSHIP
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 1/6][v2] netlink: simplify nfnetlink_bind
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 2/6] netlink: have netlink per-protocol bind function return an error code.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/6] netlink: have netlink per-protocol bind function return an error code.
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 0/6][v2] audit: implement multicast socket for journald
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [secilc] typeattributeset with "and" expression does not work
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [secilc] typeattributeset with "and" expression does not work
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Cannot enable selinux.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Cannot enable selinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Cannot enable selinux.
- From: dE <de.techno@xxxxxxxxx>
- Re: In case you do not follow me on Twitter @rhatdan
- From: dE <de.techno@xxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: dE <de.techno@xxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: dE <de.techno@xxxxxxxxx>
- Re: Allowing access other then permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing access other then permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- In case you do not follow me on Twitter @rhatdan
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Unreadable or missing xattr security.selinux on jffs2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Unreadable or missing xattr security.selinux on jffs2
- From: jkmeinde@xxxxxxxxxxxxxxxxxxx
- Re: Allowing access other then permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: LIbselinux: Correctness of context decision, how its made?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Unreadable or missing xattr security.selinux on jffs2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Unreadable or missing xattr security.selinux on jffs2
- From: Judd Meinders <judd.meinders@xxxxxxxxxxxxxxxxxxx>
- Re: Why is SELINUXTYPE policy specific?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Why is SELINUXTYPE policy specific?
- From: dE <de.techno@xxxxxxxxx>
- Allowing access other then permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: selinux_init_load_policy() and systemd switch-root
- From: Will Woods <wwoods@xxxxxxxxxx>
- LIbselinux: Correctness of context decision, how its made?
- From: Rastislav Hepner <rastislav.hepner@xxxxxxxxx>
- Unreadable or missing xattr security.selinux on jffs2
- From: jkmeinde@xxxxxxxxxxxxxxxxxxx
- [PATCH 6/6] audit: send multicast messages only if there are listeners
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 5/6] audit: add netlink multicast group for log read
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 3/6] netlink: implement unbind to netlink_setsockopt NETLINK_DROP_MEMBERSHIP
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 4/6] audit: add netlink audit protocol bind to check capabilities on multicast join
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 2/6] netlink: have netlink per-protocol bind function return an error code.
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 0/6] audit: implement multicast socket for journald
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH 1/6] netlink: simplify nfnetlink_bind
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Transition domain in SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Transition domain in SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_init_load_policy() and systemd switch-root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_init_load_policy() and systemd switch-root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Transition domain in SELinux
- From: toản cù <xuantoanbkfet@xxxxxxxxx>
- Re: [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- selinux_init_load_policy() and systemd switch-root
- From: Will Woods <wwoods@xxxxxxxxxx>
- RE: Regarding call security_compute_av()
- From: Bo Chen <bochen7e7@xxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Regarding call security_compute_av()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Regarding call security_compute_av()
- From: Kernel Geek <kernelfreak@xxxxxxxxx>
- [PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files
- From: Masahiro Yamada <yamada.m@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- 2.3-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setools: Update to load v29 policy source files.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] setools: Update to load v29 policy source files.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: /data used as two filesystem mountpoint,then seandroid how to lable file secontext?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /data used as two filesystem mountpoint,then seandroid how to lable file secontext?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- /data used as two filesystem mountpoint,then seandroid how to lable file secontext?
- From: ge <geshifei@xxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Security server responses always based on class?
- From: dE <de.techno@xxxxxxxxx>
- Re: Security server responses always based on class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security server responses always based on class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security server responses always based on class?
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: The purpose of SID.
- From: dE <de.techno@xxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/4] APOL Enhancements to support additional policy features
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 4/4] setools: APOL Add default_objects and CIL policy namespaces tabs
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 3/4] setools: APOL Add type, user, role bounds support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/4] setools: APOL Add constraints and filename transition support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/4] setools: APOL Add support for permissive types, polcaps, handle_unknown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/4] APOL Enhancements to support additional policy features
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: The purpose of SID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The purpose of SID.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The purpose of SID.
- From: dE <de.techno@xxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: dE <de.techno@xxxxxxxxx>
- files in /root labeled admin_home_t
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- What do you mean by a 'domain'.
- From: dE <de.techno@xxxxxxxxx>
- Re: SELinux Coloring Book will be at the Red Hat Summit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux Coloring Book will be at the Red Hat Summit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Plz ask for help :)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SSSD on a read-only filesystem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Plz ask for help :)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- tycho.nsa.gov mailing list memberships reminder
- From: mailman-owner@xxxxxxxxxxxxx
- SSSD on a read-only filesystem
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- [PATCH] libsemanage: fix memory leak in semanage_genhomedircon
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- Re: SELinux policy updates in a post-%post world
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: SELinux policy updates in a post-%post world
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux policy updates in a post-%post world
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Joe Nall <joe@xxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- What should the context of ICMP packets be on a ranged network interface be?
- From: Joe Nall <joe@xxxxxxxx>
- Re: The sepol_set_policydb method - to be used or not?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The sepol_set_policydb method - to be used or not?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: How to restore a policy module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: How to restore a policy module
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: How to restore a policy module
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: How to restore a policy module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to restore a policy module
- From: Ilya Frolov <ilya.a.frolov@xxxxxxxxx>
- Re: How to restore a policy module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to restore a policy module
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux design and Domain Name resolution
- From: Joe Nall <joe@xxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- RE: SELinux design and Domain Name resolution
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux design and Domain Name resolution
- From: Joe Nall <joe@xxxxxxxx>
- SELinux design and Domain Name resolution
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V3] ss: Add support for retrieving SELinux contexts
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- [PATCH V3] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: sshd and setcurrent
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Re: sshd and setcurrent
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- sshd and setcurrent
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- OSTree <3 SELinux
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Bryan Harris <bryanlharris@xxxxxx>
- What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: [PATCH V2] ss: Add support for retrieving SELinux contexts
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 5/8] security: selinux: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 5/8] security: selinux: Use a more current logging style
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 5/8] security: selinux: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 0/8] security: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: doesnt work MLS in ssh X-forwarding on the client's X windows
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- doesnt work MLS in ssh X-forwarding on the client's X windows
- From: work3231 work3231 <work3231@xxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- [PATCH V2] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.14-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: bigendian problems with filename trans rules
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] SELinux: bigendian problems with filename trans rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] [PATCH] load_policy: Log errors using selinux_log
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: bigendian problems with filename trans rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- [RFC] [PATCH] load_policy: Log errors using selinux_log
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] Get rid of security_context_t and fix const declarations.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Get rid of security_context_t and fix const declarations.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] Get rid of security_context_t and fix const declarations.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] ss: Add support for retrieving SELinux contexts
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Using genfscon's partial_path for other filesystems than proc
- From: Luis Ressel <aranea@xxxxxxxx>
- [PATCH] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- This past week I was doing a demo of how to build an Userspace Object Manager for firewalld
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: how to change the context of running process
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.14-rc1
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: SELinux question..
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux question..
- From: Victor Porton <porton@xxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Per Nystrom <pnystrom@xxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Brian Behlendorf <behlendorf1@xxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]