SELinux - Date Index
[Prev Page][Next Page]
- files in /root labeled admin_home_t
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What do you mean by a 'domain'.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- What do you mean by a 'domain'.
- From: dE <de.techno@xxxxxxxxx>
- Re: SELinux Coloring Book will be at the Red Hat Summit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux Coloring Book will be at the Red Hat Summit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Labelling problems with a user directly running an application in a confined domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Labelling problems with a user directly running an application in a confined domain
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: Plz ask for help :)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SSSD on a read-only filesystem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Plz ask for help :)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- tycho.nsa.gov mailing list memberships reminder
- From: mailman-owner@xxxxxxxxxxxxx
- SSSD on a read-only filesystem
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- [PATCH] libsemanage: fix memory leak in semanage_genhomedircon
- From: Thomas Hurd <thurd@xxxxxxxxxx>
- Re: [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!
- Re: SELinux policy updates in a post-%post world
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: SELinux policy updates in a post-%post world
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux policy updates in a post-%post world
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Joe Nall <joe@xxxxxxxx>
- Re: What should the context of ICMP packets be on a ranged network interface be?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- What should the context of ICMP packets be on a ranged network interface be?
- From: Joe Nall <joe@xxxxxxxx>
- Re: The sepol_set_policydb method - to be used or not?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The sepol_set_policydb method - to be used or not?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: How to restore a policy module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: How to restore a policy module
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: How to restore a policy module
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: How to restore a policy module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to restore a policy module
- From: Ilya Frolov <ilya.a.frolov@xxxxxxxxx>
- Re: How to restore a policy module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to restore a policy module
- From: "Kim Lawson-Jenkins" <kim.lawson-jenkins@xxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux design and Domain Name resolution
- From: Joe Nall <joe@xxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- RE: SELinux design and Domain Name resolution
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: SELinux design and Domain Name resolution
- From: Joe Nall <joe@xxxxxxxx>
- SELinux design and Domain Name resolution
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.15
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.15
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v1] selinux: add transitions for kernel keys
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V3] ss: Add support for retrieving SELinux contexts
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- [PATCH V3] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: correctly label /proc inodes in use before the policy is loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: sshd and setcurrent
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Re: sshd and setcurrent
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- sshd and setcurrent
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- OSTree <3 SELinux
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: What is Type Enforcement Model in SELinux?
- From: Bryan Harris <bryanlharris@xxxxxx>
- What is Type Enforcement Model in SELinux?
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: [PATCH V2] ss: Add support for retrieving SELinux contexts
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: put the mmap() DAC controls before the MAC controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 5/8] security: selinux: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 5/8] security: selinux: Use a more current logging style
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 5/8] security: selinux: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 0/8] security: Use a more current logging style
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: doesnt work MLS in ssh X-forwarding on the client's X windows
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- doesnt work MLS in ssh X-forwarding on the client's X windows
- From: work3231 work3231 <work3231@xxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- [PATCH V2] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.14-rcX
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: bigendian problems with filename trans rules
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] SELinux: bigendian problems with filename trans rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] [PATCH] load_policy: Log errors using selinux_log
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: bigendian problems with filename trans rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: Only attempt to load policy exactly once, in the real root
- From: Colin Walters <walters@xxxxxxxxxx>
- [RFC] [PATCH] load_policy: Log errors using selinux_log
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] Get rid of security_context_t and fix const declarations.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Get rid of security_context_t and fix const declarations.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] Get rid of security_context_t and fix const declarations.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: cross-labeling vs precompiled PCRE
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- cross-labeling vs precompiled PCRE
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Using genfscon's partial_path for other filesystems than proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] ss: Add support for retrieving SELinux contexts
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Using genfscon's partial_path for other filesystems than proc
- From: Luis Ressel <aranea@xxxxxxxx>
- [PATCH] ss: Add support for retrieving SELinux contexts
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Detail description of some projects in TO DO list page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Detail description of some projects in TO DO list page
- From: nguyen thai <thai.bkset@xxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- This past week I was doing a demo of how to build an Userspace Object Manager for firewalld
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: how to change the context of running process
- From: Rongqing Li <rongqing.li@xxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- how to change the context of running process
- From: bigclouds <bigclouds@xxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC - Display context information using iproute2 ss utility
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- RFC - Display context information using iproute2 ss utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.14-rc1
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: fix the output of ./scripts/get_maintainer.pl for SELinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: audit2allow: invalid binary policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- audit2allow: invalid binary policy
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: SELinux question..
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux question..
- From: Victor Porton <porton@xxxxxxxx>
- Re: SELinux question..
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Per Nystrom <pnystrom@xxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Richard Yao <ryao@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Brian Behlendorf <behlendorf1@xxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- file access causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- [PATCH] selinux: add SOCK_DIAG_BY_FAMILY to the list of netlink message types
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Strange context on unix_stream_socket
- From: ole@xxxxxxxxxxxxxxx
- Re: Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Strange context on unix_stream_socket
- From: Ole Kliemann <ole@xxxxxxxxxxxxxxx>
- Re: SELinux linux-next tree changes
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: There should be multiple MLS
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- There should be multiple MLS
- From: Victor Porton <porton@xxxxxxxx>
- SELinux linux-next tree changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: runcon and setsid()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux tree changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Research Topics in Operating System Security
- From: Nainesh Patel <nainesh@xxxxxxxxx>
- runcon and setsid()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Fwd: SELINUX language suggestion for future goals
- From: Nainesh Patel <nainesh@xxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: As we move to use Linux Containers User Namespace
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- As we move to use Linux Containers User Namespace
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Tawfiq Shah <tawfiqshah@xxxxxxxxx>
- Re: [PATCH 00/11] cross rename v3
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 00/11] cross rename v3
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Waiting for programs to stop
- Re: Web Application access to files in /mnt/
- Re: Waiting for programs to stop
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Create new NetFilter table
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Web Application access to files in /mnt/
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Web Application access to files in /mnt/
- From: Ken Smith <kens@xxxxxxxxxxx>
- Re: Create new NetFilter table
- From: Victor Porton <porton@xxxxxxxx>
- Re: Create new NetFilter table
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Create new NetFilter table
- From: Victor Porton <porton@xxxxxxxx>
- Waiting for programs to stop
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: what is the default context of a program without selinux-aware
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: new to selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: new to selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: new to selinux
- From: Ilya Frolov <ilya.a.frolov@xxxxxxxxx>
- new to selinux
- From: Bryan Harris <bryanlharris@xxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: Changing unlabeled_t on files to invalid_label_t.
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Changing unlabeled_t on files to invalid_label_t.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: My proposal for a new feature in Linux kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: My proposal for a new feature in Linux kernel
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- My proposal for a new feature in Linux kernel
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: what is the default context of a program without selinux-aware
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Tawfiq Shah <tawfiqshah@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Restrict to a fixed Internet domain in a sandbox
- From: Victor Porton <porton@xxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- what is the default context of a program without selinux-aware
- From: bigclouds <bigclouds@xxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [PATCH] LSM: Pass commname via get_task_comm()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] CIL and Source Policy Integration
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [RFC] CIL and Source Policy Integration
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: how to use interface and node?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14 (part two)
- From: James Morris <jmorris@xxxxxxxxx>
- how to use interface and node?
- From: bigclouds <bigclouds@xxxxxxx>
- Re: any selinux program and architeture books
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for 3.14 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: any selinux program and architeture books
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: any selinux program and architeture books
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- any selinux program and architeture books
- From: bigclouds <bigclouds@xxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- Mailing list etiquette
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Fix memory leak upon loading policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libselinux: Refactor rpm_execcon() into a new setexecfilecon()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Allowing all access in SELinux without permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Mounting selinuxfs as read-only inside chroot
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- Allowing all access in SELinux without permissive mode.
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- [PATCH] SELinux: Fix memory leak upon loading policy
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: question about basic selinux concept
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: Refactor rpm_execcon() into a new setexecfilecon()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Mounting selinuxfs as read-only inside chroot
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 3.14
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 3.14
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: question about basic selinux concept
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re:Re: question about basic selinux concept
- From: bigclouds <bigclouds@xxxxxxx>
- question about basic selinux concept
- From: bigclouds <bigclouds@xxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Francis Cunnane <frankc@xxxxxxxxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH libselinux] Fix a bug in the userspace AVC that broke per-domain permissive mode.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH libselinux] Fix a bug in the userspace AVC that broke per-domain permissive mode.
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Bug in libselinux/src/setrans_client.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13 (part three)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Change in list manager software
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepolicy-ifgen: Syntax error on line 179876 gen_context [type=GEN_CONTEXT]"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- New SELinux support in Coreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- RE: selinux control for network interface using SOCK_RAW
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- selinux control for network interface using SOCK_RAW
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- sepolicy-ifgen: Syntax error on line 179876 gen_context [type=GEN_CONTEXT]"
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: /bin/bash: Bad interpreter: Permission denied.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /bin/bash: Bad interpreter: Permission denied.
- From: Jay Corrales <jscorrales1122@xxxxxxxxx>
- Re: [PATCH v2] selinux: selinux_setprocattr()->ptrace_parent() needs rcu_read_lock()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] SELinux: remove duplicated include from hooks.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for 3.13 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13 (part two)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: revert 102aefdda4d8275ce7d7100bc16c88c74272b260
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for 3.13
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Fix broken peer recv check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fix broken peer recv check
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- [PATCH 1/2] selinux: look for IPsec labels on both inbound and outbound packets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/2] Additional TCP SYN-ACK fixes for labeled IPsec
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 1/1] Ignore selevel/serange if MLS is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] Ignore selevel/serange if MLS is disabled
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avtab dense hash table
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avtab dense hash table
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: avtab dense hash table
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: kmemleak: filename_trans_read()?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: avtab dense hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: subscribe selinux
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: subscribe selinux
- From: "Marino, Claudio" <cmarino@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/2] Fix TCP SYN-ACK labeling and access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MLS required even when MLS is disabled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- MLS required even when MLS is disabled?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: SELinux Coloring book?
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- RE: SELinux Coloring book?
- From: "Radzykewycz, T (Radzy)" <radzy@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: SELinux Coloring book?
- From: leo kirotawa <kirotawa@xxxxxxxxx>
- Re: [PATCH 04/05] Add -P semodule option to man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/05] Make sure we do the polkit check on all dbus interfaces.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Coloring book?
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: [PATCH 05/05] Verify type being passed into semanage permissive is a valid domain.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/05] Verify type being passed into semanage permissive is a valid domain.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/05] Add -P semodule option to man page
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/05] selinux_current_policy_path will return none on a disabled SELinux system
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/05] Add new icons for sepolicy gui
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/05] Make sure we do the polkit check on all dbus interfaces.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- SELinux Coloring book?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 07/08] Cleanup whitespace
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Current upstreamable patch set from Fedora
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/08] Add domain to short list of domains, when -t and -d used together
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 04/08] Fix up desktop files to match current standards
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/08] Add support to return sesitivities and cats for python bindings.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/08] Call proper dbus function
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/08] Only return writeable files that are enabled
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/08] Add message to tell user to install sandbox policy package.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Timothée Ravier <siosm99@xxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 2/2] checkpolicy: Add debug feature to display constraints / validatetrans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to remove default encoding patch.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Minor manpages improvements
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: kernel function to verify rootcontext
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] Minor manpages improvements
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] Add systemd unit file for mcstrans daemon
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/3] Improve restorecond systemd unit file
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- kernel function to verify rootcontext
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Patch to remove default encoding patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: No module named policycoreutils.default_encoding_utf8 ?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- No module named policycoreutils.default_encoding_utf8 ?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: review of a dbus-selinux patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- review of a dbus-selinux patch
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 0/2] checkpolicy: Add constraint info to -d option
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: Add debug feature to display constraints / validatetrans
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Add sepol_validate_transition_reason_buffer function
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Fix valgrind errors in constraint_expr_eval_reason
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] src/libselinux.pc.in: Move -lpthread to Libs.private
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] Explicitly link libselinux against -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Android emulator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Android emulator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Android emulator
- From: Gabriele Scotti <gabriele.sct@xxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Handling unknown permissions in userspace object managers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Handling unknown permissions in userspace object managers
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: V2-Update policy version to support constraints info
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Split policycoreutils up?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/01] Make yum/extract_rpms optional so that apt based systems can use tool
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 01/01] Make yum/extract_rpms optional so that apt based systems can use tool
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 01/11] Add test suite for audit2allow and sepolgen_ifgen
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/01] Add test suite for audit2allow and sepolgen_ifgen
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/1] Add back attributes flag to fix exception crash.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/10] Add back attributes flag to fix exception crash.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 01/10] Add back attributes flag to fix exception crash.
- From: Dan Walsh <dwalsh@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Split policycoreutils up?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Split policycoreutils up?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Been looking at further shrinkage of the SELinux footprint on Linux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Pruning dead/obsolete branches?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Pruning dead/obsolete branches?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [ANN] SELinux userspace release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Properly build the swig exception file even if the headers are missing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Properly build the swig exception file even if the headers are missing
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: rlpkg -a -r causes a kernel bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rlpkg -a -r causes a kernel bug
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 09/17] Have sepolgen return additional constraint information
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Previous patch set, is complete Only sending 1-9.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH selinux-testsuite] fix policy Makefile for RHEL4/5
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 09/17] Have sepolgen return additional constraint information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 08/17] Have audit2allow output additional constraint
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/17] Fix line spacing on audit2allow output
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/17] Return the sections of the source and target context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 05/17] Change audit2why to return constraint information on
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 04/17] libsepol: V1 Allow constraint denials to be determined.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 02/17] Catch IOError errors within audit2allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 03/17] Make sure userdel cleans up after itself in test
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 01/17] Do not return error if system is in permissive mode.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sven Vermeulen patch to fix sepolgen test code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- avc_has_perm() returns -1 even when SELinux is in permissive mode
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Sven Vermeulen patch to fix sepolgen test code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Sven Vermeulen patch to fix sepolgen test code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Michal Trunecka patch to allow restorecon to accept {}
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Update to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Need to delete all managed objects before readding them
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 74/74] Make RANLIB variable overridable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] Need to delete all managed objects before readding them
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/2] semanage user customized should use -L not -l
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update to CIL
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Re: Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: Update policy version to support constraints info
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Re: Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: Need information on building embedded systems.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Need information on building embedded systems.
- From: Don Hoefer <don.hoefer@xxxxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Allow audit2allow to return constraint information from policy
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- [PATCH 52/74] Add deleteall customizations field for modules.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 72/74] Mount sys before trying to mount selinuxfs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/74] Use power of 2 for STAR_COUNT
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 73/74] Update pkgconfig definition
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 71/74] Patch from Sven Vermeulen to use RANLIB.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 74/74] Make RANLIB variable overridable
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 69/74] Need to document -o filename in usage statement
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 66/74] Make setsebool be less verbose.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 68/74] setfiles should always return -1 on failures.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/74] Fix error when policy does not match the system.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/74] seinfo needs to work if mls is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/74] Change polgengui to use latest interfaces availabel in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 62/74] Return the type aliases.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/74] If users of seobject set serange or seuser to ""
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/74] Add new test suite for sepolicy tool set.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 55/74] Make sure file equivalance target and source do not end
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/74] Mv some of the setup we were doing in the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/74] Fix customized of fcontext and booleans to return
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/74] <<none>> should be a valid type to be used with the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 53/74] Return the level when looking at the customized changes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/74] If a user specifies a module to add that does not exist
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/74] Only list disabled modules if the user ask for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/74] Add customized calls for modules to list disabled
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/74] Fix bug in logger.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/74] Add new FILE_STRING constands
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/74] Cleanup handling of translations code
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/74] Fix lots of bugs in the bash completion script.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/74] Convert semanage command to use argparse
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/74] Add test script for testing semanage functionality.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/74] Lots of fixes for fixfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/74] genhomedircon is no longer a script
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/74] bash completsion scripts have moved.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/74] Break the semanage man page into different man pages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 39/74] Fix spelling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 37/74] Give people who use run_init or newrole an indicator to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/74] Handle cleanup of locks properly
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/74] Add support for systemd service for restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]