SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v14 5/6] LSM: SO_PEERSEC configuration options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v14 3/6] LSM: Explicit individual LSM associations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 5/6] LSM: SO_PEERSEC configuration options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 3/6] LSM: Explicit individual LSM associations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v14 5/6] LSM: SO_PEERSEC configuration options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Building the Base Policy Module
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Building the Base Policy Module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Building the Base Policy Module
- From: Thomas COUDRAY <amanone@xxxxxxxxx>
- Re: [PATCH v14 3/6] LSM: Explicit individual LSM associations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 1/6] LSM: Security blob abstraction
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Common Intermediate Language (CIL) Update
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Common Intermediate Language (CIL) Update
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v14 6/6] LSM: Multiple LSM Documentation and cleanup
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- This patch stops semanage from removing user records that are still in use.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Currently we handle adding audit records with semanage command in pocliycoreutils.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v14 6/6] LSM: Multiple LSM Documentation and cleanup
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 3/6] LSM: Explicit individual LSM associations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 1/6] LSM: Security blob abstraction
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 2/6] LSM: Move the capability LSM into the hook handlers
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 4/6] LSM: List based multiple LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 5/6] LSM: SO_PEERSEC configuration options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 0/6] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: consider filesystem subtype in policies
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] xattr: Constify ->name member of "struct xattr".
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Follow-up on the lblnet-next tree
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [refpolicy] Want to make typeattribute declarations possible in conditionals
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [refpolicy] Want to make typeattribute declarations possible in conditionals
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] xattr: Constify ->name member of "struct xattr".
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [refpolicy] Want to make typeattribute declarations possible in conditionals
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] sepolgen: Fix AttributeError: 'dict' object has no attribute 'attributes'
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/2] sepolgen: Fix test that compares matchlist length
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 2/2] sepolgen: Fix AttributeError: 'dict' object has no attribute 'attributes'
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Now you too, can get the "setenforce 1" t-shirt.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: matchportcon?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: AVC for unlabeled_t on cgroup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: matchportcon?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: matchportcon?
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- matchportcon?
- From: Dave Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: AVC for unlabeled_t on cgroup
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: AVC for unlabeled_t on cgroup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: AVC for unlabeled_t on cgroup
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: AVC for unlabeled_t on cgroup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- AVC for unlabeled_t on cgroup
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: [PATCH] SELinux: fix selinuxfs policy file on big endian systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] SELinux: Increase ebitmap_node size for 64-bit configuration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: fix selinuxfs policy file on big endian systems
- From: Eric Paris <eparis@xxxxxxxxxx>
- Follow-up on the lblnet-next tree
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Enable setting security contexts on rootfs inodes.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v5] SELinux: Reduce overhead of mls_level_isvalid() function call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label? (solved)
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label? (solved)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Joe Nall <joe@xxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH] --handle-unknown option takes a required argument
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Labeled IPSec trying to match policy for peer label?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Labeled IPSec trying to match policy for peer label?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 0/9] Labeled networking patches for 3.11
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Labeled networking patches for 3.11
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/9] Labeled networking patches for 3.11
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 5/9] selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/9] lsm: split the xfrm_state_alloc_security() hook implementation
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 8/9] selinux: cleanup the XFRM header
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 7/9] selinux: cleanup selinux_xfrm_decode_session()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 9/9] selinux: remove the BUG_ON() from selinux_skb_xfrm_sid()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/9] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 3/9] selinux: cleanup and consolidate the XFRM alloc/clone/delete/free code
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 6/9] selinux: cleanup some comment and whitespace issues in the XFRM code
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 4/9] selinux: cleanup selinux_xfrm_policy_lookup() and selinux_xfrm_state_pol_flow_match()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: pcre 8.33 changes restorecon behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pcre 8.33 changes restorecon behavior
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: pcre 8.33 changes restorecon behavior
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: pcre 8.33 changes restorecon behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- pcre 8.33 changes restorecon behavior
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Problems regarding booting devices
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Problems regarding booting devices
- From: Haiqing Jiang <hqjiang1988@xxxxxxxxx>
- Re: Deprecating policy capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Deprecating policy capabilities (was: Clarification of labeled IPsec checks)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Deprecating policy capabilities (was: Clarification of labeled IPsec checks)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Deprecating policy capabilities (was: Clarification of labeled IPsec checks)
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Deprecating policy capabilities (was: Clarification of labeled IPsec checks)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/8] selinux: cleanup and consolidate the XFRM alloc/clone/delete/free code
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 8/8] selinux: remove the BUG_ON() from selinux_skb_xfrm_sid()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/8] Labeled IPsec cleanups
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 3/8] selinux: cleanup selinux_xfrm_policy_lookup() and selinux_xfrm_state_pol_flow_match()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 7/8] selinux: cleanup the XFRM header
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/8] lsm: split the xfrm_state_alloc_security() hook implementation
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 4/8] selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 5/8] selinux: cleanup some comment and whitespace issues in the XFRM code
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 6/8] selinux: cleanup selinux_xfrm_decode_session()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [ANNOUNCE] Linux Security Summit 2013 - CFP
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: use case
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- use case
- From: Franck <franck.quinard@xxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: selinux on zfs(onlinux)
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- selinux on zfs(onlinux)
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: xt_SECMARK and "unable to map security context 'httpcontext'" error
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- xt_SECMARK and "unable to map security context 'httpcontext'" error
- From: Kevin Wilson <wkevils@xxxxxxxxx>
- Re: [RFC PATCH 2/2] SELinux: cache inode checks inside struct inode
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] SELinux: cache inode checks inside struct inode
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] SELinux: cache inode checks inside struct inode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] SELinux: cache inode checks inside struct inode
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: merge selinux_inode_permission and inode_has_perm
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC PATCH 1/2] selinux: merge selinux_inode_permission and inode_has_perm
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC PATCH 2/2] SELinux: cache inode checks inside struct inode
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Fix the SELinux dynamic network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Role associated with an attribute is not being associated with all types having that attribute.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v3 2/2] selinux: fix the labeled xfrm/IPsec reference count handling
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v3 1/2] xfrm: force a garbage collection after deleting a policy
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v3 0/2] Fix the SELinux dynamic network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v2 0/2] Fix the SELinux dynamic network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v3] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: fix the labeled xfrm/IPsec reference count handling
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Fix the SELinux dynamic network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v2 2/2] xfrm: force a garbage collection after deleting a policy
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] xfrm: force a garbage collection after deleting a policy
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] xfrm: force a garbage collection after deleting a policy
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 1/2] selinux: fix the labeled xfrm/IPsec reference count handling
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 0/2] Fix the SELinux dynamic network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: high to low UDP stream
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: high to low UDP stream
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- high to low UDP stream
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Last version of policycoreutils using Fedora only API
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Last version of policycoreutils using Fedora only API
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: network, deep drive
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: network, deep drive
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: network, deep drive
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: [PATCH] libselinux: Requires libpcre and libpthread for static linking
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 04/13] SELinux: Add new labeling type native labels
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 01/13] Security: Add hook to calculate context based on a negative dentry.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 03/13] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 13/13] Kconfig: Add Kconfig entry for Labeled NFS V4 client
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: network, deep drive
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Properly build the swig exception file even if the headers are missing
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] libselinux: Requires libpcre and libpthread for static linking
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- network, deep drive
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: [PATCH] netlabel: improve domain mapping validation
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: improve domain mapping validation
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: connection between different labels
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- connection between different labels
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: Future of SETools and CIL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Future of SETools and CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Future of SETools and CIL
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Future of SETools and CIL
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: marking ipv6 loopback for cipsov?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: marking ipv6 loopback for cipsov?
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- Re: marking ipv6 loopback for cipsov?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- marking ipv6 loopback for cipsov?
- From: vlad halilov <vlad.halilov@xxxxxxxxx>
- RE: [PATCH 00/17] lnfs: linux-3.9 release
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- [PATCH/RFC 2/2] Fix AttributeError: 'dict' object has no attribute 'attributes'
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH/RFC 1/2] Fix test that compares matchlist length
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH/RFC 0/2] Test failures when building sepolgen
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 00/17] lnfs: linux-3.9 release
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH] Enable setting security contexts on rootfs inodes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 13/16] policycoreutils: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 16/16] policycoreutils: Do not include LDFLAGS in CFLAGS when building sepolicy
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 03/16] policycoreutils: Allow overriding CFLAGS in setfiles and sestatus Makefiles
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 10/16] checkpolicy: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 07/16] libselinux: Allow overriding LIBBASE in src/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 02/16] policycoreutils: Create correct man directory for run_init manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 12/16] libsepol: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 01/16] Policycoreutils: Allow overriding INITDIR in restorecond Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 04/16] checkpolicy: Allow overriding LIBDIR in test/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 15/16] policycoreutils: init_policy() takes no arguments
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 00/15] Patches from the Debian packages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 09/16] libselinux: Fix various minor manpage issues and correct section numbering.
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 14/16] policycoreutils: Fix semange alternative logging code
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 08/16] libselinux: Do not use LDFLAGS to set -lpcre and -lpthread
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 11/16] libsemanage: Fix cases where hyphen were used as minus sign in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 06/16] libsemanage: Also check for the uppoer bound on user ids in login.defs
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 05/16] libsepol: Allow overriding LIBBASE in src/Makefile
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: audit2allow/sepolgen not setting the locale properly when calculating the bootdate
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit2allow/sepolgen not setting the locale properly when calculating the bootdate
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Disabling rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Disabling rules
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH 09/17] NFSv4: Introduce new label structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: Michael Seyfert <michael@xxxxxxxxxxxx>
- Re: Clarification of labeled IPsec checks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/1] Fix KeyError when using sepolicy transition
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: What provides _policy?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: What provides _policy?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: redhat1 polcap (was Re: [PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: What provides _policy?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What provides _policy?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Clarification of labeled IPsec checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: redhat1 polcap (was Re: [PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit 2013 - CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 00/17] lnfs: linux-3.9 release
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 13/17] NFS: Client implementation of Labeled-NFS
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Clarification of labeled IPsec checks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Clarification of labeled IPsec checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- redhat1 polcap (was Re: [PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.)
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: What provides _policy?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.
- From: Chris PeBenito <cpebenito@xxxxxxxxxx>
- Re: [PATCH 05/17] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 14/17] NFS: Extend NFS xattr handlers to accept the security namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 07/17] SELinux: Add new labeling type native labels
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 06/17] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: 'av.data' may be used uninitialized
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- 'av.data' may be used uninitialized
- From: Michael Seyfert <michael@xxxxxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: Michael Seyfert <michael@xxxxxxxxxxxx>
- [PATCH 1/1] Open stdin as read/write
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH 1/1] Fix referenced before assignment error
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- What provides _policy?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Current Makefile system is inconvenient/limited
- From: piruthiviraj natarajan <piruthiviraj@xxxxxxxxx>
- Current Makefile system is inconvenient/limited
- From: Michael Seyfert <michael@xxxxxxxxxxxx>
- Re: [PATCH v3] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [Ann] SELinux userspace release
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: SELinux errors with pam_faillock
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [Ann] SELinux userspace release
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [Ann] SELinux userspace release
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- SELinux errors with pam_faillock
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [Ann] SELinux userspace release
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/17] SELinux: Add new labeling type native labels
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 5/9] LSM: Networking component isolation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 5/9] LSM: Networking component isolation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 5/9] LSM: Networking component isolation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Build regressions/improvements in v3.9-rc8
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/19] lnfs: 3.9-rc5 release
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v13 1/9] LSM: Security blob abstraction
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 9/9] LSM: Documentation and cleanup
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 3/9] LSM: Multiple concurrent secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 4/9] LSM: Multiple security context maintenance
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 8/9] LSM: Hook list management
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 2/9] LSM: Complete conversion to kill_pid_info_as_cred
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 6/9] LSM: Additional interfaces in /proc/pid/attr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 7/9] LSM: remove Yama special case stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 5/9] LSM: Networking component isolation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [Ann] SELinux userspace release
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: consider filesystem subtype in policies
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semenage-argparse: Now with full help test (except -E) and support for the login subcommand
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: semenage-argparse: Now with full help test (except -E) and support for the login subcommand
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- semenage-argparse: Now with full help test (except -E) and support for the login subcommand
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] Package script(let)s SELinux execution context
- From: Guillem Jover <guillem@xxxxxxxxxx>
- First crack at argparse parser for semanage.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Not sending AVC denials to audit.log
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Not sending AVC denials to audit.log
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: Not sending AVC denials to audit.log
- From: Ted Toth <txtoth@xxxxxxxxx>
- Not sending AVC denials to audit.log
- From: "Rodney Simioni" <rodney.simioni@xxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Stephen John Smoogen <smooge@xxxxxxxxx>
- [PATCH v2] selinux: consider filesystem subtype in policies
- From: Anand Avati <avati@xxxxxxxxxx>
- Re: [PATCH] selinux: consider filesystem subtype in policies
- From: Anand Avati <avati@xxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 3/3] net: move sk_buff->secmark into a security blob in skb_shared_info
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 0/3] Shrink sk_buff and add a security blob
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 2/3] net: wrap skb->secmark access with set and get functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH 1/3] skb: wrap skb_shared_info->destructor_arg access with set and get functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: consider filesystem subtype in policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: consider filesystem subtype in policies
- From: Anand Avati <avati@xxxxxxxxxx>
- [PATCH] selinux: consider filesystem subtype in policies
- From: Anand Avati <avati@xxxxxxxxxx>
- [PATCH] filesystem.te: Add support for fuse.glusterfs
- From: Anand Avati <avati@xxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Stop Disabling SELinux
- From: Landon Hurley <ljrhurley@xxxxxxxxx>
- Stop Disabling SELinux
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: ipc security context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sysadm restarting services
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- sysadm restarting services
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- Re: I am new to selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I am new to selinux
- From: "Rodney Simioni" <rodney.simioni@xxxxxxxxx>
- ipc security context
- From: Ondrej Oprala <ooprala@xxxxxxxxxx>
- RE: appending to an existing policy
- From: "Rodney Simioni" <rodney.simioni@xxxxxxxxx>
- Re: appending to an existing policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- appending to an existing policy
- From: "Rodney Simioni" <rodney.simioni@xxxxxxxxx>
- Re: semanage support for nsswitch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage support for nsswitch
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: newrole and tmux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole and tmux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- newrole and tmux
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- [PATCH v3] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/19] Security: Add hook to calculate context based on a negative dentry.
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- RE: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- RE: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Filesystem module
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: File context not applied due to regex ordering
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- RE: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Simple fixes for libsepol for DARWIN
- From: Eric Mertens <emertens@xxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Filesystem module
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: Filesystem module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Filesystem module
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: sudo best practices
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- sudo best practices
- From: Andy Ruch <adruch2002@xxxxxxxxx>
- File context not applied due to regex ordering
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Compiling Selinux from Source
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Compiling Selinux from Source
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Compiling Selinux from Source
- From: Kernel freak <kernelfreak@xxxxxxxxx>
- semanage support for nsswitch
- From: Matthew Thode <mthode@xxxxxxxxxx>
- Re: SELinux network labeling
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Linda Knippers <linda.knippers@xxxxxx>
- RE: SELinux network labeling
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Linda Knippers <linda.knippers@xxxxxx>
- Re: SELinux network labeling
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: SELinux network labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SELinux network labeling
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux network labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux network labeling
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add db_materialized_view object class
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: LSM stacking and the network access controls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking and the network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: LSM stacking and the network access controls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking and the network access controls
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: LSM stacking and the network access controls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- LSM stacking and the network access controls (was: AF_VSOCK and the LSMs)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Add db_materialized_view object class
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: AF_VSOCK and the LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- AF_VSOCK and the LSMs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: EXTERNAL: Re: Developinng SELinux MLS aware software
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Mount of cgroup filesystems fails when booting in SELinux enforcing mode
- From: <aranea@xxxxxxxx> Luis Ressel
- Re: Monitoring the Openshift Logs each day for AVCs I am struct by how often we get AVC's for stuff that is blocked by DAC.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Monitoring the Openshift Logs each day for AVCs I am struct by how often we get AVC's for stuff that is blocked by DAC.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: [PATCH 00/15] lnfs: 3.8-rc6 release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/15] lnfs: 3.8-rc6 release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: systemd selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: systemd selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pam_selinux
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: pam_selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Add db_materialized_view object class
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- [no subject]
- From: Brian Iván Martínez <xangelux@xxxxxxxxx>
- Re: Fixing external/libsepol issues found by Klocwork
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234]
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Turn off "dontaudit" rules in monolithic policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Turn off "dontaudit" rules in monolithic policy
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- Re: Turn off "dontaudit" rules in monolithic policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Turn off "dontaudit" rules in monolithic policy
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- [PATCH] flask: add the attach_queue permission to the tun_socket object class
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 81/84] sepolgen: Use refpolicy_makefile() instead of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 77/84] libselinux: audit2why: use the new constraint
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 79/84] policycoreutils: secon: add support for setrans color
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 45/84] sepolgen: audit.py: Handle times in foreign locals for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 21/84] libselinux: include hidden_proto for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 22/84] libselinux: sefcontontext_compile: Add error handling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 82/84] libselinux: optimize set*con functions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Turn off "dontaudit" rules in monolithic policy
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- Re: Turn off "dontaudit" rules in monolithic policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 83/84] sepolgen: understand role attributes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 81/84] sepolgen: Use refpolicy_makefile() instead of
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 80/84] policycoreutils: restorecond: remobe /etc/mtab from
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 77/84] libselinux: audit2why: use the new constraint
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 78/84] libselinux: audit2why: remove a useless policy vers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 74/84] checkpolicy: libsepol: implement default type policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 73/84] libselinux: Change boooleans.subs to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 76/84] libsepol: constraint queue overflow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 68/84] checkpolicy: Fix errors found by coverity
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 70/84] libsepol: coverity fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 71/84] libselinux: Fix errors found by coverity
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 72/84] policycoreutils: gui: system-config-selinux: do not use
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 67/84] libselinux: selinux_status_open: do not leak statusfd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 69/84] libsemanage: fixes from coverity
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 61/84] libselinux: man: Fix typo in man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 64/84] libselinux: man: context_new(3): fix the return value
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 66/84] libselinux: selinux_status_open: handle error from
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 46/84] policycoreutils: sandbox: Copy /var/tmp to /tmp as they
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 65/84] libsemange: redo genhomedircon minuid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 54/84] policycoreutils: semanage: list logins file entries in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 63/84] libselinux: Use ENOTSUP instead of EOPNOTSUPP for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 62/84] libselinux: man: Add references and man page links to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 57/84] libsemanage: Cleanup/fix enable/disable/remove module.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 59/84] libselinux: man: Fix program synopsis and function
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 58/84] libselinux: audit2why: Cleanup audit2why analysys
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 56/84] policycoreutils: semanage: good error message is
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 51/84] policycoreutils: gui: system-config-selinux: Catch no
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 52/84] policycoreutils: setfiles: print error if no default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 49/84] policycoreutils: semanage: Fix handling of boolean_sub
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 50/84] policycoreutils: semanage: man: roles instead of role
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 44/84] libselinux: audit2why: do not leak on multiple init()
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 47/84] libselinux: mode_to_security_class: interface to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 48/84] policycoreutils: qualifier to shred content
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 41/84] libselinux: man: make selinux.8 mention service man
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 43/84] policycoreutils: gui: Start using Popen
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 42/84] libselinux: audit2why: Fix segfault if finish() called
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 35/84] policycoreutils: gui: switch to use sepolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 40/84] policycoreutils: semanage: seobject verify policy types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 38/84] policycoreutils: add po file configuration information
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 37/84] policycoreutils: semanage: use sepolicy for boolean
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 36/84] policycoreutils: gui: sepolgen: use sepolicy to
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 34/84] policycoreutils: sandbox: use sepolicy to look for
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 33/84] policycoreutils: sepolicy: Update Makefiles and po
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 29/84] global: gitignore: .#*
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 30/84] global: gitignore: ignore vim swap files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 31/84] global gitignore: Something about filenames starting
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 27/84] policycoreutils: seunshare: NO NO 100 times NO CHECK
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 26/84] policycoreutils: load_policy: make link at the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 24/84] policycoreutils: Allow the users to override the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 25/84] policycoreutils: mention percent display in man page
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 23/84] libsemanage: Add sefcontext_compile to compile regex
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 20/84] libselinux: do not leak mmapfd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 18/84] libsemanage: FIME binary_policy_path error checking
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 13/84] libselinux: label_file: use precompiled filecontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 12/84] libselinux: utils: new file context regex compiler
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Turn off "dontaudit" rules in monolithic policy
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- [PATCH 04/84] libselinux: audit2why: make sure path is nul terminated
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Turn off "dontaudit" rules in monolithic policy
- From: "Vu, Joseph" <joseph.vu@xxxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ERROR 'type staff_java_t is not within scope' at token
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ERROR 'type staff_java_t is not within scope' at token
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- Re: ERROR 'type staff_java_t is not within scope' at token
- From: Dominick Grift <dominick.grift@xxxxxxxxx>
- ERROR 'type staff_java_t is not within scope' at token
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- Turn off "dontaudit" rules in monolithic policy
- From: Hung Truong <hung.truong@xxxxxxxxxxx>
- SELinux List going down this after noon
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: __thread and fork() is a big no-no
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: __thread and fork() is a big no-no
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: __thread and fork() is a big no-no
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: __thread and fork() is a big no-no
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- __thread and fork() is a big no-no
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Security label of file in Yaffs2 on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] Fix some multiqueue TUN problems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/2] selinux: add the "attach_queue" permission to the "tun_socket" class
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Security label of file in Yaffs2 on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security label of file in Yaffs2 on Android
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: Fixing external/libsepol issues found by Klocwork
- From: Alice Chu <alice.chu@xxxxxxxxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Ondrej Oprala <ooprala@xxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Ondrej Oprala <ooprala@xxxxxxxxxx>
- RE: Fixing external/checkpolicy issues found by Klocwork
- From: Alice Chu <alice.chu@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] sepolgen: Use refpolicy_makefile() instead of hardcoding Makefile path
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Fixing external/checkpolicy issues found by Klocwork
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Fixing external/libsepol issues found by Klocwork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fixing external/checkpolicy issues found by Klocwork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfscreatecon optimizations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setfscreatecon optimizations
- From: Ondrej Oprala <ooprala@xxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 2/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 6/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 7/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 4/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 1/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 8/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 9/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 5/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Fixing external/libsepol issues found by Klocwork
- From: Alice Chu <alice.chu@xxxxxxxxxxxxxxx>
- Fixing external/checkpolicy issues found by Klocwork
- From: Alice Chu <alice.chu@xxxxxxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- [PATCH] secon: add support for setrans color information in prompt output
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: order 4 alloc failures in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: order 4 alloc failures in security_context_to_sid_core
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Reloading policy fills audit log with "selinux_audit_rule_match: stale rule"
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH v11 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Reloading policy fills audit log with "selinux_audit_rule_match: stale rule"
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [PATCH v11 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: Labeled NFS Meeting Info for Tonight Dec 20/Dec 21st for our friends in Singapore
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/9] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sander Hoentjen <sander@xxxxxxxxxxx>
- Re: [RFC PATCH v3 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v11 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Labeled NFS Linux Prototype Meeting
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH v11 5/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 6/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 7/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 8/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 3/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 2/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 9/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 4/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 1/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 0/9] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/2] Fix some multiqueue TUN problems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v3 1/2] selinux: add the "attach_queue" permission to the "tun_socket" class
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v3 2/2] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v3 0/2] Fix some multiqueue TUN problems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [Rpm-maint] [PATCH RFC] Package script(let)s SELinux execution context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: semanage cleanup
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- RE: SELinux networking question
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: SELinux networking question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux networking question
- From: "Langland, Blake" <blangland@xxxxxxxxxxxxxxxxxx>
- Re: semanage cleanup
- From: "Kevin W. Wall" <kevin.w.wall@xxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: semanage cleanup
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: semanage cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Reachable SIDs given a context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Reachable SIDs given a context
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: semanage cleanup
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- semanage cleanup
- From: David Quigley <dpquigl@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v9 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v9 1/2] LSM: Multiple concurrent LSMs
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: SELinux Google+ Community
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- SELinux Google+ Community
- From: David Quigley <selinux@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/2] LSM: Multiple concurrent LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] tun: correctly report an error in tun_flow_init()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v2] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: fix problems in netnode when BUG() is compiled out
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 2/3] selinux: add the "create_queue" permission to the "tun_socket" class
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 1/3] tun: correctly report an error in tun_flow_init()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 0/3] Fix some multiqueue TUN problems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [RFC PATCH v2 3/3] tun: fix LSM/SELinux labeling of tun/tap devices
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: policy for PowerDNS
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- Re: [RFC PATCH 1/2] tun: correctly report an error in tun_flow_init()
- From: Paul Moore <pmoore@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]