SELinux - Date Index
[Prev Page][Next Page]
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v1 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 1/5] Userspace: add class to role_trans & role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 4/5] Userspace: handle the class in role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v1 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/5] Userspace: role_transition parser to handle class field
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 5/5] Userspace: display the class in role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/5] Userspace: handle the class field in role_trans struct
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v1 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Re:Re: Re:Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: v0 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 4/5] Handle the class in role_trans_rule structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- v0 Add class support to the role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/5] Handle the class in role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/5] Make role_transition parser to handle class field
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 3/3] SELinux: Write class field in role_trans_write.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/5] Add class to role_trans & role_trans_rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 2/3] SELinux: Compute role in newcontext for all classes
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 5/5] Display the class in role_transition rule
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v0 PATCH 1/3] SELinux: Add class support to the role_trans structure
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re:Re: Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- Re: [PATCH] selinux: select correct default LSM_MMAP_MIN_ADDR on ARM.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- SELinux: avc_has_perm: unexpected error 22
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Re:Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Re:Re: about ss
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re:Re: about ss
- From: Yao <yffbrave@xxxxxxx>
- [PATCH] policycoreutils: alternative configuration file support for sestatus
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] selabel_open fix for processing the substitution file
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: about ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- about ss
- From: Yao <yffbrave@xxxxxxx>
- Re: SE Linux use - was: Question: and the policy grows...
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- SE Linux use - was: Question: and the policy grows...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: I have been asked for a use case that says I want to allow X domain to only be able to use eth1.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I have been asked for a use case that says I want to allow X domain to only be able to use eth1.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxxxx>
- [PATCH] selinux: select correct default LSM_MMAP_MIN_ADDR on ARM.
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Files and dirs objects could retain user role.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [v2] [SELinux] Discussions about rbacsep
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2] [SELinux] Discussions about rbacsep
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [v2] [SELinux] Discussions about rbacsep
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v2] [SELinux] Discussions about rbacsep
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/2] role_transition for newly created files or dirs.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 1/2] Auto-generate security_is_filedir_class().
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] Files and dirs objects could retain user role.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 2/2] Consider role_transition for newly created files or dirs.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 2/2] Consider role_transition for newly created files or dirs.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/2] Auto-generate security_is_filedir_class().
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [PATCH 1/1] file_type objects retain user role.
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Discussions about rbacsep
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux version bump past 99
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: Russell Coker <russell@xxxxxxxxxxxx>
- libselinux version bump past 99
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Flask Policy Parser (FPP) support to convert Refpolicy to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [GIT PULL] selinux for 2.6.39
- From: James Morris <jmorris@xxxxxxxxx>
- RE: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- [GIT PULL] selinux for 2.6.39
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [SELinux] Wildcard for object classes?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Further questions about configuring contexts differently for variant classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Further questions about configuring contexts differently for variant classes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Further questions about configuring contexts differently for variant classes
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need Help Compiling Reference Policy on Mobile Device
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.
- From: Jingkang Zhou <yoyocubeyo@xxxxxxxxx>
- Need Help Compiling Reference Policy on Mobile Device
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- RE: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Eric Paris <eparis@xxxxxxxxxx>
- Sorry about cross posting to multiple lists.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [v2 PATCH 0/3] SELinux: separate socket type than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [v2 PATCH 1/3] SELinux: Auto-generate security_is_socket_class
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 3/3] SELinux: Compute SID for the newly created socket
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- [v2 PATCH 2/3] SELinux: Socket retains creator role and MLS attribute
- From: Harry Ciao <qingtao.cao@xxxxxxxxxxxxx>
- RE: Separate socket SID than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: implement the new sb_remount LSM hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] LSM: Pass -o remount options to the LSM
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/2] LSM: Pass -o remount options to the LSM
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: implement the new sb_remount LSM hook
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Paul Moore <paul.moore@xxxxxx>
- Re: selinux man page fixes
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Separate socket SID than its creator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 07/10] selinux: Check receiving against sending interface on packet forwarding
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 02/10] selinux: Perform postroute access control checks after IPsec transfomations
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Separate socket SID than its creator
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- RE: Separate type for AF_UNIX socket created by syslogd_t
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4 v2] selinux: xfrm - notify users on dropped packets
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4 v2] selinux: xfrm - notify users on dropped packets
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Separate type for AF_UNIX socket created by syslogd_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: type_datum changed from define_type() and type_write() ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adobe on FC 14
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- adobe on FC 14
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: Separate type for AF_UNIX socket created by syslogd_t
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 4/4 v2] selinux: xfrm - notify users on dropped packets
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: Separate type for AF_UNIX socket created by syslogd_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Separate type for AF_UNIX socket created by syslogd_t
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: type_datum changed from define_type() and type_write() ?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- [PATCH 4/4 v2] selinux: xfrm - notify users on dropped packets
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: xfrm - notify users on dropped packets
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 07/10] selinux: Check receiving against sending interface on packet forwarding
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 02/10] selinux: Perform postroute access control checks after IPsec transfomations
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Need Help with Booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Revert "selinux: simplify ioctl checking"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: xfrm - notify users on dropped packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: type_datum changed from define_type() and type_write() ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- type_datum changed from define_type() and type_write() ?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Need Help with Booleans
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- [PATCH] Revert "selinux: simplify ioctl checking"
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: drop unused packet flow permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: drop unused packet flow permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I want to add the following to mcs constraints in SELinux policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: I want to add the following to mcs constraints in SELinux policy
- From: <chanson@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- I want to add the following to mcs constraints in SELinux policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: SELinux MLS and Virtual Machines
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux MLS and Virtual Machines
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH]: setfiles should provide an option to avoid abortion on a missing file
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 2/2]: improve the manual page for setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/2]: clean-up setfiles source code and document two options
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/2]: minor improvements and clean-ups for policycoreutils/setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case
- From: Paul Moore <paul.moore@xxxxxx>
- [Fwd: Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets]
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 07/10] selinux: Check receiving against sending interface on packet forwarding
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 06/10] selinux: Fix packet forwarding checks on postrouting
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 04/10] selinux: Fix wrong checks for selinux_policycap_netpeer
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 03/10] selinux: Remove checks for xfrm transformations from selinux_xfrm_postroute_last
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 02/10] selinux: Perform postroute access control checks after IPsec transfomations
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 01/10] selinux: Fix check for xfrm selinux context algorithm
- From: Paul Moore <paul.moore@xxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [12744.575074] SELinux: Invalid class 3588
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [12744.575074] SELinux: Invalid class 3588
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- [12744.575074] SELinux: Invalid class 3588
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias V2
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Seeking SELinux work
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- Seeking SELinux work
- From: Ted Toth <txtoth@xxxxxxxxx>
- selinux_file_context_verify function returns wrong value.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: kdm patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Russell Coker <russell@xxxxxxxxxxxx>
- kdm patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Re: Security-enhanced BSD?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security-enhanced BSD?
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- selinux man page fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- RE: Tiny version of SE-PostgreSQL got merged
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- RE: Tiny version of SE-PostgreSQL got merged
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Tiny version of SE-PostgreSQL got merged
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/2] security/selinux: Simplify proc inode to security label mapping
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- SELinux and Stuxnet
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SeLinux Policy design question
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- Re: SeLinux Policy design question
- From: Dominick Grift <domg472@xxxxxxxxx>
- SeLinux Policy design question
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 1/3] selinux: return -ENOMEM when memory allocation fails
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4] security:selinux: kill unused MAX_AVTAB_HASH_MASK and ebitmap_startbit
- From: James Morris <jmorris@xxxxxxxxx>
- libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] selinux: return -ENOMEM when memory allocation fails
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: audit function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit function
- From: mohit verma <mohit89mlnc@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Checkpolicy: Allow filesystem names to start with a digit
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: iodine and SE Linux
- Re: iodine and SE Linux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux Policy compiler doesn't like leading numbers in fs names
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Policy compiler doesn't like leading numbers in fs names
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- SELinux Policy compiler doesn't like leading numbers in fs names
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- iodine and SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SELinux Symposium site
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [libselinux] add db_language support on label_db.c
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: libsemanage patch for MCS/MLS in user files
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libsemanage patch for MCS/MLS in user files
- From: Joe Nall <joe@xxxxxxxx>
- libsemanage patch for MCS/MLS in user files
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Rearranged audit2allow.1 to match the newer ways we use the tool.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Checkpolicy patch to allow version of single digit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] ima: fix add LSM rule bug
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [ANN] SELinux Userspace release
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] ima: fix add LSM rule bug
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] SELinux: define permissions for DCB netlink messages
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I think it is time to turn off default user handling in libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] [PATCH 0/3] Fix warning messages generated by GCC 4.6
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: type bounds for files?
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] SELinux: define permissions for DCB netlink messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: type bounds for files?
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: type bounds for files?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- type bounds for files?
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Unit testing userspace
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] ANN: Reference Policy Release
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: Unit testing userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Unit testing userspace
- From: Jeff Johnson <n3npq@xxxxxxx>
- Re: Unit testing userspace
- From: Chad Sellers <csellers@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Fwd: [rhel5-cc-external-list] SELinux: refpolicy-2.20091117
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Semanage Patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Unit testing userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Policycoreutils-scripts patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch move newrole to file capabilities and uses libcapng
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Sandbox Patch (Resend with patch)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Sandbox Patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch breaks changes restorecond to use setfiles code for checking.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Here is the current sepolgen patch from Fedora.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I think it is time to turn off default user handling in libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: selinux policy for encrypted files
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: selinux policy for encrypted files
- From: "Roberto Sassu" <roberto.sassu@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Andy Warner <warner@xxxxxxxxx>
- [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- selinux policy for encrypted files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- [RFC][PATCH 2/2] selinux: fs associate permission check in inode_doinit_with_dentry()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/2] selinux: call may_context_mount_inode_relabel() if fscontext_sid is defined
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC PATCH 2/2] SELinux: Use dentry name in new object labeling
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH] selinux: cache sidtab_context_to_sid results
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eric Blake <eblake@xxxxxxxxxx>
- Re: [PATCH] SELinux: do not compute transition labels on mountpoint labeled filesystems
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: do not compute transition labels on mountpoint labeled filesystems
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: What can selinux do that "audit" by itself cant do ?
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- We have a problem with libselinux leaking memory using __thread
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What can selinux do that "audit" by itself cant do ?
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- What can selinux do that "audit" by itself cant do ?
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eric Blake <eblake@xxxxxxxxxx>
- Re: analysing optional policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: analysing optional policy
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- analysing optional policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: do not set automatic i_ino in selinuxfs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4] flex_array: fix flex_array_put_ptr macro to be valid C
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: do not set automatic i_ino in selinuxfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] SELinux: merge policydb_index_classes and policydb_index_others
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] selinux: convert part of the sym_val_to_name array to use flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] flex_array: fix flex_array_put_ptr macro to be valid C
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] selinux: convert type_val_to_struct to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Only return netlink error when we know the return is fatal
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] SELinux: indicate fatal error in compat netfilter code
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: indicate fatal error in compat netfilter code
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] SELinux: Only return netlink error when we know the return is fatal
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC][PATCH 0/4] security label of the file descriptor structure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/4] fs: passing task credentials to get_empty_filp()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 2/4] fs: move file->f_cred initialization before security_file_alloc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 4/4] smack: modified file->f_security assignment in smack_file_alloc_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 3/4] selinux: use file->f_cred to determine task's SID
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias
- From: Eric Paris <eparis@xxxxxxxxxx>
- setools-cmdline patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- setools-cmdline patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] SELinux UBAC question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux UBAC question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- SELinux UBAC question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [PATCH 2/3] network: tcp_connect should return certain errors up the stack
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] netfilter: allow hooks to pass error code back up the stack
- From: Eric Paris <eparis@xxxxxxxxxx>
- Fw: Sluggishness on a GEM system due to SELinux's sidtab_search_context() as well as get_unmapped_area() (fwd)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Eric hit a bug with sepolgen handing a newer kernel version then the policy handled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: default to user_u for new logins (on RHEL6) ?
- From: Dominick Grift <domg472@xxxxxxxxx>
- default to user_u for new logins (on RHEL6) ?
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- Re: About compile an appplication's policy
- From: sure <mengshuo@xxxxxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: temporal role base access control in Linux
- From: Cliffe <cliffe@xxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: temporal role base access control in Linux
- From: Cliffe <cliffe@xxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- temporal role base access control in Linux
- From: Behnaz Hassanshahi <behnaz.kallen@xxxxxxxxx>
- Re: About compile an appplication's policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- About compile an appplication's policy
- From: sure <mengshuo@xxxxxxxxx>
- Re: CIL: the SELinux Common Intermediate Language
- From: sure <mengshuo@xxxxxxxxx>
- Re: CIL: the SELinux Common Intermediate Language
- From: sure <mengshuo@xxxxxxxxx>
- CIL feature: macro
- From: Chad Sellers <csellers@xxxxxxxxxx>
- CIL: the SELinux Common Intermediate Language
- From: Chad Sellers <csellers@xxxxxxxxxx>
- controlling VM access to different tap devices
- From: "Ryan Haggerty" <rhaggerty@xxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Console Login and SSH Login Security Contexts...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Format of file_contexts file
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Console Login and SSH Login Security Contexts...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Format of file_contexts file
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- RE: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Confining Java application with SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Confining Java application with SELinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Confining Java application with SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Confining Java application with SELinux
- From: mohit verma <mohit89mlnc@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: libGL.so.1
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Confining Java application with SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: [PATCH 1/4] secmark: make secmark object handling generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/6] kernel: rounddown helper function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 1/6] kernel: rounddown helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/6] SELinux: deterministic ordering of range transition rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/6] SELinux: drop useless (and incorrect) AVTAB_MAX_SIZE
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/6] kernel: roundup should only reference arguments once
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/6] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/5] security: secid_to_secctx returns len when data is NULL
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/5] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/5] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: ERROR 'syntax error' at token ':c' on line 42:
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: ERROR 'syntax error' at token ':c' on line 42:
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [refpolicy] ERROR 'syntax error' at token ':c' on line 42:
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ERROR 'syntax error' at token ':c' on line 42:
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ERROR 'syntax error' at token ':c' on line 42:
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- policycoreutils breaks when installing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Context settings after ssh login
- Re: error: ssh_selinux_getctxbyname: Failed to get default SELinux security context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/6] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 5/6] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/6] security: secid_to_secctx returns len when data is NULL
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 5/6] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/6] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/6] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/6] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/6] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: genfscon question
- From: Eric Paris <eparis@xxxxxxxxxx>
- genfscon question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Fedora UBAC feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Fedora UBAC feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- SETools patch: adding exclude type feature in queries
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] refpolicy: hadoop
- From: Dominick Grift <domg472@xxxxxxxxx>
- [PATCH] refpolicy: hadoop
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: What is the risk of allowing audit_write?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: What is the risk of allowing audit_write?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: /dev/xen/evtchn labelling in Debian and auditing
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- /dev/xen/evtchn labelling in Debian and auditing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- What is the risk of allowing audit_write?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]