SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 07/10] selinux: Check receiving against sending interface on packet forwarding
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 02/10] selinux: Perform postroute access control checks after IPsec transfomations
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Need Help with Booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Revert "selinux: simplify ioctl checking"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: xfrm - notify users on dropped packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: type_datum changed from define_type() and type_write() ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused packet flow permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- type_datum changed from define_type() and type_write() ?
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- Need Help with Booleans
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- [PATCH] Revert "selinux: simplify ioctl checking"
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: drop unused packet flow permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: drop unused packet flow permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I want to add the following to mcs constraints in SELinux policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: I want to add the following to mcs constraints in SELinux policy
- From: <chanson@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- I want to add the following to mcs constraints in SELinux policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: SELinux MLS and Virtual Machines
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux MLS and Virtual Machines
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH]: setfiles should provide an option to avoid abortion on a missing file
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 2/2]: improve the manual page for setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/2]: clean-up setfiles source code and document two options
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 0/2]: minor improvements and clean-ups for policycoreutils/setfiles
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: inode security state and cluster file systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- inode security state and cluster file systems
- From: Yuri L Volobuev <volobuev@xxxxxxxxxx>
- Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case
- From: Paul Moore <paul.moore@xxxxxx>
- [Fwd: Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets]
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 07/10] selinux: Check receiving against sending interface on packet forwarding
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 06/10] selinux: Fix packet forwarding checks on postrouting
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 05/10] selinux: selinux_xfrm_decode_session check for socket sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 04/10] selinux: Fix wrong checks for selinux_policycap_netpeer
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 03/10] selinux: Remove checks for xfrm transformations from selinux_xfrm_postroute_last
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 02/10] selinux: Perform postroute access control checks after IPsec transfomations
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 01/10] selinux: Fix check for xfrm selinux context algorithm
- From: Paul Moore <paul.moore@xxxxxx>
- Re: selinux_file_context_verify function returns wrong value.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [12744.575074] SELinux: Invalid class 3588
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [12744.575074] SELinux: Invalid class 3588
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- [12744.575074] SELinux: Invalid class 3588
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias V2
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Seeking SELinux work
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHSET RFC] selinux: rework labeled IPsec networking
- From: Paul Moore <paul.moore@xxxxxx>
- Seeking SELinux work
- From: Ted Toth <txtoth@xxxxxxxxx>
- selinux_file_context_verify function returns wrong value.
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: kdm patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Russell Coker <russell@xxxxxxxxxxxx>
- kdm patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- RE: libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei Kaigai <Kohei.Kaigai@xxxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Trouble logging in through SSH
- From: Simon Peter Nicholls <simon@xxxxxxxxxxxxxx>
- Re: Security-enhanced BSD?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security-enhanced BSD?
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- selinux man page fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- RE: Tiny version of SE-PostgreSQL got merged
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Tiny version of SE-PostgreSQL got merged
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- RE: Tiny version of SE-PostgreSQL got merged
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Tiny version of SE-PostgreSQL got merged
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/2] security/selinux: Simplify proc inode to security label mapping
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- [PATCH 2/2] RFC: selinux: sysctl: fix selinux labeling broken by last patch
- From: Lucian Adrian Grijincu <lucian.grijincu@xxxxxxxxx>
- Re: SELinux and Stuxnet
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- SELinux and Stuxnet
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [libselinux] add db_language support on label_db.c
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: libselinux: add selinux_status_* interfaces for /selinux/status
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SeLinux Policy design question
- From: Ethan Heidrick <ethanheidrick@xxxxxxxxx>
- Re: SeLinux Policy design question
- From: Dominick Grift <domg472@xxxxxxxxx>
- SeLinux Policy design question
- From: "Ger Lawlor (gelawlor)" <gelawlor@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 1/3] selinux: return -ENOMEM when memory allocation fails
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4] security:selinux: kill unused MAX_AVTAB_HASH_MASK and ebitmap_startbit
- From: James Morris <jmorris@xxxxxxxxx>
- libselinux: add selinux_status_* interfaces for /selinux/status
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux/SMACK/TOMOYO: ioctl permissions handling is wrong and nonsensicle
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] selinux: return -ENOMEM when memory allocation fails
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux role separation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- WARNING: at kernel/printk.c:430 do_syslog+0x40d/0x441()
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- SELinux role separation
- From: Qwyjibo Jones <qwyjibojones@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxx>
- Re: audit function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit function
- From: mohit verma <mohit89mlnc@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Checkpolicy: Allow filesystem names to start with a digit
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: iodine and SE Linux
- Re: iodine and SE Linux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux Policy compiler doesn't like leading numbers in fs names
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Policy compiler doesn't like leading numbers in fs names
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- SELinux Policy compiler doesn't like leading numbers in fs names
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- iodine and SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SELinux Symposium site
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [libselinux] add db_language support on label_db.c
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: libsemanage patch for MCS/MLS in user files
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libsemanage patch for MCS/MLS in user files
- From: Joe Nall <joe@xxxxxxxx>
- libsemanage patch for MCS/MLS in user files
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Rearranged audit2allow.1 to match the newer ways we use the tool.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Checkpolicy patch to allow version of single digit.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] ima: fix add LSM rule bug
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [ANN] SELinux Userspace release
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch move newrole to file capabilities and uses libcapng
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] ima: fix add LSM rule bug
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds python3 bindings.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] SELinux: define permissions for DCB netlink messages
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I think it is time to turn off default user handling in libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] [PATCH 0/3] Fix warning messages generated by GCC 4.6
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: type bounds for files?
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] SELinux: define permissions for DCB netlink messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: type bounds for files?
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: type bounds for files?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- type bounds for files?
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: This patch adds some output to load_policy to say which policy file it tries to load.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Unit testing userspace
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] ANN: Reference Policy Release
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: Unit testing userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Unit testing userspace
- From: Jeff Johnson <n3npq@xxxxxxx>
- Re: Unit testing userspace
- From: Chad Sellers <csellers@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Fwd: [rhel5-cc-external-list] SELinux: refpolicy-2.20091117
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Semanage Patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Unit testing userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Policycoreutils-scripts patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch move newrole to file capabilities and uses libcapng
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Sandbox Patch (Resend with patch)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Sandbox Patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch breaks changes restorecond to use setfiles code for checking.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch adds some output to load_policy to say which policy file it tries to load.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Here is the current sepolgen patch from Fedora.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch adds python3 bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I think it is time to turn off default user handling in libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: selinux policy for encrypted files
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: selinux policy for encrypted files
- From: "Roberto Sassu" <roberto.sassu@xxxxxxxxx>
- Re: [refpolicy] [PATCH] New database object classes
- From: Andy Warner <warner@xxxxxxxxx>
- [PATCH] New database object classes
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- selinux policy for encrypted files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Recent status of SE-PostgreSQL
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- [RFC][PATCH 2/2] selinux: fs associate permission check in inode_doinit_with_dentry()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/2] selinux: call may_context_mount_inode_relabel() if fscontext_sid is defined
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Recent status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: cache sidtab_context_to_sid results
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] fs/vfs/security: pass last path component to LSM on inode creation
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC PATCH 2/2] SELinux: Use dentry name in new object labeling
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH] selinux: cache sidtab_context_to_sid results
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eric Blake <eblake@xxxxxxxxxx>
- Re: [PATCH] SELinux: do not compute transition labels on mountpoint labeled filesystems
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: do not compute transition labels on mountpoint labeled filesystems
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: What can selinux do that "audit" by itself cant do ?
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- We have a problem with libselinux leaking memory using __thread
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What can selinux do that "audit" by itself cant do ?
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- What can selinux do that "audit" by itself cant do ?
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- libselinux memory leak in multi-threaded processes due to abuse of __thread
- From: Eric Blake <eblake@xxxxxxxxxx>
- Re: analysing optional policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: analysing optional policy
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: analysing optional policy
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: analysing optional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- analysing optional policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: do not set automatic i_ino in selinuxfs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4] flex_array: fix flex_array_put_ptr macro to be valid C
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: do not set automatic i_ino in selinuxfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] SELinux: merge policydb_index_classes and policydb_index_others
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] selinux: convert part of the sym_val_to_name array to use flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] flex_array: fix flex_array_put_ptr macro to be valid C
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] selinux: convert type_val_to_struct to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Only return netlink error when we know the return is fatal
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] SELinux: indicate fatal error in compat netfilter code
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: indicate fatal error in compat netfilter code
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] SELinux: Only return netlink error when we know the return is fatal
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC][PATCH 0/4] security label of the file descriptor structure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 1/4] fs: passing task credentials to get_empty_filp()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 2/4] fs: move file->f_cred initialization before security_file_alloc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 4/4] smack: modified file->f_security assignment in smack_file_alloc_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 3/4] selinux: use file->f_cred to determine task's SID
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias
- From: Eric Paris <eparis@xxxxxxxxxx>
- setools-cmdline patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- setools-cmdline patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] fs: call security_d_instantiate in d_obtain_alias
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] SELinux UBAC question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux UBAC question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- SELinux UBAC question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [PATCH 2/3] network: tcp_connect should return certain errors up the stack
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: return -ECONNREFUSED from ip_postroute to signal fatal error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] netfilter: allow hooks to pass error code back up the stack
- From: Eric Paris <eparis@xxxxxxxxxx>
- Fw: Sluggishness on a GEM system due to SELinux's sidtab_search_context() as well as get_unmapped_area() (fwd)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Eric hit a bug with sepolgen handing a newer kernel version then the policy handled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: default to user_u for new logins (on RHEL6) ?
- From: Dominick Grift <domg472@xxxxxxxxx>
- default to user_u for new logins (on RHEL6) ?
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- Re: About compile an appplication's policy
- From: sure <mengshuo@xxxxxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: temporal role base access control in Linux
- From: Cliffe <cliffe@xxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- Re: temporal role base access control in Linux
- From: Cliffe <cliffe@xxxxxx>
- Re: temporal role base access control in Linux
- From: "cto@xxxxxxxxxxxxxxxxxx" <cto@xxxxxxxxxxxxxxxxxx>
- temporal role base access control in Linux
- From: Behnaz Hassanshahi <behnaz.kallen@xxxxxxxxx>
- Re: About compile an appplication's policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- About compile an appplication's policy
- From: sure <mengshuo@xxxxxxxxx>
- Re: CIL: the SELinux Common Intermediate Language
- From: sure <mengshuo@xxxxxxxxx>
- Re: CIL: the SELinux Common Intermediate Language
- From: sure <mengshuo@xxxxxxxxx>
- CIL feature: macro
- From: Chad Sellers <csellers@xxxxxxxxxx>
- CIL: the SELinux Common Intermediate Language
- From: Chad Sellers <csellers@xxxxxxxxxx>
- controlling VM access to different tap devices
- From: "Ryan Haggerty" <rhaggerty@xxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Console Login and SSH Login Security Contexts...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: HarryCiao <harrytaurus2002@xxxxxxxxxxx>
- RE: Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Format of file_contexts file
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Console Login and SSH Login Security Contexts...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Console Login and SSH Login Security Contexts...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Format of file_contexts file
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- RE: Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Please Recommend Very Good, Easy to Understand, and Concise Learning Guides for SELinux
- From: "Singapore Citizen Mr. Teo En Ming (Zhang Enming) 张恩鸣 " <space.time.universe@xxxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Confining Java application with SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Confining Java application with SELinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Confining Java application with SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Confining Java application with SELinux
- From: mohit verma <mohit89mlnc@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: libGL.so.1
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Confining Java application with SELinux
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [refpolicy] load_policy() with upstart on mint 9 fluxbox
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: Shaz <shazalive@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: load_policy() with upstart on mint 9 fluxbox
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- load_policy() with upstart on mint 9 fluxbox
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: [PATCH 1/4] secmark: make secmark object handling generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/6] kernel: rounddown helper function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 1/6] kernel: rounddown helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/6] SELinux: deterministic ordering of range transition rules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/6] SELinux: drop useless (and incorrect) AVTAB_MAX_SIZE
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/6] kernel: roundup should only reference arguments once
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/6] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/6] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/5] security: secid_to_secctx returns len when data is NULL
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/5] secmark: do not return early if there was no error
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/5] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/5] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/5] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/5] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/5] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: ERROR 'syntax error' at token ':c' on line 42:
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: ERROR 'syntax error' at token ':c' on line 42:
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [refpolicy] ERROR 'syntax error' at token ':c' on line 42:
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ERROR 'syntax error' at token ':c' on line 42:
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ERROR 'syntax error' at token ':c' on line 42:
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- policycoreutils breaks when installing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Context settings after ssh login
- Re: Context settings after ssh login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Context settings after ssh login
- Re: error: ssh_selinux_getctxbyname: Failed to get default SELinux security context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/6] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 5/6] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/6] security: secid_to_secctx returns len when data is NULL
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 5/6] conntrack: export lsm context rather than internal secid via netlink
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/6] secmark: make secmark object handling generic
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/6] secmark: do not return early if there was no error
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/6] security: secid_to_secctx returns len when data is NULL
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 6/6] secmark: export secctx, drop secmark in procfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/6] secmark: export binary yes/no rather than kernel internal secid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: genfscon question
- From: Eric Paris <eparis@xxxxxxxxxx>
- genfscon question
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Fedora UBAC feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Fedora UBAC feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix parallel compile error
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: James Morris <jmorris@xxxxxxxxx>
- SETools patch: adding exclude type feature in queries
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] refpolicy: hadoop
- From: Dominick Grift <domg472@xxxxxxxxx>
- [PATCH] refpolicy: hadoop
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: What is the risk of allowing audit_write?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: What is the risk of allowing audit_write?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: /dev/xen/evtchn labelling in Debian and auditing
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- /dev/xen/evtchn labelling in Debian and auditing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- What is the risk of allowing audit_write?
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- selinux vs devtmpfs (vs udev)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Fast status update interface (/selinux/status)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: Thomas <tom@xxxxxxxxxxxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: Thomas <tom@xxxxxxxxxxxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Enable selinux in SLES 11
- Re: Enable selinux in SLES 11
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Enable selinux in SLES 11
- Re: Enable selinux in SLES 11
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Enable selinux in SLES 11
- Re: Enable selinux in SLES 11
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Enable selinux in SLES 11
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Enable selinux in SLES 11
- Re: [PATCH]include/dixaccess.h fix comment.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH]include/dixaccess.h fix comment.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] Problem about audit-test-2090 + refpolicy-2.20091117
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Problem about audit-test-2090 + refpolicy-2.20091117
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: Problem about audit-test-2090 + refpolicy-2.20091117
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Problem about audit-test-2090 + refpolicy-2.20091117
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Problem about audit-test-2090 + refpolicy-2.20091117
- From: Paul Moore <paul.moore@xxxxxx>
- Problem about audit-test-2090 + refpolicy-2.20091117
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
- From: James Morris <jmorris@xxxxxxxxx>
- Re: memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Bug in restorecond for the first user logged in
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug in restorecond for the first user logged in
- From: Chris Adams <cmadams@xxxxxxxxxx>
- Bug in restorecond for the first user logged in
- From: Chris Adams <cmadams@xxxxxxxxxx>
- Re: User defined roles on Linux
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: User defined roles on Linux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: User defined roles on Linux
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- User defined roles on Linux
- From: "S, Senthilprabu (NSN - IN/Bangalore)" <senthilprabu.s@xxxxxxx>
- Re: [PATCH] SELINUX: Fix build error.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] kernel: rounddown helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: convert type_val_to_struct to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch for python3 for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: convert type_val_to_struct to flex_array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch for python3 for libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Question about "rootcontext=" mount option on /dev
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH] flex_array: add helpers to get and put to make pointers easy to use
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: convert part of the sym_val_to_name array to use flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: convert type_val_to_struct to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] flex_array: add helpers to get and put to make pointers easy to use
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] kernel: rounddown helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Question about "rootcontext=" mount option on /dev
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about policydb_index_*
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Question about "rootcontext=" mount option on /dev
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- question about policydb_index_*
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamicresizing
- From: "Robertson, Matthew L" <Matthew.L.Robertson@xxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH -v3] selinux: convert the policy type_attr_map to flex_array
- From: James Morris <jmorris@xxxxxxxxx>
- memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH -v3] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Matthew Robertson <Matthew.L.Robertson@xxxxxxxxxx>
- [PATCH -v2] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: clamav RWX
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Joe Nall <joe@xxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Order 4 allocation in policydb_load
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: semanage
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- semanage
- From: Ralph Blach <chipper19522@xxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Patch for python3 for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I want to remove DEFAULTUSER handling from get_context_list
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: help with a compiled policy and port 443
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: help with a compiled policy and port 443
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- help with a compiled policy and port 443
- From: Ralph Blach <chipper19522@xxxxxxxxx>
- Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- The third patch for systemd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: merlin <merlin@xxxxxxxxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 5/5] SELinux: Move execmod to the common perms
- From: James Morris <jmorris@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- fs_use_xattr
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: This is my first patch for systemd
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] SELinux: Move execmod to the common perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Second patch on systemd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Memory leak question in avc_context_to_sid question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH 3/5] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/5] SELinux: Move execmod to the common perms
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/5] selinux: place open in the common file perms
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/5] vfs: re-introduce MAY_CHDIR
- From: Eric Paris <eparis@xxxxxxxxxx>
- Second patch on systemd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: move genfs read to a separate function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
- From: James Morris <jmorris@xxxxxxxxx>
- Memory leak question in avc_context_to_sid question
- From: Joe Nall <joe@xxxxxxxx>
- Re: This is my first patch for systemd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: move genfs read to a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]