SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] selinux: convert type_val_to_struct to flex_array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch for python3 for libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Question about "rootcontext=" mount option on /dev
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH] flex_array: add helpers to get and put to make pointers easy to use
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: convert part of the sym_val_to_name array to use flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: convert type_val_to_struct to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] flex_array: add helpers to get and put to make pointers easy to use
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] kernel: rounddown helper function
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Question about "rootcontext=" mount option on /dev
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about policydb_index_*
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Question about "rootcontext=" mount option on /dev
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- question about policydb_index_*
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamicresizing
- From: "Robertson, Matthew L" <Matthew.L.Robertson@xxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH -v3] selinux: convert the policy type_attr_map to flex_array
- From: James Morris <jmorris@xxxxxxxxx>
- memcached permissions
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH -v3] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Matthew Robertson <Matthew.L.Robertson@xxxxxxxxxx>
- [PATCH -v2] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: clamav RWX
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Joe Nall <joe@xxxxxxxx>
- Re: Order 4 allocation in policydb_load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
- From: Eric Paris <eparis@xxxxxxxxxx>
- Order 4 allocation in policydb_load
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: semanage
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- semanage
- From: Ralph Blach <chipper19522@xxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Patch for python3 for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I want to remove DEFAULTUSER handling from get_context_list
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: help with a compiled policy and port 443
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: help with a compiled policy and port 443
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ima-appraisal: CAP_MAC_ADMIN w/SELinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- help with a compiled policy and port 443
- From: Ralph Blach <chipper19522@xxxxxxxxx>
- Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- The third patch for systemd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: implement mmap on /selinux/policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: merlin <merlin@xxxxxxxxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 5/5] SELinux: Move execmod to the common perms
- From: James Morris <jmorris@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- fs_use_xattr
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: This is my first patch for systemd
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] SELinux: Move execmod to the common perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Second patch on systemd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Memory leak question in avc_context_to_sid question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: fuse and selinux don't seem to work well together
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- fuse and selinux don't seem to work well together
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH 3/5] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/5] SELinux: Move execmod to the common perms
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/5] security: make LSMs explicitly mask off permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/5] selinux: place open in the common file perms
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/5] vfs: re-introduce MAY_CHDIR
- From: Eric Paris <eparis@xxxxxxxxxx>
- Second patch on systemd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: move genfs read to a separate function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
- From: James Morris <jmorris@xxxxxxxxx>
- Memory leak question in avc_context_to_sid question
- From: Joe Nall <joe@xxxxxxxx>
- Re: This is my first patch for systemd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: move genfs read to a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This is my first patch for systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: memcached with access controls
- From: Xavier Toth <txtoth@xxxxxxxxx>
- This is my first patch for systemd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: memcached with access controls
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [RFC PATCH URL] mcstrans - SELInux Project contribution
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [RFC PATCH 2/4] mcstrans: utilities
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [RFC PATCH 3/4] mcstrans: manpages
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: libGL.so.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: patch size limits?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- patch size limits?
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH 1/2] SELinux: move genfs read to a separate function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: break ocontext reading into a separate function
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: transactions in semanage
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: restorecon and chroot
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: transactions in semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH] Improve loading performance by 80% using dynamic resizing
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: transactions in semanage
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- libGL.so.1
- From: Russell Coker <russell@xxxxxxxxxxxx>
- transactions in semanage
- From: Russell Coker <russell@xxxxxxxxxxxx>
- terminology
- From: Russell Coker <russell@xxxxxxxxxxxx>
- libsemanage/src/genhomedircon.c and sensitivity
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: restorecon and chroot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: restorecon and chroot
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- restorecon and chroot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Using checkmodule to build "old module versions"
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- Re: Using checkmodule to build "old module versions"
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: recommending interfaces for audit2allow
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Using checkmodule to build "old module versions"
- From: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
- We need this patch for setools to allow it to build on F14.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: clamav RWX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: clamav RWX
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: clamav RWX
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: clamav RWX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: clamav RWX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: clamav RWX
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- Re: clamav RWX
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: clamav RWX
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: clamav RWX
- From: Török Edwin <edwintorok@xxxxxxxxx>
- clamav RWX
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- recommending interfaces for audit2allow
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 04/10] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 04/10] SELinux: Add new labeling type native labels
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: deduplication and SE virtual machines
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 04/10] SELinux: Add new labeling type native labels
- From: James Morris <jmorris@xxxxxxxxx>
- Re: deduplication and SE virtual machines
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 10/10] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 07/10] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 07/10] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 07/10] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 07/10] NFSv4: Introduce new label structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/10] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 10/10] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 07/10] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 09/10] NFS: Extend NFS xattr handlers to accept the security namespace
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 04/10] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 08/10] NFS: Client implementation of Labeled-NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Labeled-NFS: Security Label support in NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 2/3]libsepol
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- interface_info
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3]libsepol
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 1/3]libsemanage Fix warning: parameter 'key' set but not used(and others)
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 1/3]checkpolicy Fix error: variable 'newattr' set but not used(and others as well)
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 0/3] Fix warning messages generated by GCC 4.6
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 2/3]libsepol
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- deduplication and SE virtual machines
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: selinux testsuite
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: selinux testsuite
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: selinux testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux testsuite
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: selinux testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux testsuite
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: selinux testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux testsuite
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- selinux testsuite
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- RE: New to SELinux: how to get familiar
- From: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
- Re: New to SELinux: how to get familiar
- From: Vacheh Sardarian <vsardarian@xxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_required option given and selinux is disabled
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: selinux_required option given and selinux is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: We need libselinux to lie...
- From: Chad Sellers <csellers@xxxxxxxxxx>
- We need libselinux to lie...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- selinux_required option given and selinux is disabled
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- Re: New init system hitting a distro near you.
- From: Paul Moore <paul.moore@xxxxxx>
- Re: New init system hitting a distro near you.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Paul Moore <paul.moore@xxxxxx>
- Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New init system hitting a distro near you.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New init system hitting a distro near you.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- [patch 4/7 v2] selinux: fix error codes in cond_read_node()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 6/7 v2] selinux: fix error codes in cond_read_bool()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 2/7 v2] selinux: propagate error codes in cond_read_list()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 3/7 v2] selinux: fix error codes in cond_read_av_list()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 0/7 v2] selinux: return proper error codes instead of -1
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 1/7 v2] selinux: cleanup return codes in avtab_read_item()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 7/7 v2] selinux: fix error codes in symtab_init()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch 5/7 v2] selinux: fix error codes in cond_policydb_init()
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Developing a SELinux policy for antivirus - How to access /home?
- From: Jeff Johnson <n3npq@xxxxxxx>
- Developing a SELinux policy for antivirus - How to access /home?
- From: Alice Mynona <alice_mynona@xxxxxxxxxxx>
- Re: Benchmarking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Benchmarking
- From: Jason Axelson <bostonvaulter@xxxxxxxxx>
- Benchmarking
- From: Paul Otheim <coriolis220@xxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] SELinux: seperate range transition rules to a seperate function
- From: James Morris <jmorris@xxxxxxxxx>
- [ANNOUNCE] Linux Security Summit 2010 - Schedule Published
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] SELinux: break ocontext reading into a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] SELinux: move genfs read to a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] SELinux: move genfs read to a separate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] SELinux: seperate range transition rules to a seperate function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Display all processes using ps
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Minor fixup of checkmodule man page.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: libselinux APIs should take "const" qualifier?
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Minor fixup of checkmodule man page.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux APIs should take "const" qualifier?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Display all processes using ps
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Re-using SELinux infrastructure for other LSM modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Display all processes using ps
- From: "Dennis Wronka" <linuxweb@xxxxxxx>
- Re: Report of PGcon2010
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Report of PGcon2010
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re-using SELinux infrastructure for other LSM modules
- From: Shaz <shazalive@xxxxxxxxx>
- Display all processes using ps
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: Minor fixup of checkmodule man page.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/4] SELinux: seperate range transition rules to a seperate function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/4] SELinux: move genfs read to a separate function
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/4] SELinux: break ocontext reading into a separate function
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Report of PGcon2010
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: Report of PGcon2010
- From: Stephen Frost <sfrost@xxxxxxxxxxx>
- Re: Report of PGcon2010
- From: Stephen Frost <sfrost@xxxxxxxxxxx>
- Re: libselinux APIs should take "const" qualifier?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Report of PGcon2010
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Removing TE from the policy Model
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Updated sandbox patch.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] [PATCH] Remove duplicate slashes in paths in selabel_lookup
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Updated sandbox patch.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] Add chcon method to libselinux python bindings
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Removing TE from the policy Model
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PATCH: Fix module specification with single number
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: Removing TE from the policy Model
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Removing TE from the policy Model
- From: Shaz <shazalive@xxxxxxxxx>
- Re: mcs_systemhigh use
- From: Andy Warner <warner@xxxxxxxxx>
- Re: mcs_systemhigh use
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: mcs_systemhigh use
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: warning: the frame size of 1072 bytes is larger than 1024 bytes
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: warning: the frame size of 1072 bytes is larger than 1024 bytes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mcs_systemhigh use
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: mcs_systemhigh use
- From: Andy Warner <warner@xxxxxxxxx>
- Re: mcs_systemhigh use
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- mcs_systemhigh use
- From: Andy Warner <warner@xxxxxxxxx>
- warning: the frame size of 1072 bytes is larger than 1024 bytes
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH]security:policydb.h Fix a space with "SE Linux"
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- Re: New to SELinux: how to get familiar
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH 08/10] NFS: Client implementation of Labeled-NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 07/10] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 10/10] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 03/10] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Labeled-NFS: Security Label support in NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 04/10] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 09/10] NFS: Extend NFS xattr handlers to accept the security namespace
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Add chcon method to libselinux python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Updated sandbox patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Updated sandbox patch.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] Add chcon method to libselinux python bindings
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Non-Computing Abstractions & An Issue Thereof
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: Non-Computing Abstractions & An Issue Thereof
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Non-Computing Abstractions & An Issue Thereof
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: inaddr_any_node_t?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] [PATCH] Remove duplicate slashes in paths in selabel_lookup
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: inaddr_any_node_t?
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: inaddr_any_node_t?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- inaddr_any_node_t?
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: Non-Computing Abstractions & An Issue Thereof
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] fs: block cross-uid sticky symlinks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Permissive types
- From: Joe Nall <joe@xxxxxxxx>
- [PATCH 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 5/6] selinux: Convert socket related access controls to use socket labels
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 6/6] selinux: Use current_security() when possible
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/6] selinux: Update socket's label alongside inode's label
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 3/6] selinux: Consolidate sockcreate_sid logic
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 4/6] selinux: Shuffle the sk_security_struct alloc and free routines
- From: Paul Moore <paul.moore@xxxxxx>
- Non-Computing Abstractions & An Issue Thereof
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- RE: How the native device nodes of /dev/* get relabeled?
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Default security module feature of 2.6.34
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Default security module feature of 2.6.34
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default security module feature of 2.6.34
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Default security module feature of 2.6.34
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Default security module feature of 2.6.34
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Updated sandbox patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: install giving the wrong label
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: SELinux support in Libc
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: SELinux support in Libc
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux support in Libc
- From: Shaz <shazalive@xxxxxxxxx>
- Re: SELinux support in Libc
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Updated sandbox patch.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: install giving the wrong label
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux support in Libc
- From: Shaz <shazalive@xxxxxxxxx>
- install giving the wrong label
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [ANN] SELinux Userspace release
- From: Chad Sellers <csellers@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: How the native device nodes of /dev/* get relabeled?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How the native device nodes of /dev/* get relabeled?
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- [ANN] Linux Security Summit 2010 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Yast and selinux
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Updated sandbox patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit_event list ;was Re: How to cross install policy store?
- From: Bryan Kropf <Bryan_Kropf@xxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Howto enable or disable clipboard with selinux?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Howto enable or disable clipboard with selinux?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Updated sandbox patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Howto enable or disable clipboard with selinux?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Howto enable or disable clipboard with selinux?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- RE: How to cross install policy store?
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: [PATCH] selinux: remove all rcu head initializations
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove all rcu head initializations
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: remove all rcu head initializations
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove all rcu head initializations
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
- From: Shaz <shazalive@xxxxxxxxx>
- [PATCH] selinux: remove all rcu head initializations
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Updated sandbox patch.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to cross install policy store?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: How to cross install policy store?
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- How to cross install policy store?
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Two constraint violations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Two constraint violations
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: [refpolicy] A strange usecase
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] A strange usecase
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [refpolicy] A strange usecase
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- A strange usecase
- From: Shaz <shazalive@xxxxxxxxx>
- Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: libvirt-selinux.patch
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Howto enable or disable clipboard with selinux?
- From: Shaz <shazalive@xxxxxxxxx>
- libvirt-selinux.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Pkg-sysvinit-devel] Bug#580272: sysvinit 2.88 and SELinux policy
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Restorecond and .xsession-errors
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Restorecond and .xsession-errors
- From: Dominick Grift <domg472@xxxxxxxxx>
- Restorecond and .xsession-errors
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: [refpolicy] Labeling home directories in refpolicy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: [refpolicy] Labeling home directories in refpolicy (SOLVED)
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- RE: [refpolicy] Labeling home directories in refpolicy
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: New to SELinux: 2nd Edition of The SELinux Notebook released
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy] Labeling home directories in refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Labeling home directories in refpolicy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Labeling home directories in refpolicy
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: Labeling home directories in refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Dbus rules in LPM for a Dbus based service like Network Manager
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Dbus rules in LPM for a Dbus based service like Network Manager
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: New to SELinux: 2nd Edition of The SELinux Notebook released
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [ANN] SETools 3.3.7 Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Dbus rules in LPM for a Dbus based service like Network Manager
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Labeling as part of distribution build process?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Labeling as part of distribution build process?
- From: Stephen Hemminger <shemminger@xxxxxxxxxx>
- Re: Selinux and Apache in chroot question....
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Selinux and Apache in chroot question....
- From: fred.schnittke@xxxxxxxxxx
- RE: New to SELinux: how to get familiar
- From: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
- Re: New to SELinux: how to get familiar
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: New to SELinux: how to get familiar
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Selinux and Apache in chroot question....
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Fix build error with gcc (GCC) 4.6.0 20100416 (experimental)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Selinux and Apache in chroot question....
- From: fred.schnittke@xxxxxxxxxx
- Re: Selinux and Apache in chroot question....
- From: Dominick Grift <domg472@xxxxxxxxx>
- [PATCH] Fix build error with gcc (GCC) 4.6.0 20100416 (experimental)
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: sysvinit 2.88 and SELinux policy
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: Broken pipe Error
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- RE: New to SELinux: how to get familiar
- From: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
- Selinux and Apache in chroot question....
- From: fred.schnittke@xxxxxxxxxx
- sysvinit 2.88 and SELinux policy
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- New to SELinux: how to get familiar
- From: Vacheh Sardarian <vsardarian@xxxxxxxxx>
- Re: determine least upper bound
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SELinux problem on ARM: error while loading shared libraries
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Broken pipe Error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] vfs: re-introduce MAY_CHDIR
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- libsemanage python3 support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Broken pipe Error
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Life cycle process for building products with selinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Life cycle process for building products with selinux
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: determine least upper bound
- From: Andy Warner <warner@xxxxxxxxx>
- Re: The confusing dot operator
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: The confusing dot operator
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Life cycle process for building products with selinux
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: determine least upper bound
- From: Joe Nall <joe@xxxxxxxx>
- Re: Life cycle process for building products with selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Life cycle process for building products with selinux
- From: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I am trying to build an MLS livecd.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Semanage for domain transitions
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: [RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH -v3] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 4/6] selinux: Shuffle the sk_security_struct alloc and free routines
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 0/6] UNIX domain socket fixes and other cleanups
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 6/6] selinux: Use current_security() when possible
- From: Paul Moore <paul.moore@xxxxxx>
- Minor fixup of checkmodule man page.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Semanage for domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Semanage for domain transitions
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux problem on ARM: error while loading shared libraries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /etc/initscript breaks SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security Context after SSH-ing in...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /etc/initscript breaks SELinux
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- SELinux problem on ARM: error while loading shared libraries
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Security Context after SSH-ing in...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Policy in OpenSUSE 11.2
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- SELinux Policy in OpenSUSE 11.2
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: [PATCH -v2] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: place open in the common file perms
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH -v2] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: special dontaudit for access checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] vfs: re-introduce MAY_CHDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: denial even with appropriate allow rules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: place open in the common file perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Move execmod to the common perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: make LSMs explicitly mask off permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: denial even with appropriate allow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: denial even with appropriate allow rules
- From: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: denial even with appropriate allow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- denial even with appropriate allow rules
- From: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELINUX: new permission controlling the ability to set suid
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] SELinux: standardize return code handling in policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Karl MacMillan <kmacmillan@xxxxxxxxxx>
- Re: refpolicy is missing on lots of hits with audit2allow -R.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: return error codes on policy load failure
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: return error codes on policy load failure
- From: James Morris <jmorris@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]