SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
selinux vs devtmpfs (vs udev)
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] Fast status update interface (/selinux/status)
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH] Fast status update interface (/selinux/status)
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: memcached permissions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] Fast status update interface (/selinux/status)
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] Fast status update interface (/selinux/status)
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] Fast status update interface (/selinux/status)
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
[PATCH] Fast status update interface (/selinux/status)
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: Enable selinux in SLES 11
From
: Thomas <tom@xxxxxxxxxxxxxxxxxx>
Re: Enable selinux in SLES 11
From
: Thomas <tom@xxxxxxxxxxxxxxxxxx>
Re: Enable selinux in SLES 11
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Enable selinux in SLES 11
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Enable selinux in SLES 11
From
: imsand@xxxxxxxxx
Re: Enable selinux in SLES 11
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Enable selinux in SLES 11
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Enable selinux in SLES 11
From
: imsand@xxxxxxxxx
Re: Enable selinux in SLES 11
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Enable selinux in SLES 11
From
: imsand@xxxxxxxxx
Re: Enable selinux in SLES 11
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Enable selinux in SLES 11
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Enable selinux in SLES 11
From
: imsand@xxxxxxxxx
Re: [PATCH]include/dixaccess.h fix comment.
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[PATCH]include/dixaccess.h fix comment.
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: [refpolicy] Problem about audit-test-2090 + refpolicy-2.20091117
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [refpolicy] Problem about audit-test-2090 + refpolicy-2.20091117
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
RE: Problem about audit-test-2090 + refpolicy-2.20091117
From
: Paul Moore <paul.moore@xxxxxx>
RE: Problem about audit-test-2090 + refpolicy-2.20091117
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: Problem about audit-test-2090 + refpolicy-2.20091117
From
: Paul Moore <paul.moore@xxxxxx>
Problem about audit-test-2090 + refpolicy-2.20091117
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
SELinux xace crash with xfce4: Caught signal 11 (Segmentation fault). Server aborting
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
From
: James Morris <jmorris@xxxxxxxxx>
Re: memcached permissions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: Bug in restorecond for the first user logged in
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Bug in restorecond for the first user logged in
From
: Chris Adams <cmadams@xxxxxxxxxx>
Bug in restorecond for the first user logged in
From
: Chris Adams <cmadams@xxxxxxxxxx>
Re: User defined roles on Linux
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Re: User defined roles on Linux
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: User defined roles on Linux
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
User defined roles on Linux
From
: "S, Senthilprabu (NSN - IN/Bangalore)" <senthilprabu.s@xxxxxxx>
Re: [PATCH] SELINUX: Fix build error.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] kernel: rounddown helper function
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: memcached permissions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] selinux: convert type_val_to_struct to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Patch for python3 for libselinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] selinux: convert type_val_to_struct to flex_array
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Patch for python3 for libselinux
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: [PATCH] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: Question about "rootcontext=" mount option on /dev
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: [PATCH] flex_array: add helpers to get and put to make pointers easy to use
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] selinux: convert part of the sym_val_to_name array to use flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] selinux: convert type_val_to_struct to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] flex_array: add helpers to get and put to make pointers easy to use
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] selinux: type_bounds_sanity_check has a meaningless variable declaration
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/4] SELinux: standardize return code handling in policydb.c
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 3/4] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/4] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 4/4] selinux: rework security_netlbl_secattr_to_sid
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] kernel: rounddown helper function
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Question about "rootcontext=" mount option on /dev
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: question about policydb_index_*
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Question about "rootcontext=" mount option on /dev
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
question about policydb_index_*
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamicresizing
From
: "Robertson, Matthew L" <Matthew.L.Robertson@xxxxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamic resizing
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: memcached permissions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH -v3] selinux: convert the policy type_attr_map to flex_array
From
: James Morris <jmorris@xxxxxxxxx>
memcached permissions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
[PATCH -v3] selinux: convert the policy type_attr_map to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] Improve loading performance by 80% using dynamic resizing
From
: Matthew Robertson <Matthew.L.Robertson@xxxxxxxxxx>
[PATCH -v2] selinux: convert the policy type_attr_map to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Order 4 allocation in policydb_load
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Order 4 allocation in policydb_load
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Order 4 allocation in policydb_load
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Order 4 allocation in policydb_load
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: clamav RWX
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [RFC PATCH] selinux: convert the policy type_attr_map to flex_array
From
: Joe Nall <joe@xxxxxxxx>
Re: Order 4 allocation in policydb_load
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC PATCH] selinux: convert the policy type_attr_map to flex_array
From
: Eric Paris <eparis@xxxxxxxxxx>
Order 4 allocation in policydb_load
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: semanage
From
: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
semanage
From
: Ralph Blach <chipper19522@xxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Patch for python3 for libselinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
I want to remove DEFAULTUSER handling from get_context_list
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: help with a compiled policy and port 443
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: help with a compiled policy and port 443
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: This is my first patch for systemd
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
ima-appraisal: CAP_MAC_ADMIN w/SELinux
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
help with a compiled policy and port 443
From
: Ralph Blach <chipper19522@xxxxxxxxx>
Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: [PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
The third patch for systemd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
[PATCH 1/2] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 2/2] selinux: implement mmap on /selinux/policy
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: merlin <merlin@xxxxxxxxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: [PATCH 5/5] SELinux: Move execmod to the common perms
From
: James Morris <jmorris@xxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
fs_use_xattr
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: This is my first patch for systemd
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
Re: [PATCH 5/5] SELinux: Move execmod to the common perms
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/5] security: make LSMs explicitly mask off permissions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Second patch on systemd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: This is my first patch for systemd
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Memory leak question in avc_context_to_sid question
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: fuse and selinux don't seem to work well together
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
fuse and selinux don't seem to work well together
From
: Xavier Toth <txtoth@xxxxxxxxx>
[PATCH 3/5] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 5/5] SELinux: Move execmod to the common perms
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/5] security: make LSMs explicitly mask off permissions
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 4/5] selinux: place open in the common file perms
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/5] vfs: re-introduce MAY_CHDIR
From
: Eric Paris <eparis@xxxxxxxxxx>
Second patch on systemd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: This is my first patch for systemd
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 1/2] SELinux: move genfs read to a separate function
From
: James Morris <jmorris@xxxxxxxxx>
Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
From
: James Morris <jmorris@xxxxxxxxx>
Memory leak question in avc_context_to_sid question
From
: Joe Nall <joe@xxxxxxxx>
Re: This is my first patch for systemd
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: This is my first patch for systemd
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: This is my first patch for systemd
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [patch 7/7 v2] selinux: fix error codes in symtab_init()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] SELinux: break ocontext reading into a separate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] SELinux: move genfs read to a separate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamic resizing
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: This is my first patch for systemd
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: memcached with access controls
From
: Xavier Toth <txtoth@xxxxxxxxx>
This is my first patch for systemd
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: memcached with access controls
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
[RFC PATCH URL] mcstrans - SELInux Project contribution
From
: Xavier Toth <txtoth@xxxxxxxxx>
[RFC PATCH 2/4] mcstrans: utilities
From
: Xavier Toth <txtoth@xxxxxxxxx>
[RFC PATCH 3/4] mcstrans: manpages
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: libGL.so.1
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: patch size limits?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
patch size limits?
From
: Xavier Toth <txtoth@xxxxxxxxx>
[PATCH 1/2] SELinux: move genfs read to a separate function
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/2] SELinux: break ocontext reading into a separate function
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: transactions in semanage
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: restorecon and chroot
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: transactions in semanage
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamic resizing
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamic resizing
From
: Joe Nall <joe@xxxxxxxx>
Re: [PATCH] Improve loading performance by 80% using dynamic resizing
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
Re: transactions in semanage
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
libGL.so.1
From
: Russell Coker <russell@xxxxxxxxxxxx>
transactions in semanage
From
: Russell Coker <russell@xxxxxxxxxxxx>
terminology
From
: Russell Coker <russell@xxxxxxxxxxxx>
libsemanage/src/genhomedircon.c and sensitivity
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: restorecon and chroot
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
Re: restorecon and chroot
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
restorecon and chroot
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: Using checkmodule to build "old module versions"
From
: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
Re: Using checkmodule to build "old module versions"
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: recommending interfaces for audit2allow
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Using checkmodule to build "old module versions"
From
: Jason Axelson <jaxelson@xxxxxxxxxxxxxx>
We need this patch for setools to allow it to build on F14.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: clamav RWX
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: clamav RWX
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
Re: clamav RWX
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: clamav RWX
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
Re: clamav RWX
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: clamav RWX
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
Re: clamav RWX
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: clamav RWX
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: clamav RWX
From
: Török Edwin <edwintorok@xxxxxxxxx>
clamav RWX
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
recommending interfaces for audit2allow
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 04/10] SELinux: Add new labeling type native labels
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 04/10] SELinux: Add new labeling type native labels
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 04/10] SELinux: Add new labeling type native labels
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 10/10] NFSD: Server implementation of MAC Labeling
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: deduplication and SE virtual machines
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 04/10] SELinux: Add new labeling type native labels
From
: James Morris <jmorris@xxxxxxxxx>
Re: deduplication and SE virtual machines
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 10/10] NFSD: Server implementation of MAC Labeling
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 07/10] NFSv4: Introduce new label structure
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 07/10] NFSv4: Introduce new label structure
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 07/10] NFSv4: Introduce new label structure
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 07/10] NFSv4: Introduce new label structure
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH 03/10] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 10/10] NFSD: Server implementation of MAC Labeling
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 07/10] NFSv4: Introduce new label structure
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 09/10] NFS: Extend NFS xattr handlers to accept the security namespace
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 04/10] SELinux: Add new labeling type native labels
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 08/10] NFS: Client implementation of Labeled-NFS
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Labeled-NFS: Security Label support in NFSv4
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH 2/3]libsepol
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
interface_info
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH 2/3]libsepol
From
: Russell Coker <russell@xxxxxxxxxxxx>
[PATCH 1/3]libsemanage Fix warning: parameter 'key' set but not used(and others)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[PATCH 1/3]checkpolicy Fix error: variable 'newattr' set but not used(and others as well)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[PATCH 0/3] Fix warning messages generated by GCC 4.6
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[PATCH 2/3]libsepol
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
deduplication and SE virtual machines
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: selinux testsuite
From
: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
Re: selinux testsuite
From
: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
Re: selinux testsuite
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: selinux testsuite
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: selinux testsuite
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: selinux testsuite
From
: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
Re: selinux testsuite
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: selinux testsuite
From
: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
selinux testsuite
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
Rebuilding Modified Base Policy on RHEL6 (was on-Computing Abstractions & An Issue Thereof)
From
: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
RE: New to SELinux: how to get familiar
From
: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
Re: New to SELinux: how to get familiar
From
: Vacheh Sardarian <vsardarian@xxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Xavier Toth <txtoth@xxxxxxxxx>
Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: We need libselinux to lie...
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: We need libselinux to lie...
From
: Paul Howarth <paul@xxxxxxxxxxxx>
Re: We need libselinux to lie...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: We need libselinux to lie...
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: selinux_required option given and selinux is disabled
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: selinux_required option given and selinux is disabled
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: We need libselinux to lie...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: We need libselinux to lie...
From
: Chad Sellers <csellers@xxxxxxxxxx>
We need libselinux to lie...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
selinux_required option given and selinux is disabled
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
Re: New init system hitting a distro near you.
From
: Paul Moore <paul.moore@xxxxxx>
Re: New init system hitting a distro near you.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Paul Moore <paul.moore@xxxxxx>
Developing a SELinux policy for antivirus - Activating a boolean variable when another has been actived
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: New init system hitting a distro near you.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
New init system hitting a distro near you.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
[patch 4/7 v2] selinux: fix error codes in cond_read_node()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 6/7 v2] selinux: fix error codes in cond_read_bool()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 2/7 v2] selinux: propagate error codes in cond_read_list()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 3/7 v2] selinux: fix error codes in cond_read_av_list()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 0/7 v2] selinux: return proper error codes instead of -1
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 1/7 v2] selinux: cleanup return codes in avtab_read_item()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 7/7 v2] selinux: fix error codes in symtab_init()
From
: Dan Carpenter <error27@xxxxxxxxx>
[patch 5/7 v2] selinux: fix error codes in cond_policydb_init()
From
: Dan Carpenter <error27@xxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Developing a SELinux policy for antivirus - How to access /home?
From
: Jeff Johnson <n3npq@xxxxxxx>
Developing a SELinux policy for antivirus - How to access /home?
From
: Alice Mynona <alice_mynona@xxxxxxxxxxx>
Re: Benchmarking
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Benchmarking
From
: Jason Axelson <bostonvaulter@xxxxxxxxx>
Benchmarking
From
: Paul Otheim <coriolis220@xxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH 1/4] SELinux: seperate range transition rules to a seperate function
From
: James Morris <jmorris@xxxxxxxxx>
[ANNOUNCE] Linux Security Summit 2010 - Schedule Published
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 3/4] SELinux: break ocontext reading into a separate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/4] SELinux: move genfs read to a separate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/4] SELinux: move genfs read to a separate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/4] SELinux: seperate range transition rules to a seperate function
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Display all processes using ps
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: Minor fixup of checkmodule man page.
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: libselinux APIs should take "const" qualifier?
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: Minor fixup of checkmodule man page.
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: libselinux APIs should take "const" qualifier?
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: Display all processes using ps
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Re-using SELinux infrastructure for other LSM modules
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Display all processes using ps
From
: "Dennis Wronka" <linuxweb@xxxxxxx>
Re: Report of PGcon2010
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: Report of PGcon2010
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re-using SELinux infrastructure for other LSM modules
From
: Shaz <shazalive@xxxxxxxxx>
Display all processes using ps
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: Minor fixup of checkmodule man page.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
[PATCH 4/4] SELinux: allow userspace to read policy back out of the kernel
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/4] SELinux: seperate range transition rules to a seperate function
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/4] SELinux: move genfs read to a separate function
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 3/4] SELinux: break ocontext reading into a separate function
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Report of PGcon2010
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: Report of PGcon2010
From
: Stephen Frost <sfrost@xxxxxxxxxxx>
Re: Report of PGcon2010
From
: Stephen Frost <sfrost@xxxxxxxxxxx>
Re: libselinux APIs should take "const" qualifier?
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Report of PGcon2010
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: Removing TE from the policy Model
From
: Shaz <shazalive@xxxxxxxxx>
Re: [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Updated sandbox patch.
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: [PATCH] [PATCH] Remove duplicate slashes in paths in selabel_lookup
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: Updated sandbox patch.
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: [PATCH] Add chcon method to libselinux python bindings
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: Removing TE from the policy Model
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
PATCH: Fix module specification with single number
From
: Thomas Liu <tliu@xxxxxxxxxx>
Re: Removing TE from the policy Model
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Removing TE from the policy Model
From
: Shaz <shazalive@xxxxxxxxx>
Re: mcs_systemhigh use
From
: Andy Warner <warner@xxxxxxxxx>
Re: mcs_systemhigh use
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: mcs_systemhigh use
From
: Andy Warner <warner@xxxxxxxxx>
Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: warning: the frame size of 1072 bytes is larger than 1024 bytes
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: warning: the frame size of 1072 bytes is larger than 1024 bytes
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: mcs_systemhigh use
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: mcs_systemhigh use
From
: Andy Warner <warner@xxxxxxxxx>
Re: mcs_systemhigh use
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
mcs_systemhigh use
From
: Andy Warner <warner@xxxxxxxxx>
warning: the frame size of 1072 bytes is larger than 1024 bytes
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH]security:policydb.h Fix a space with "SE Linux"
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH]security:policydb.h Fix a space with "SE Linux"
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
Re: New to SELinux: how to get familiar
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[PATCH 08/10] NFS: Client implementation of Labeled-NFS
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 07/10] NFSv4: Introduce new label structure
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 01/10] Security: Add hook to calculate context based on a negative dentry.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 10/10] NFSD: Server implementation of MAC Labeling
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 03/10] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 02/10] Security: Add Hook to test if the particular xattr is part of a MAC model.
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 06/10] NFSv4: Add label recommended attribute and NFSv4 flags
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Labeled-NFS: Security Label support in NFSv4
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 04/10] SELinux: Add new labeling type native labels
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 05/10] KConfig: Add KConfig entries for Labeled NFS
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[PATCH 09/10] NFS: Extend NFS xattr handlers to accept the security namespace
From
: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Re: [PATCH] Add chcon method to libselinux python bindings
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Updated sandbox patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Updated sandbox patch.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
[PATCH] Add chcon method to libselinux python bindings
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
Re: Non-Computing Abstractions & An Issue Thereof
From
: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
Re: Non-Computing Abstractions & An Issue Thereof
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: Non-Computing Abstractions & An Issue Thereof
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: inaddr_any_node_t?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] [PATCH] Remove duplicate slashes in paths in selabel_lookup
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: inaddr_any_node_t?
From
: Larry Ross <selinux.larry@xxxxxxxxx>
Re: inaddr_any_node_t?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
inaddr_any_node_t?
From
: Larry Ross <selinux.larry@xxxxxxxxx>
Re: Non-Computing Abstractions & An Issue Thereof
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] fs: block cross-uid sticky symlinks
From
: Eric Paris <eparis@xxxxxxxxxx>
Permissive types
From
: Joe Nall <joe@xxxxxxxx>
[PATCH 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 5/6] selinux: Convert socket related access controls to use socket labels
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 6/6] selinux: Use current_security() when possible
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 0/6] SELinux UNIX domain socket fixes/cleanup
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 1/6] selinux: Update socket's label alongside inode's label
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 3/6] selinux: Consolidate sockcreate_sid logic
From
: Paul Moore <paul.moore@xxxxxx>
[PATCH 4/6] selinux: Shuffle the sk_security_struct alloc and free routines
From
: Paul Moore <paul.moore@xxxxxx>
Non-Computing Abstractions & An Issue Thereof
From
: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
RE: How the native device nodes of /dev/* get relabeled?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: Default security module feature of 2.6.34
From
: Shaz <shazalive@xxxxxxxxx>
Re: Default security module feature of 2.6.34
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Default security module feature of 2.6.34
From
: Shaz <shazalive@xxxxxxxxx>
Re: Default security module feature of 2.6.34
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Default security module feature of 2.6.34
From
: Shaz <shazalive@xxxxxxxxx>
Re: Updated sandbox patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: install giving the wrong label
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Re: SELinux support in Libc
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Re: SELinux support in Libc
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: SELinux support in Libc
From
: Shaz <shazalive@xxxxxxxxx>
Re: SELinux support in Libc
From
: Shaz <shazalive@xxxxxxxxx>
Re: Updated sandbox patch.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: install giving the wrong label
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
SELinux support in Libc
From
: Shaz <shazalive@xxxxxxxxx>
install giving the wrong label
From
: Chad Sellers <csellers@xxxxxxxxxx>
[ANN] SELinux Userspace release
From
: Chad Sellers <csellers@xxxxxxxxxx>
ANN: Reference Policy Release
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: How the native device nodes of /dev/* get relabeled?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
How the native device nodes of /dev/* get relabeled?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
[ANN] Linux Security Summit 2010 - Announcement and CFP
From
: James Morris <jmorris@xxxxxxxxx>
Yast and selinux
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: How to cross install policy store?
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Updated sandbox patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
audit_event list ;was Re: How to cross install policy store?
From
: Bryan Kropf <Bryan_Kropf@xxxxxxxxxxxx>
Re: How to cross install policy store?
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [refpolicy] Howto enable or disable clipboard with selinux?
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Howto enable or disable clipboard with selinux?
From
: Shaz <shazalive@xxxxxxxxx>
Re: Updated sandbox patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Howto enable or disable clipboard with selinux?
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Howto enable or disable clipboard with selinux?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
RE: How to cross install policy store?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
From
: waqar afridi <afridi.waqar@xxxxxxxxx>
Re: [PATCH] selinux: remove all rcu head initializations
From
: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: remove all rcu head initializations
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] selinux: remove all rcu head initializations
From
: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: remove all rcu head initializations
From
: James Morris <jmorris@xxxxxxxxx>
Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
From
: Shaz <shazalive@xxxxxxxxx>
[PATCH] selinux: remove all rcu head initializations
From
: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
Re: Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Updated sandbox patch.
From
: Steve Lawrence <slawrence@xxxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: How to cross install policy store?
From
: Shaz <shazalive@xxxxxxxxx>
Re: How to cross install policy store?
From
: waqar afridi <afridi.waqar@xxxxxxxxx>
How to cross install policy store?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: Two constraint violations
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Two constraint violations
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: [refpolicy] A strange usecase
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [refpolicy] A strange usecase
From
: Shaz <shazalive@xxxxxxxxx>
Re: [refpolicy] A strange usecase
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
A strange usecase
From
: Shaz <shazalive@xxxxxxxxx>
Need Help with security: ebitmap: map size 0 does not match my size 64 (high bit was 4)
From
: waqar afridi <afridi.waqar@xxxxxxxxx>
Re: libvirt-selinux.patch
From
: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
Howto enable or disable clipboard with selinux?
From
: Shaz <shazalive@xxxxxxxxx>
libvirt-selinux.patch
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [Pkg-sysvinit-devel] Bug#580272: sysvinit 2.88 and SELinux policy
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
Re: Restorecond and .xsession-errors
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Restorecond and .xsession-errors
From
: Dominick Grift <domg472@xxxxxxxxx>
Restorecond and .xsession-errors
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: [refpolicy] Labeling home directories in refpolicy
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
RE: [refpolicy] Labeling home directories in refpolicy (SOLVED)
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: [refpolicy] Labeling home directories in refpolicy
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: New to SELinux: 2nd Edition of The SELinux Notebook released
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: [refpolicy] Labeling home directories in refpolicy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [refpolicy] Labeling home directories in refpolicy
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Labeling home directories in refpolicy
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: Labeling home directories in refpolicy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Dbus rules in LPM for a Dbus based service like Network Manager
From
: Shaz <shazalive@xxxxxxxxx>
Re: Dbus rules in LPM for a Dbus based service like Network Manager
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: New to SELinux: 2nd Edition of The SELinux Notebook released
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[ANN] SETools 3.3.7 Release
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Dbus rules in LPM for a Dbus based service like Network Manager
From
: Shaz <shazalive@xxxxxxxxx>
Re: Labeling as part of distribution build process?
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Labeling as part of distribution build process?
From
: Stephen Hemminger <shemminger@xxxxxxxxxx>
Re: Selinux and Apache in chroot question....
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Selinux and Apache in chroot question....
From
: fred.schnittke@xxxxxxxxxx
RE: New to SELinux: how to get familiar
From
: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
Re: New to SELinux: how to get familiar
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: New to SELinux: how to get familiar
From
: Chad Sellers <csellers@xxxxxxxxxx>
Re: Selinux and Apache in chroot question....
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Fix build error with gcc (GCC) 4.6.0 20100416 (experimental)
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Selinux and Apache in chroot question....
From
: fred.schnittke@xxxxxxxxxx
Re: Selinux and Apache in chroot question....
From
: Dominick Grift <domg472@xxxxxxxxx>
[PATCH] Fix build error with gcc (GCC) 4.6.0 20100416 (experimental)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: sysvinit 2.88 and SELinux policy
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Broken pipe Error
From
: waqar afridi <afridi.waqar@xxxxxxxxx>
RE: New to SELinux: how to get familiar
From
: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
Selinux and Apache in chroot question....
From
: fred.schnittke@xxxxxxxxxx
sysvinit 2.88 and SELinux policy
From
: Martin Orr <martin@xxxxxxxxxxxxxx>
New to SELinux: how to get familiar
From
: Vacheh Sardarian <vsardarian@xxxxxxxxx>
Re: determine least upper bound
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux problem on ARM: error while loading shared libraries
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: Broken pipe Error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/3] vfs: re-introduce MAY_CHDIR
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
libsemanage python3 support.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Broken pipe Error
From
: waqar afridi <afridi.waqar@xxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: James Morris <jmorris@xxxxxxxxx>
Re: Life cycle process for building products with selinux
From
: James Morris <jmorris@xxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Life cycle process for building products with selinux
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: determine least upper bound
From
: Andy Warner <warner@xxxxxxxxx>
Re: The confusing dot operator
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: The confusing dot operator
From
: Joe Nall <joe@xxxxxxxx>
Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
From
: Paul Moore <paul.moore@xxxxxx>
Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Paul Moore <paul.moore@xxxxxx>
Re: Life cycle process for building products with selinux
From
: Xavier Toth <txtoth@xxxxxxxxx>
Re: determine least upper bound
From
: Joe Nall <joe@xxxxxxxx>
Re: Life cycle process for building products with selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Life cycle process for building products with selinux
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: James Morris <jmorris@xxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: I am trying to build an MLS livecd.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
From
: Paul Moore <paul.moore@xxxxxx>
Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Paul Moore <paul.moore@xxxxxx>
Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
From
: Paul Moore <paul.moore@xxxxxx>
Re: [RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
From
: Paul Moore <paul.moore@xxxxxx>
Re: Semanage for domain transitions
From
: Martin Spinassi <martins.listz@xxxxxxxxx>
Re: [RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH -v3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH -v3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
[RFC PATCH v1 2/6] selinux: Set the peer label correctly on connected UNIX domain sockets
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 4/6] selinux: Shuffle the sk_security_struct alloc and free routines
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 5/6] selinux: Convert socket related access controls to use socket labels
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 0/6] UNIX domain socket fixes and other cleanups
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 3/6] selinux: Consolidate sockcreate_sid logic
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 1/6] selinux: Update socket's label alongside inode's label
From
: Paul Moore <paul.moore@xxxxxx>
[RFC PATCH v1 6/6] selinux: Use current_security() when possible
From
: Paul Moore <paul.moore@xxxxxx>
Minor fixup of checkmodule man page.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Semanage for domain transitions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Semanage for domain transitions
From
: Martin Spinassi <martins.listz@xxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: SELinux problem on ARM: error while loading shared libraries
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: /etc/initscript breaks SELinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Security Context after SSH-ing in...
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
/etc/initscript breaks SELinux
From
: Justin Mattock <justinmattock@xxxxxxxxx>
SELinux problem on ARM: error while loading shared libraries
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Security Context after SSH-ing in...
From
: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: selinux@xxxxxxxx
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
SELinux Policy in OpenSUSE 11.2
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: selinux@xxxxxxxx
Re: System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
System console hangs on boot in enforced unless some permissions added (with 2.6.32-3).
From
: selinux@xxxxxxxx
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]