SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 09/15] [src-policy] semodule: remove base module support
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 07/15] [src-policy] libsemanage: compile common intermediary language
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 14/15] [src-policy] semodule: user message support
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 15/15] [src-policy] semanage: source permissive module
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 00/15] RFC Source Policy Support
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 11/15] [src-policy] semodule: get module source
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 03/15] [src-policy] Reference Policy to refpol conversion tool
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: [PATCH] [src-policy] libsemanage: semanage_get_modules_names should get CIL path
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: access decision API
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [src-policy] libsemanage: fix semanage_module_get_module_info export in map
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: access decision API
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] [src-policy] libsemanage: semanage_get_modules_names should get CIL path
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH] [src-policy] libsemanage: fix semanage_module_get_module_info export in map
- From: Caleb Case <ccase@xxxxxxxxxx>
- access decision API
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: [refpolicy] Bootup problem with refpolicy-2.20091117 - 4:login successfully finally!
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Allowing MLS->non-MLS and vice versa upon policy reload (Was: Re: Building MLS/MCS policy)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Building MLS/MCS policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Building MLS/MCS policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Building MLS/MCS policy
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- RE: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: [refpolicy] Bootup problem with refpolicy-2.20091117 - 4:login successfully finally!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incoming packets` context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- incoming packets` context
- From: michel m <michel.mcgregor@xxxxxxxxx>
- RE: [refpolicy] Bootup problem with refpolicy-2.20091117 - 4:login successfully finally!
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [refpolicy] Bootup problem with refpolicy-2.20091117 - 4:login successfully finally!
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: [refpolicy] Bootup problem with refpolicy-2.20091117 - 4:login successfully finally!
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: are comments allowed in default_contexts?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- Nessun oggetto
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- are comments allowed in default_contexts?
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- RE: [refpolicy] Bootup problem with refpolicy-2.20091117 - 3: MAKEDEV ok but /var/lock/subsys/ broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bzip support in libsemanage and out of memory (userspace ticket 7)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [refpolicy] Bootup problem with refpolicy-2.20091117 - 3: MAKEDEV ok but /var/lock/subsys/ broken
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: convert range transition list to a hashtab
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av()
- From: James Morris <jmorris@xxxxxxxxx>
- bzip support in libsemanage and out of memory (userspace ticket 7)
- From: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117 - 3: MAKEDEV ok but /var/lock/subsys/ broken
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 00/13] RFC libsemanage move to var, enable/disable module, and priority support
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: AlannY <m@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What is refpolicy [strict or targeted]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- What is refpolicy [strict or targeted]
- From: AlannY <m@xxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: AlannY <m@xxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: AlannY <m@xxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: AlannY <m@xxxxxxxxx>
- Re: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117 - rules found but still can't login
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av()
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Policy is not managed or store cannot be accessed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Policy is not managed or store cannot be accessed
- From: AlannY <m@xxxxxxxxx>
- RE: Security Context Type Changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: contents of /etc/selinux/<type>/contexts/users/*
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Security Context Type Changes
- From: "Tomas, Gregg A (IS)" <Gregg.Tomas@xxxxxxx>
- contents of /etc/selinux/<type>/contexts/users/*
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: convert range transition list to a hashtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av()
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Assigning a Type to Network Interfaces
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Security Context Type Changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Security Context Type Changes
- From: "Tomas, Gregg A (IS)" <Gregg.Tomas@xxxxxxx>
- Re: Assigning a Type to Network Interfaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: disablenetwork (v5) patches
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: Bootup problem with refpolicy-2.20091117
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Bootup problem with refpolicy-2.20091117
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- RE: Bootup problem with refpolicy-2.20091117
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: Bootup problem with refpolicy-2.20091117
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Bootup problem with refpolicy-2.20091117
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [RFC][PATCH v3] selinux: change the handling of unknown classes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux troubleshooting example
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- SELinux troubleshooting example
- From: Richard Bullington-McGuire <richard.bullington-mcguire@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v3] selinux: change the handling of unknown classes
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] fix some typo's in avc.c
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] fix some typo's in avc.c
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [RFC][PATCH v3] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: change the handling of unknown classes
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC][PATCH] selinux: convert range transition list to a hashtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux questions...
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: SELinux questions...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux questions...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux questions...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: benchmark
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [PATCH 13/13] semanage store migration script
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [PATCH 13/13] semanage store migration script
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: [PATCH 13/13] semanage store migration script
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: Security Context Type Changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- benchmark
- From: michel m <michel.mcgregor@xxxxxxxxx>
- RE: Security Context Type Changes
- From: "Tomas, Gregg A (IS)" <Gregg.Tomas@xxxxxxx>
- RE: [PATCH 13/13] semanage store migration script
- From: "Caleb Case" <ccase@xxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 13/13] semanage store migration script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 13/13] semanage store migration script
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Caleb Case <ccase@xxxxxxxxxx>
- [RFC][PATCH v2] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 13/13] semanage store migration script
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 03/13] libsemanage: move the module store to /var/lib/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 03/13] libsemanage: move the module store to /var/lib/selinux
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: change the handling of unknown classes
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 00/13] RFC libsemanage move to var, enable/disable module, and priority support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 03/13] libsemanage: move the module store to /var/lib/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Error building the userspace tools
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 00/13] RFC libsemanage move to var, enable/disable module, and priority support
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [RFC][PATCH] selinux: change the handling of unknown classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Error building the userspace tools
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: convert range transition list to a hashtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Help with an SELinux AVC event...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- [RFC][PATCH] selinux: convert range transition list to a hashtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help with an SELinux AVC event...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Help with an SELinux AVC event...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Help with an SELinux AVC event...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Security Context Type Changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security Context Type Changes
- From: "Tomas, Gregg A (IS)" <Gregg.Tomas@xxxxxxx>
- Re: Error building the userspace tools
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Error building the userspace tools
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Apparent memory leak in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5.4 nfs home directories + cron
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- select_context and ?dm
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 11/13] libsemanage: new private api for unstable functions
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: newrole: double free or corruption
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Fwd: newrole: double free or corruption
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 09/13] libsemanage: provide function to get new base module path
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 06/13] libsemanage: add default priority to semanage_handle_t
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 00/13] RFC libsemanage move to var, enable/disable module, and priority support
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 08/13] libsemanage: get/set module info and enabled status
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 12/13] semodule: add priority, enabled, and extended listing
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 01/13] libsemanage: fix typo in tests makefile -o -> -O
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 05/13] libsemanage: update unit tests for move to /var/lib/selinux
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 10/13] libsemanage: installing/upgrading/removing modules via info and key
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 04/13] libsemanage: split final files into /var/lib/selinux/tmp
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 07/13] libsemanage: augment semanage_module_info_t and provide semanage_module_key_t
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 02/13] semanage: move permissive module creation to /tmp
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 13/13] semanage store migration script
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH 03/13] libsemanage: move the module store to /var/lib/selinux
- From: Caleb Case <ccase@xxxxxxxxxx>
- [PATCH] Dynamic port labeling V3
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: CentOS 5.4 nfs home directories + cron
- From: Tom Boland <tom@xxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v2] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v2] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v2] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Policy writing philosophy...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: Policy writing philosophy...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Policy writing philosophy...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: FILE__EXECMOD and other assorted file permission layout issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CentOS 5.4 nfs home directories + cron
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy writing philosophy...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Labeling problem
- From: Dominick Grift <domg472@xxxxxxxxx>
- Labeling problem
- From: mina elnino <potushka@xxxxxxxxx>
- FILE__EXECMOD and other assorted file permission layout issues
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Policy writing philosophy...
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: Policy writing philosophy...
- From: Dominick Grift <domg472@xxxxxxxxx>
- Policy writing philosophy...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: CentOS 5.4 nfs home directories + cron
- From: Tom Boland <tom@xxxxxxxx>
- Re: [RFC PATCH v1] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: The SELinux Documentation Project
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC PATCH v1] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: avc's generated causes the system to freeze up
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v1] selinux: Fix security_compute_av() to not return unknown class errors when in permissive mode
- From: Paul Moore <paul.moore@xxxxxx>
- avc's generated causes the system to freeze up
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [Apparmor-dev] New security system FBAC-LSM announcement and call for collaborators
- From: Cliffe <cliffe@xxxxxx>
- Re: CentOS 5.4 nfs home directories + cron
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- CentOS 5.4 nfs home directories + cron
- From: Tom Boland <tom@xxxxxxxx>
- New security system FBAC-LSM announcement and call for collaborators
- From: Cliffe <cliffe@xxxxxx>
- Re: How to use sepolgen VS. policygentool
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to use sepolgen VS. policygentool
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to use sepolgen VS. policygentool
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sample logs of alert types
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- RE: How to use sepolgen VS. policygentool
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- RE: How to use sepolgen VS. policygentool
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to use sepolgen VS. policygentool
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: tun/tap and SE Linux in 2.6.32
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- RE: How to use sepolgen VS. policygentool
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- How to use sepolgen VS. policygentool
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: tun/tap and SE Linux in 2.6.32
- From: Paul Moore <paul.moore@xxxxxx>
- Re: tun/tap and SE Linux in 2.6.32
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: tun/tap and SE Linux in 2.6.32
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Sample logs of alert types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH linux-cr] cr: add selinux support (v6)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- tun/tap and SE Linux in 2.6.32
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Sample logs of alert types
- From: "Zaina AFOULKI" <zaina.afoulki@xxxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: Tutorial on setting up SELinux / X Server
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Tutorial on setting up SELinux / X Server
- From: Tyler Durvik <phangbyte@xxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: Tutorial on setting up SELinux / X Server
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [HACKERS] Adding support for SE-Linux security
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: SELinux: Invalid object class mapping, disabling SELinux support. (XACE)
- From: Tyler Durvik <phangbyte@xxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Tutorial on setting up SELinux / X Server
- From: Tyler Durvik <phangbyte@xxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: A question about genhomedircon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: [PATCH] Dynamic port labeling V2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Dynamic port labeling V2
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selabel_*() support for database objects
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- [ANN] SELinux Userspace release
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] Contributed manual pages for libselinux (second and last part)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- RE: MLS support for RHEL5?
- From: <chanson@xxxxxxxxxxxxx>
- Re: The SELinux Documentation Project
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: The SELinux Documentation Project
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: A question about genhomedircon
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Support for long-options in policycoreutils and checkpolicy (Ticket #1 [1672486])
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Support for long-options in policycoreutils and checkpolicy (Ticket #1 [1672486])
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: The SELinux Documentation Project
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] [topic--exception-fix] exception.sh contains bashisms
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Contributed manual pages for libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch for Ticket #1 [1672486] (checkpolicy/checkmodule)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Contributed manual pages for libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Support for long-options in policycoreutils and checkpolicy (Ticket #1 [1672486])
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Support for long-options in policycoreutils and checkpolicy (Ticket #1 [1672486])
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Small fixes for chcat in policycoreutils
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fix the format of the NAME lines
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch removes OUTPUT from fixfiles which was never used and was broken
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selabel_*() support for database objects
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- MCS read only cats implemented
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: Confining Applications to Specific Directories
- From: Xavier Toth <txtoth@xxxxxxxxx>
- RE: MLS support for RHEL5?
- From: "Dyson, Mark L (IS)" <Mark.Dyson@xxxxxxx>
- RE: MLS support for RHEL5?
- From: <chanson@xxxxxxxxxxxxx>
- Confining Applications to Specific Directories
- From: "Timothy L. Watt" <tlwatt@xxxxxxxxxxxxxxxxxxxxx>
- RE: MLS support for RHEL5?
- From: "Dyson, Mark L (IS)" <Mark.Dyson@xxxxxxx>
- RE: MLS support for RHEL5?
- From: <chanson@xxxxxxxxxxxxx>
- MLS support for RHEL5?
- From: "Dyson, Mark L (IS)" <Mark.Dyson@xxxxxxx>
- Re: [PATCH] SELinux: header generation may hit infinite loop
- From: James Morris <jmorris@xxxxxxxxx>
- SELinux document - any use!!!
- From: RICHARD HAINES <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] Support for long-options in policycoreutils and checkpolicy (Ticket #1 [1672486])
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- List of all alert types
- From: "Zaina AFOULKI" <zaina.afoulki@xxxxxxxxxxxxxxx>
- Re: Contributed manual pages for libselinux
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selabel_*() support for database objects
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: selabel_*() support for database objects
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Contributed manual pages for libselinux
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: A question about genhomedircon
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: A question about genhomedircon
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- A question about genhomedircon
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: Configuring libsemanage to invoke a policy checker
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- [PATCH] SELinux: header generation may hit infinite loop
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] kernel: Dynamic port labeling
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] Fix bug in semanage fcontext
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] semanage node -a bug
- From: Chad Sellers <csellers@xxxxxxxxxx>
- [PATCH] kernel: Dynamic port labeling
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- [PATCH] libselinux: selabel_*() support for database objects
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix warnings
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Add modules support to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] [typo-fix]: cannnot -> cannot and suport -> support
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: WIndow Managers
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- WIndow Managers
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: Type boundaries: questions on the semantics / is the enforcement correct ?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Fix the format of the NAME lines
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] No rule to make target `/seusers', needed by `tmp/seusers'. Stop.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Windows-level enforcement in SELinux?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Windows-level enforcement in SELinux?
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [PATCH] [typo-fix]: cannnot -> cannot and suport -> support
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Windows-level enforcement in SELinux?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Windows-level enforcement in SELinux?
- From: "Dyson, Mark L (IS)" <Mark.Dyson@xxxxxxx>
- Re: [refpolicy] No rule to make target `/seusers', needed by `tmp/seusers'. Stop.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Debian SSH bugs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- No rule to make target `/seusers', needed by `tmp/seusers'. Stop.
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: 'make policy' issues
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: get security_class_t for objects
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Windows-level enforcement in SELinux?
- From: "Dyson, Mark L (IS)" <Mark.Dyson@xxxxxxx>
- Re: get security_class_t for objects
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: Using IBM's GPFS with SE Linux Extended Attributes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Where do I get a good Policy Base ?...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MCS read only cats
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: MCS read only cats
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: MCS read only cats
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: MCS read only cats
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- RE: Where do I get a good Policy Base ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Where do I get a good Policy Base ?...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Where do I get a good Policy Base ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Using IBM's GPFS with SE Linux Extended Attributes
- From: David C Casler <david.casler@xxxxxxxxxx>
- Re: Add modules support to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: get security_class_t for objects
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: MCS read only cats
- From: Chad Sellers <csellers@xxxxxxxxxx>
- get security_class_t for objects
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: MCS read only cats
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: Fix boolean handling in semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Remove setrans management from semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policy
- From: Chad Sellers <csellers@xxxxxxxxxx>
- RE: Where do I get a good Policy Base ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH] security: report the module name to security_module_request
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] security: report the module name to security_module_request
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Type boundaries: questions on the semantics / is the enforcement correct ?
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: selinux_check_passwd_access() behaviour when passwd class does not exist
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: selinux_check_passwd_access() behaviour when passwd class does not exist
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- "security_compute_sid: invalid context" error when starting/stopping mysqld daemon
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: [PATCH] security: report the module name to security_module_request
- From: James Morris <jmorris@xxxxxxxxx>
- Re: selinux_check_passwd_access() behaviour when passwd class does not exist
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: selinux_check_passwd_access() behaviour when passwd class does not exist
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] security: report the module name to security_module_request
- From: Eric Paris <eparis@xxxxxxxxxx>
- This patch removes OUTPUT from fixfiles which was never used and was broken
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Small fixes for chcat in policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Here is the sandbox patch for policycoreutils.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- setfiles/restorecond patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux_check_passwd_access() behaviour when passwd class does not exist
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- MCS read only cats
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Contributed manual pages for libselinux
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- selinux_check_passwd_access() behaviour when passwd class does not exist
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Patch for Ticket #1 [1672486] (policycoreutils)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Patch for Ticket #1 [1672486] (checkpolicy/checkmodule)
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH -v2] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- assigning context to disk on Debian/Lenny
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Where do I get a good Policy Base ?...
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Where do I get a good Policy Base ?...
- From: Dominick Grift <domg472@xxxxxxxxx>
- Where do I get a good Policy Base ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: RPM support for SELinux
- From: Jeff Johnson <n3npq@xxxxxxx>
- Re: RPM support for SELinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] SELinux: add .gitignore files for dynamic classes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux : Project (opinions and suggestions)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: RPM support for SELinux
- From: Jeff Johnson <n3npq@xxxxxxx>
- Re: useradd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: RPM support for SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- SELinux : Project (opinions and suggestions)
- From: "Raul da Silva {Sp4wn}" <sp4wn.root@xxxxxxxxx>
- Re: RPM support for SELinux
- From: Jeff Johnson <n3npq@xxxxxxx>
- [PATCH] SELinux: add .gitignore files for dynamic classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: RPM support for SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Export reset_selinux_config()
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] libselinux: Export reset_selinux_config()
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH -v2] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: RPM support for SELinux
- From: Jeff Johnson <n3npq@xxxxxxx>
- RPM support for SELinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] SELinux: add .gitignore files for dynamic classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: add .gitignore files for dynamic classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: add .gitignore files for dynamic classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: 'make policy' issues
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: 'make policy' issues
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: 'make policy' issues
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: 'make policy' issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Eric Laganowski <eric@xxxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: 'make policy' issues
- From: Eric Laganowski <eric@xxxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Eric Laganowski <eric@xxxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- [PATCH] libsemanage: Add function to turn off file contexts validation
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: 'make policy' issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Eric Laganowski <eric@xxxxxxxxxxxxxx>
- Re: 'make policy' issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- 'make policy' issues
- From: Eric Laganowski <eric@xxxxxxxxxxxxxx>
- Re: [PATCH] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: useradd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- useradd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] pkgconfig support for libsepol, libselinux, and libsemanage
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: bounds domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bounds domain
- From: michel m <michel.mcgregor@xxxxxxxxx>
- [PATCH] [topic--exception-fix] exception.sh contains bashisms
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux: Export reset_selinux_config()
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Conference info needed
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bounds domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bounds domain
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: bounds domain
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: sshd error: Failed to get default security context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- bounds domain
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sesearch question
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sesearch question
- From: Joe Nall <joe@xxxxxxxx>
- Re: sesearch question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] restorecond: Ignore IN_IGNORED inotify events
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- sesearch question
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: what is http authenticated user?
- From: "Sean Hulbert" <shulbert@xxxxxxxxxxxx>
- Re: /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: what is http authenticated user?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- what is http authenticated user?
- From: michel m <michel.mcgregor@xxxxxxxxx>
- /lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: SECMARK: implementation question
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: SECMARK: implementation question
- From: Paul Moore <paul.moore@xxxxxx>
- SECMARK: implementation question
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [PATCH 4/4] cr: add selinux support (v6)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 4/4] cr: add selinux support (v6)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 4/4] cr: add selinux support (v6)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: get request context
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [RFC PATCH v2] refpol: Add netif, node and peer constraints for MCS based policies
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH] libselinux: raw string_to_class/string_to_av_perm variants
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v2] refpol: Add netif, node and peer constraints for MCS based policies
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: get request context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v2] refpol: Add netif, node and peer constraints for MCS based policies
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: get request context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- get request context
- From: michel m <michel.mcgregor@xxxxxxxxx>
- Re: [PATCH] selinux: drop remapping of netlink classes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: dynamic class/perm discovery
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1] refpol: Add netif, node and peer constraints for MCS based policies
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [RFC PATCH v1] refpol: Add netif, node and peer constraints for MCS based policies
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- [PATCH 4/4] cr: add selinux support (v5.1)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- RE: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: 欧珂塔维亚 <octavian.ionescu@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [PATCH 1/3] cr: add generic LSM c/r support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 3/3] cr: add selinux support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/3] cr: add generic LSM c/r support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 3/3] cr: add selinux support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 3/3] cr: add selinux support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: How to trace why MCS permissions granted?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to trace why MCS permissions granted?
- Re: [PATCH 3/3] cr: add selinux support (v4)
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop remapping of netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/3] cr: add generic LSM c/r support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 3/3] cr: add selinux support (v4)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [RFC PATCH v1] refpol: Add netif, node and peer constraints for MCS based policies
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] selinux: drop remapping of netlink classes
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: drop remapping of netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: James Morris <jmorris@xxxxxxxxx>
- semanage Equal.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Add modules support to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fix boolean handling in semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Remove setrans management from semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v5 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5 1/2] selinux: dynamic class/perm discovery
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Paul Moore <paul.moore@xxxxxx>
- Re: MCS and default labels
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: reset the security_ops before flushing the avc cache
- From: James Morris <jmorris@xxxxxxxxx>
- Re: MCS and default labels
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: dynamic class/perm discovery
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Configuring libsemanage to invoke a policy checker
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SElinux troubles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Configuring libsemanage to invoke a policy checker
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SElinux troubles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 1/2] selinux: dynamic class/perm discovery
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy: Add support for multiple target OSes
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: SElinux troubles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3 1/2] selinux: dynamic class/perm discovery
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SElinux troubles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SElinux troubles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- The SELinux Documentation Project [Request for topics]
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: is any use of runcon by arbitrary users valid when enforcing?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: dynamic class/perm discovery
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MCS and default labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Final year project ideas
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel build
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: pam_namespace context inside of name.inst
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: MCS and default labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Final year project ideas
- From: Zbynek Houska <zbynek.houska@xxxxxxxxx>
- Re: pam_namespace context inside of name.inst
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: pam_namespace context inside of name.inst
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: pam_namespace context inside of name.inst
- From: Dominick Grift <domg472@xxxxxxxxx>
- pam_namespace context inside of name.inst
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: pam_namespace context inside of name.inst
- From: Dominick Grift <domg472@xxxxxxxxx>
- [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel build
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [RFC][PATCH v2 1/2] selinux: dynamic class/perm discovery
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Matchpathcon patch to print <<none>> when it gets enoent.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] restorecond: Ignore IN_IGNORED inotify events
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: dynamic class/perm discovery
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [RFC][cr_tests PATCH] checkpoint/restart: define selinux tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [RFC][PATCH] selinux: dynamic class/perm discovery
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] SELinux: audit_access perm used only to dontaudit denials in that access syscall
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: reset the security_ops before flushing the avc cache
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: do not destroy the avc_cache_nodep
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Naive question on ftp selinux policy
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Naive question on ftp selinux policy
- From: Elia Pinto <andronicus.spiros@xxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- CIL infrastructure repo and talks at Summit/LPC
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: XACE: tclass malformed
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [refpolicy] new policy for dkim-filter
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: policycoreutils: The error message on forkpty() failure is not clear or useful.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] setfiles fails to relabel if selinux not enabled
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: I think I sent this patch before, it is the upgrade patch.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [GIT] security / creds fixes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] setfiles fails to relabel if selinux not enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT] security / creds fixes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Add support for multiple target OSes
- From: Paul Nuzzi <pjnuzzi@xxxxxxxxxxxxxx>
- Re: [GIT] security / creds fixes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] setfiles fails to relabel if selinux not enabled
- From: Jeff Johnson <n3npq@xxxxxxx>
- Re: libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux BOFs at LinuxCon and Linux Plumbers Conference
- From: debora@xxxxxxxxxxxxxxxxxx
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: semodule/libsemanage patch to allow enable and disable of modules.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libsemanage patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] new policy for dkim-filter
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: semodule/libsemanage patch to allow enable and disable of modules.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]