SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: [PATCH -v2] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH -v2] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH] LSM Audit: rename LSM_AUDIT_NO_AUDIT to LSM_AUDIT_DATA_NONE
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 3/3] SELinux: special dontaudit for access checks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/3] vfs: re-introduce MAY_CHDIR
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: denial even with appropriate allow rules
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] SELinux: Move execmod to the common perms
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/3] security: make LSMs explicitly mask off permissions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: denial even with appropriate allow rules
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: denial even with appropriate allow rules
From
: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: denial even with appropriate allow rules
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
denial even with appropriate allow rules
From
: "Thomson, David-P63356" <David.Thomson@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] SELINUX: new permission controlling the ability to set suid
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] SELINUX: new permission controlling the ability to set suid
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: [PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
[PATCH 2/3] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/3] SELinux: standardize return code handling in policydb.c
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 3/3] SELinux: standardize return code handling in selinuxfs.c
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELinux: return error codes on policy load failure
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] SELinux: return error codes on policy load failure
From
: James Morris <jmorris@xxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <kmacmillan@xxxxxxxxxx>
Re: Setting labels on a disabled SELinux box.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Setting labels on a disabled SELinux box.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Setting labels on a disabled SELinux box.
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: Setting labels on a disabled SELinux box.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELinux: return error codes on policy load failure
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Setting labels on a disabled SELinux box.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] SELinux: return error codes on policy load failure
From
: Eric Paris <eparis@xxxxxxxxxx>
Setting labels on a disabled SELinux box.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: refpolicy is missing on lots of hits with audit2allow -R.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
refpolicy is missing on lots of hits with audit2allow -R.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: sudo + selinux
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: sudo + selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: sudo + selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: MLS telnet question
From
: Paul Moore <paul.moore@xxxxxx>
RE: MLS telnet question
From
: "Benedict, Phillip M" <phillip.m.benedict@xxxxxxxx>
Re: sudo + selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: sudo + selinux
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: sudo + selinux
From
: Larry Ross <selinux.larry@xxxxxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: MLS telnet question
From
: Paul Moore <paul.moore@xxxxxx>
Re: sudo + selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: MLS telnet question
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: sudo + selinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
RE: MLS telnet question
From
: "Benedict, Phillip M" <phillip.m.benedict@xxxxxxxx>
Re: The confusing dot operator
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Japanese user group's web site was already moved
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: MLS telnet question
From
: Paul Moore <paul.moore@xxxxxx>
Re: sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: sudo + selinux
From
: Chad Sellers <csellers@xxxxxxxxxx>
sudo + selinux
From
: James Cammarata <jimi@xxxxxxxx>
Re: determine least upper bound
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Cannot not open session
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: The confusing dot operator
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
determine least upper bound
From
: michel m <michel.mcgregor@xxxxxxxxx>
Re: MLS telnet question
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: MLS telnet question
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: MLS telnet question
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: AVC accesing shadow during gnome login
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: Eric Paris <eparis@xxxxxxxxxx>
RE: AVC accesing shadow during gnome login
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: AVC accesing shadow during gnome login
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] selinux: place open in the common file perms
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: AVC accesing shadow during gnome login
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
[PATCH 2/2] SELinux: Move execmod to the common perms
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/2] selinux: place open in the common file perms
From
: Eric Paris <eparis@xxxxxxxxxx>
AVC accesing shadow during gnome login
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: [PATCH 2/3] security: make LSMs explicitly mask off permissions
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH 1/3] vfs: re-introduce MAY_CHDIR
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 3/3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 3/3] SELinux: special dontaudit for access checks
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 1/3] vfs: re-introduce MAY_CHDIR
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/3] security: make LSMs explicitly mask off permissions
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH 2/3] security: make LSMs explicitly mask off permissions
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Cannot not open session
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Cannot not open session
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Cannot not open session
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
MLS telnet question
From
: "Benedict, Phillip M" <phillip.m.benedict@xxxxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Stephen Smalley <stephen.smalley@xxxxxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH] selinux: always call sk_security_struct sksec
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH] selinux: always call sk_security_struct sksec
From
: Eric Paris <eparis@xxxxxxxxxx>
The confusing dot operator
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH] selinux: UNIX domain socket fixes
From
: Joe Nall <joe@xxxxxxxx>
[PATCH] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Updated sandbox patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC] upstream mcstransd to selinux userspace repo
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [RFC] upstream mcstransd to selinux userspace repo
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [RFC] upstream mcstransd to selinux userspace repo
From
: Joe Nall <joe@xxxxxxxx>
[RFC] upstream mcstransd to selinux userspace repo
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [PATCH] Add implicit lib requirements to LDLIBS
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Linux 2.6.34-rc3 (fwd)
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH] Add implicit lib requirements to LDLIBS
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [RFC PATCH v1] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: [RFC PATCH v1] selinux: UNIX domain socket fixes
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
[RFC PATCH v1] selinux: UNIX domain socket fixes
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Tyler Durvik <phangbyte@xxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
[PATCH] Make building sandbox conditional on presence of cap-ng.h
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: libsemanage Next Generation in Fedora 14?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: libsemanage Next Generation in Fedora 14?
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: policycoreutils warnings
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: policycoreutils warnings
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Paul Moore <paul.moore@xxxxxx>
Re: These two patches allow restorecond to use same code as setfiles/restorecon.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: policycoreutils warnings
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: policycoreutils warnings
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: These two patches allow restorecond to use same code as setfiles/restorecon.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: These two patches allow restorecond to use same code as setfiles/restorecon.
From
: Chris PeBenito <pebenito@xxxxxxxxxx>
policycoreutils warnings
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: Patch to context_new to set errno to EINVAL on bad values
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[PATCH] reactivate attribute mapping unit test
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: sepolgen unit tests fail
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: sepolgen unit tests fail
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: sepolgen unit tests fail
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
sepolgen unit tests fail
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Patch to context_new to set errno to EINVAL on bad values
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Sepolgen: improve parser error recovery
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: squid and apache
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: libselinux APIs should take "const" qualifier?
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: svirt on MLS has strange AVC.
From
: Eric Paris <eparis@xxxxxxxxxx>
svirt on MLS has strange AVC.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
userdom_unpriv_user_template use errors and creating new roles
From
: Andy Warner <warner@xxxxxxxxx>
Re: [PATCH] Sepolgen: improve parser error recovery
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH] Sepolgen: improve parser error recovery
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: capability:sysadmin and xend
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Cosmetic:Partially remove deprecated __initcall() and change to
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
capability:sysadmin and xend
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH] Cosmetic:Partially remove deprecated __initcall() and change to
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[PATCH] Cosmetic:Partially remove deprecated __initcall() and change to
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Not sure if I sent this one out with the others but since it has not been updated yet...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: libselinux APIs should take "const" qualifier?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Not sure if I sent this one out with the others but since it has not been updated yet...
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Not sure if I sent this one out with the others but since it has not been updated yet...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
libselinux APIs should take "const" qualifier?
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: This simple patch fixes the output of sepolgen to match what Chris expects for upstream policy.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: This patch allows audit2allow to look at all avc's since the last time the machine booted.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Small patch to fix is_selinux_enabled man page.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Not sure if I sent this one out with the others but since it has not been updated yet...
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH] Sepolgen: improve parser error recovery
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: new: loads of audit messgs
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: working linux and busybox versions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: working linux and busybox versions
From
: Manvendra Pratap Singh <manav.emb@xxxxxxxxx>
Re: working linux and busybox versions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: new: loads of audit messgs
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: new: loads of audit messgs
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: new: loads of audit messgs
From
: Eric Paris <eparis@xxxxxxxxxxxxxx>
Re: vmplayer problems on FC12
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
vmplayer problems on FC12
From
: Bill Chimiak <wch1m1@xxxxxxxxx>
Re: working linux and busybox versions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: working linux and busybox versions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: working linux and busybox versions
From
: Manvendra Pratap Singh <manav.emb@xxxxxxxxx>
Re: working linux and busybox versions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: working linux and busybox versions
From
: Manvendra Pratap Singh <manav.emb@xxxxxxxxx>
Re: working linux and busybox versions
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: working linux and busybox versions
From
: Manvendra Pratap Singh <manav.emb@xxxxxxxxx>
new: loads of audit messgs
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: [PATCH] SELinux: Reduce max avtab size to avoid page allocation failures
From
: James Morris <jmorris@xxxxxxxxx>
Small patch to fix is_selinux_enabled man page.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] SELinux: Reduce max avtab size to avoid page allocation failures
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Colin Walters asked for this patch to be added to libselinux
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: Reduce max avtab size to avoid page allocation failures
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] SELinux: Reduce max avtab size to avoid page allocation failures
From
: Eric Paris <eparis@xxxxxxxxxx>
Colin Walters asked for this patch to be added to libselinux
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH] SELinux: Reduce max avtab size to avoid page allocation failures
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Define CAP_SYSLOG
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] Define CAP_SYSLOG
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH] Define CAP_SYSLOG
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH] Sepolgen: improve parser error recovery
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: This patch allows audit2allow to look at all avc's since the last time the machine booted.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: This simple patch fixes the output of sepolgen to match what Chris expects for upstream policy.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Not sure if I sent this one out with the others but since it has not been updated yet...
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
This is the sandbox patch
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
These two patches allow restorecond to use same code as setfiles/restorecon.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
This patch allows audit2allow to look at all avc's since the last time the machine booted.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
This simple patch fixes the output of sepolgen to match what Chris expects for upstream policy.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: strange policy loading problem
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: init problem
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: how to cope with file renames?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Richard Bullington-McGuire <richard.bullington-mcguire@xxxxxxxxxxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: how to cope with file renames?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
how to cope with file renames?
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
How to address USER_AUTH PAM authentication failure?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Andy Warner <warner@xxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
RE: [refpolicy] what to do: libsemanage.get_home_dirs:
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: working linux and busybox versions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: [refpolicy] what to do: libsemanage.get_home_dirs:
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
working linux and busybox versions
From
: Manvendra Pratap Singh <manav.emb@xxxxxxxxx>
Re: [PATCH] anon_inodes: mark the anon inode private
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH] anon_inodes: mark the anon inode private
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [refpolicy] what to do: libsemanage.get_home_dirs:
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
Re: [refpolicy] what to do: libsemanage.get_home_dirs:
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
what to do: libsemanage.get_home_dirs:
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: domain transition issue
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
domain transition issue
From
: michel m <michel.mcgregor@xxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [RFC][PATCH] mod_selinux: setcon earlier
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: db_schema object class (and others)
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
db_schema object class (and others)
From
: Andy Warner <warner@xxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Andy Warner <warner@xxxxxxxxx>
Re: [PATCH] libselinux: fix avc_netlink_loop() error caused by nonblocking mode.
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: [RFC][PATCH] mod_selinux: setcon earlier
From
: Joshua Roys <joshua.roys@xxxxxxxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [RFC][PATCH] mod_selinux: setcon earlier
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: init problem
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
init problem
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: This patch fixes the exception handling in libselinux-python bindings
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Apparent memory leak in libselinux
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Patch to run genhomedircon without looking at /etc/passwd
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Fix memory leak on disabled selinux machines.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[RFC][PATCH] mod_selinux: setcon earlier
From
: Joshua Roys <joshua.roys@xxxxxxxxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Dominick Grift <domg472@xxxxxxxxx>
MLS Now working in Fedora 12/RHEL6 in Full Desktop mode.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: I think this might be a bug.
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: I think this might be a bug.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: I think this might be a bug.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
I think this might be a bug.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: [refpolicy] lnk_file:write
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: lnk_file:write
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: lnk_file:write
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: selinux prevents msgrcv on restore message queues?
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
lnk_file:write
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: strange policy loading problem
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: squid and apache
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: squid and apache
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: squid and apache
From
: Caleb Case <calebcase@xxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: squid and apache
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: Problem with compiling refpolicy base.pp
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: squid and apache
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [refpolicy] How to implement the "if-then-else" logic in refpolicy interface?
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: squid and apache
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Problem with compiling refpolicy base.pp
From
: AlannY <m@xxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: strange policy loading problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: squid and apache
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
How to implement the "if-then-else" logic in refpolicy interface?
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
Re: [PATCH] libselinux: fix avc_netlink_loop() error caused by nonblocking mode.
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
strange policy loading problem
From
: Russell Coker <russell@xxxxxxxxxxxx>
squid and apache
From
: Russell Coker <russell@xxxxxxxxxxxx>
Re: [PATCH] libselinux: fix avc_netlink_loop() error caused by nonblocking mode.
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: RHEL4 Selinux mailinglist
From
: Ulrich Althaus <ulrich.althaus@xxxxxxxxxxxxxx>
Re: denials with filesystem associate
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: denials with filesystem associate
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] libselinux: selabel_*() support for database objects
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] libselinux: fix avc_netlink_loop() error caused by nonblocking mode.
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: RHEL4 Selinux mailinglist
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Audit2allow generating dontaudit rules.
From
: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
Re: denials with filesystem associate
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: denials with filesystem associate
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: RHEL4 Selinux mailinglist
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: RHEL4 Selinux mailinglist
From
: Ulrich Althaus <ulrich.althaus@xxxxxxxxxxxxxx>
Re: RHEL4 Selinux mailinglist
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
RHEL4 Selinux mailinglist
From
: Ulrich Althaus <ulrich.althaus@xxxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: denials with filesystem associate
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH] netlabel: fix export of SELinux categories > 127
From
: Paul Moore <paul.moore@xxxxxx>
denials with filesystem associate
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] libselinux: fix avc_netlink_loop() error caused by nonblocking mode.
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: avc_open() and netlink_loop()
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: avc_open() and netlink_loop()
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] netlabel: fix export of SELinux categories > 127
From
: Joshua Roys <joshua.roys@xxxxxxxxxxxxxxx>
Re: updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Fix memory leak on disabled selinux machines.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Fixfiles using new setfiles/restorecon simplification
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Re: Patch to run genhomedircon without looking at /etc/passwd
From
: Joshua Brindle <method@xxxxxxxxxxxxxxx>
Patch to run genhomedircon without looking at /etc/passwd
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] netlabel: fix export of SELinux categories > 127
From
: Paul Moore <paul.moore@xxxxxx>
Fixfiles using new setfiles/restorecon simplification
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Audit2allow generating dontaudit rules.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Last attempt at upstreaming semodule_disable patch.
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Last attempt at upstreaming semodule_disable patch.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
updated libselinux pkgconfig does not work correctly on lib64 machines.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
libselinux pkgconfig does not work correctly on lib64 machines.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Fix memory leak on disabled selinux machines.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[PATCH] netlabel: fix export of SELinux categories > 127
From
: Joshua Roys <joshua.roys@xxxxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: No such file or directory: '/etc/selinux/targeted/contexts/files/file_contexts.homedirs'
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: No such file or directory: '/etc/selinux/targeted/contexts/files/file_contexts.homedirs'
From
: Denis BUCHER <dbucherml@xxxxxxxxxxxxx>
Re: No such file or directory: '/etc/selinux/targeted/contexts/files/file_contexts.homedirs'
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: No such file or directory: '/etc/selinux/targeted/contexts/files/file_contexts.homedirs'
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
No such file or directory: '/etc/selinux/targeted/contexts/files/file_contexts.homedirs'
From
: Denis BUCHER <dbucherml@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Justin Mattock <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: James Morris <jmorris@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Patch to fix libdir spec in SELinux libraries pkconfig
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Thomas <tom@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
RE: SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: label_file.c:434: error: implicit declaration of function 'fstat'
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: SELinux Policy in OpenSUSE 11.2
From
: Dominick Grift <domg472@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
SELinux Policy in OpenSUSE 11.2
From
: Alan Rouse <alan.rouse@xxxxxxxxxxxx>
Re: label_file.c:434: error: implicit declaration of function 'fstat'
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Random fork showing up in policy.
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: label_file.c:434: error: implicit declaration of function 'fstat'
From
: "Justin P. mattock" <justinmattock@xxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH][RFC] selinux: fix a couple of sparse warnings
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
label_file.c:434: error: implicit declaration of function 'fstat'
From
: Justin Mattock <justinmattock@xxxxxxxxx>
Re: {SPAM?} Re: Random fork showing up in policy.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: {SPAM?} Re: Random fork showing up in policy.
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: Random fork showing up in policy.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: Random fork showing up in policy.
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Random fork showing up in policy.
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: MLS and network
From
: Paul Moore <paul.moore@xxxxxx>
Re: MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH][RFC] selinux: fix a couple of sparse warnings
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: This patch fixes the exception handling in libselinux-python bindings
From
: Caleb Case <ccase@xxxxxxxxxx>
Re: MLS and network
From
: Paul Moore <paul.moore@xxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: Elko Kuric <elkokuric@xxxxxxxxx>
[PATCH][RFC] selinux: fix a couple of sparse warnings
From
: James Morris <jmorris@xxxxxxxxx>
Re: MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: Elko Kuric <elkokuric@xxxxxxxxx>
Re: Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
Selinux in enforcing mode prevent network interface to be configured at boot for Debian stable ( 5.0)
From
: Elko Kuric <elkokuric@xxxxxxxxx>
Re: Assigning a Type to Network Interfaces
From
: Paul Moore <paul.moore@xxxxxx>
Re: MLS and network
From
: Paul Moore <paul.moore@xxxxxx>
Re: MLS and network
From
: Paul Moore <paul.moore@xxxxxx>
Re: MLS and network
From
: Paul Moore <paul.moore@xxxxxx>
RE: [PATCH] libselinux: Only audit permissions specified by the policy
From
: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
Re: MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: MLS and network
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] libselinux: Only audit permissions specified by the policy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: MLS and network
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: MLS and network
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
Re: MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Eric Paris <eparis@xxxxxxxxxx>
Re: MLS and network
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
MLS and network
From
: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: James Morris <jmorris@xxxxxxxxx>
Re: Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Load the initial SIDs upon every policy load
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] Load the initial SIDs upon every policy load
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Load the initial SIDs upon every policy load
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Ask for comments about some patches for refpolicy-2.20091117
From
: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
avc_open() and netlink_loop()
From
: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
[PATCH] Load the initial SIDs upon every policy load
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: (WW) file_contexts: line 0 has invalid context system_u:object_r:info_xproperty_t:s0
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: (WW) file_contexts: line 0 has invalid context system_u:object_r:info_xproperty_t:s0
From
: Daniel J Walsh <dwalsh@xxxxxxxxxx>
(WW) file_contexts: line 0 has invalid context system_u:object_r:info_xproperty_t:s0
From
: Dominick Grift <domg472@xxxxxxxxx>
[PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: how to trace an avc denial
From
: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: Assigning a Type to Network Interfaces
From
: Paul Moore <paul.moore@xxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: [PATCH 04/15] [src-policy] refpol intermediate language compiler (refpol_ilc)
From
: "Caleb Case" <ccase@xxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RE: [PATCH 14/15] [src-policy] semodule: user message support
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
RE: [PATCH 14/15] [src-policy] semodule: user message support
From
: "Caleb Case" <ccase@xxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: "Guido Trentalancia" <guido@xxxxxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] Allowing MLS->non-MLS and vice versa upon policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 14/15] [src-policy] semodule: user message support
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: Cannot go to enforcing
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: how to trace an avc denial
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: access decision API
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]