SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] SElinux: Fix some typos.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] There is a problem where packets being sent by the TUN driver are not
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v3] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- [PATCH v3] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- [patch v2] libselinux: lazy init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: [Patch 0/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2] libsemanage, libselinux: Get don't audit settings from handle and remember settings after commit.
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 1/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- request for review of, and collaboration on SELinux models wiki entry
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 1/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re:[Patch 0/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re:[Patch 0/2] libsemanage: remember and retrieve dontaudit settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] There is a problem where packets being sent by the TUN driver are not
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/8] SELinux hooks.c non-trivial-fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 3/8] SELinux netif.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 5/8] SELinux netnode.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 7/8] SELinux selinuxfs.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 8/8] SELinux xfrm.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- SELinux-non-trivial-fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 1/8] SELinux avc.c non-trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 4/8] SELinux netlabel.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH 6/8] SELinux netport.c non trivial fixes.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [Patch 2/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 1/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re:[Patch 0/2] libsemanage: remember and retrieve dontaudit settings
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: James Morris <jmorris@xxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: The problem with TUN/TAP devices
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v1] There is a problem where packets being sent by the TUN driver are not
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v2] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [patch] libselinux: lazy init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Problem about PAM-selinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: The problem with TUN/TAP devices
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: The problem with TUN/TAP devices
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Access control between kernel modules?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problem about PAM-selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "Policy inclusion" tool ... ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: [Patch] libsemanage: remember and retrieve dontaudit settings]
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problem about PAM-selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Access control between kernel modules?
- From: Shaz <shazalive@xxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: Shaz <shazalive@xxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: Shaz <shazalive@xxxxxxxxx>
- Re: RBAC with SELinux MCS
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RBAC with SELinux MCS
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Problem about PAM-selinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: James Morris <jmorris@xxxxxxxxx>
- Problem about PAM-selinux
- From: Andy <hewanxiang@xxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: SELinux Developer Summit 2009: CfP ends TODAY
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- SELinux Developer Summit 2009: CfP ends TODAY
- From: James Morris <jmorris@xxxxxxxxxx>
- Re: The problem with TUN/TAP devices
- From: James Morris <jmorris@xxxxxxxxx>
- Re: "Policy inclusion" tool ... ?
- From: Tom London <selinux@xxxxxxxxx>
- The problem with TUN/TAP devices
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "Policy inclusion" tool ... ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- "Policy inclusion" tool ... ?
- From: Tom London <selinux@xxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: "Big Thanks To The SELinux Team"
- From: Shaz <shazalive@xxxxxxxxx>
- Re: "Big Thanks To The SELinux Team"
- From: Dennis Wronka <linuxweb@xxxxxxx>
- "Big Thanks To The SELinux Team"
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Can RHEL 5 set Context of Threads?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Can RHEL 5 set Context of Threads?
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: SELinux and no capabilities
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux and no capabilities
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] c/r: tighten ptrace checking for checkpoint to PTRACE_MODE_ATTACH
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] selinux: clean up avc node cache when disabling selinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v2] selinux: clean up avc node cache when disabling selinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH -v2] selinux: clean up avc node cache when disabling selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH] selinux: clean up avc node cache when disabling selinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: clean up avc node cache when disabling selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH libselinux] check /proc/filesystems before /proc/mounts for selinuxfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH libselinux] check /proc/filesystems before /proc/mounts for selinuxfs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Failure to build policycoreutils from git
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Failure to build policycoreutils from git
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Failure to build policycoreutils from git
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Failure to build policycoreutils from git
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- [ANN] CDS Framework 3.6
- From: Dave Sugar <dsugar@xxxxxxxxxx>
- Re: setfiles will only put out a "*" if > 1000 files are fixed.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SELinux context patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Add btrfs to fixfiles.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Problems with freeing thread local storage in libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: chcat fixes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [patch] selinux: restore optimization to selinux_file_permission
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] selinux: restore optimization to selinux_file_permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [patch] selinux: restore optimization to selinux_file_permission
- From: Paul Moore <paul.moore@xxxxxx>
- [patch] selinux: restore optimization to selinux_file_permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: chcat fixes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/1] cr: lsm: restore LSM contexts for ipc objects
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- SELinux and no capabilities
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: chcat fixes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Setting Context of Threads
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: James Morris <jmorris@xxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] cleanup in ss/services.c
- From: James Morris <jmorris@xxxxxxxxx>
- Re: type bounds audit messages
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] cleanup in ss/services.c
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Jason Johnson <jason.johnson.081@xxxxxxxxx>
- Re: type bounds audit messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Reminder: SELinux Developer Summit CfP closes 1st July
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Possible bug with fd class?
- From: Jason Johnson <jason.johnson.081@xxxxxxxxx>
- Re: Possible bug with fd class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible bug with fd class?
- From: Jason Johnson <jason.johnson.081@xxxxxxxxx>
- Re: type bounds audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Possible bug with fd class?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Possible bug with fd class?
- From: Jason Johnson <jason.johnson.081@xxxxxxxxx>
- Re: type bounds audit messages
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: type bounds audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: type bounds audit messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: type bounds audit messages
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Problems with freeing thread local storage in libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] problem when compiling svn policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- problem when compiling svn policy
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [PATCH 09/10] cr: restore LSM credentials
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 10/10] cr: lsm: restore file->f_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] cr: lsm: restore file->f_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 09/10] cr: restore LSM credentials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] cr: lsm: restore file->f_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/10] cr: restore LSM credentials
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/10] cr: restore LSM credentials
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 10/10] cr: lsm: restore file->f_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- libsemanage direct_api can return errors < 0.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- libsemanage spelling mistake in error code.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux context patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux context patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux context patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux context patch
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: SELinux context patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux context patch
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: SELinux context patch
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: [PATCH] SELinux: define audit permissions for audit tree netlink messages
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: define audit permissions for audit tree netlink messages
- From: Eric Paris <eparis@xxxxxxxxxx>
- A little more sctp and selinux
- From: Nigel Rumens <wooky@xxxxxxxxxxxxx>
- Re: SuSE 11
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SuSE 11
- From: "Rouse, Alan" <arouse@xxxxxxxxxxxxxx>
- Re: [refpolicy] libjackserver.so file context
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] libjackserver.so file context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [refpolicy] libjackserver.so file context
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- RE: [Clip] Unexpected role change from custom role back to user_r SOLVED
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zero
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- [ANN] 2009 SELinux Developer Summit Call for Participation
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [Clip] Unexpected role change from custom role back to user_r
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: I am a beginner,can you recommand me some website?
- From: Dominick Grift <domg472@xxxxxxxxx>
- I am a beginner,can you recommand me some website?
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- [ANN] Apache/SELinux plus release
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- RE: [Clip] Unexpected role change from custom role back to user_r
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- RE: [Clip] Unexpected role change from custom role back to user_r
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: Paul Moore <paul.moore@xxxxxx>
- RE: [Clip] Unexpected role change from custom role back to user_r
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: Unexpected role change from custom role back to user_r
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Unexpected role change from custom role back to user_r
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: selinux and sctp
- From: Nigel Rumens <wooky@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: Nigel Rumens <wooky@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: James Morris <jmorris@xxxxxxxxx>
- Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zero
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- Re: Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zero
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux and sctp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Introducing SELinux Sanbox
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Introducing SELinux Sanbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Introducing SELinux Sanbox
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Introducing SELinux Sanbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Introducing SELinux Sanbox
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux and sctp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux and sctp
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: selinux and sctp
- From: Nigel Rumens <wooky@xxxxxxxxxxxxx>
- Re: selinux and sctp
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux acl's options
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: SELinux acl's options
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux acl's options
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: avc: denied null
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Incorrect avc logs for the packet object class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: chcat fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc: denied null
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: chcat fixes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: avc: denied null
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Add btrfs to fixfiles.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- chcat fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Incorrect avc logs for the packet object class
- From: Marshall Miller <mmiller@xxxxxxxxxx>
- setfiles will only put out a "*" if > 1000 files are fixed.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: SELinux context patch
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- policycoreutils-po is F11 policycoreutils translations patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: selinux policy for gedit
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: selinux policy for gedit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sources for SELinux GConf ??
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: Policy loading problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc: denied null
- From: Dominick Grift <domg472@xxxxxxxxx>
- selinux policy for gedit
- From: hechao55429 <hechao55429@xxxxxxx>
- Policy loading problem
- From: "Dennis Wronka" <linuxweb@xxxxxxx>
- Re: avc: denied null
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: BUG in SELinux compat_net code
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: BUG in SELinux compat_net code
- From: Paul Moore <paul.moore@xxxxxx>
- SELinux tools list
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Sources for SELinux GConf ??
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: This patch fixes the exception handling in libselinux-python bindings
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Minor issue with reading selinuxfs booleans.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Minor issue with reading selinuxfs booleans.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Minor issue with reading selinuxfs booleans.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: move SELINUX_MAGIC into magic.h
- From: James Morris <jmorris@xxxxxxxxx>
- Re: avc: denied null
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- SELinux context patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch outputs <<none>> from the matchpathcon command when it gets enoent
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Authorization Workflow for Message Queueing Platform
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: Patch matchpathcon to eliminate file "/"
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to getdefaultcon to print just the correct match and add verbose option
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: sepolgen typo fix
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: patch to policycoreutils
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: We have moved matchpathcon to /sbin from /usr/sbin
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Memory leak in libselinux/src/label_file.c
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] SELinux: move SELINUX_MAGIC into magic.h
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Authorization Workflow for Message Queueing Platform
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: threads and context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- threads and context
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: avc: denied null
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: daemons and MCS categories
- From: Joe Nall <joe@xxxxxxxx>
- Re: avc: denied null
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Dropping SELinux privileges
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- avc: denied null
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Dropping SELinux privileges
- Re: daemons and MCS categories
- From: Joe Nall <joe@xxxxxxxx>
- Re: write selinux policy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: write selinux policy
- From: Dominick Grift <domg472@xxxxxxxxx>
- write selinux policy
- From: hechao55429 <hechao55429@xxxxxxx>
- Re: Dropping SELinux privileges
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Dropping SELinux privileges
- From: Sebastien Raveau <sebastien.raveau@xxxxxxxx>
- Re: Patch to getdefaultcon to print just the correct match and add verbose option
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: make: *** No rule to make target with latest svn
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- make: *** No rule to make target with latest svn
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: the problem about install refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- the problem about install refpolicy
- From: hechao55429 <hechao55429@xxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Authorization Workflow for Message Queueing Platform
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: Nodecon configuration question [solved]
- From: Thomas <selinux-thomas@xxxxxxxxxx>
- Re: Nodecon configuration question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Nodecon configuration question
- From: Thomas <selinux-thomas@xxxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodies
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodies
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodies
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Nodecon configuration question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Nodecon configuration question
- From: Thomas Bludau <selinux-thomas@xxxxxxxxxx>
- Re: daemons and MCS categories
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: EOF missing newline bug in squid.fc / toolchain
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodies
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Update selinux ioctl test
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update ltp selinux test script and policy
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix ltp selinux testsuite for rhel5
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update ltp selinux testsuite README
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix MLS handling in selinux tests
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- EOF missing newline bug in squid.fc / toolchain
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- how to enable gconf(arole_dbus_t errors) and all of the gnome goodies
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: does this picture reflect the basics of the current selinux architecture?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: does this picture reflect the basics of the current selinux architecture?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- does this picture reflect the basics of the current selinux architecture?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- [PATCH] An interface to allow web-apps minimum privileges (Re: [RFC] mod_selinux security policy)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: max <maximilianbianco@xxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: We have moved matchpathcon to /sbin from /usr/sbin
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: SELinux and access(2), we want to know.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux and access(2), we want to know.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Memory leak in libselinux/src/label_file.c
- From: "Chad Sellers" <csellers@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fixes for libselinux/matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fixes for libselinux/matchpathcon
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Add Ruby Bindings
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Add Ruby Bindings
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] mod_selinux security policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole (fwd)
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] Update ltp selinux testsuite README
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policy as configuration data
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policy development library documentation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policy as configuration data
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policy development library documentation
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policy development library documentation
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: policy as configuration data
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policy as configuration data
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problems with freeing thread local storage in libselinux
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Problems with freeing thread local storage in libselinux
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- policy as configuration data
- From: "Caleb Case" <ccase@xxxxxxxxxx>
- Re: Using interfaces defined elsewhere
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: Using interfaces defined elsewhere
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Using interfaces defined elsewhere
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- SETRANS + libavg = SIGSEGV on Hardy
- From: Caleb Case <calebcase@xxxxxxxxx>
- [PATCH] Fix ltp selinux testsuite for rhel5
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update selinux ioctl test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Update ltp selinux test script and policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix send_sigiotask hook
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] selinux: Fix send_sigiotask hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: labeled network aware kernel
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- [PATCH] Fix MLS handling in selinux tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled network aware kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: labeled network aware kernel
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- SELinux managing-confined-services guide - call for review
- From: Scott Radvan <sradvan@xxxxxxxxxx>
- Re: [PATCH] SELinux: drop secondary_ops->sysctl
- From: James Morris <jmorris@xxxxxxxxx>
- Re: load_policy.c:351:1: error: "MNT_DETACH" redefined
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] Fix running of the selinux tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy.c:351:1: error: "MNT_DETACH" redefined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: drop secondary_ops->sysctl
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: drop secondary_ops->sysctl
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: load_policy.c:351:1: error: "MNT_DETACH" redefined
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: load_policy.c:351:1: error: "MNT_DETACH" redefined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- load_policy.c:351:1: error: "MNT_DETACH" redefined
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: the system can't be started after I configure the
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- the system can't be started after I configure the
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- Re: [LTP] [PATCH] Fix running of the selinux tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] mod_selinux security policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux managing-confined-services guide - call for review
- From: Scott Radvan <sradvan@xxxxxxxxxx>
- Re: [LTP] [PATCH] Fix running of the selinux tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: is it possible to use type_transition with every class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: is it possible to use type_transition with every class?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labeled network aware kernel
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- is it possible to use type_transition with every class?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: patch to policycoreutils
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: labeled network aware kernel
- From: Paul Moore <paul.moore@xxxxxx>
- Re: SELinux managing-confined-services guide - call for review
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: [refpolicy] runcon cant really run(constraint issue?)
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] runcon cant really run(constraint issue?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: runcon cant really run(constraint issue?)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problems related to using SELinux
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: patch to policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: labeled network aware kernel
- From: Paul Moore <paul.moore@xxxxxx>
- Re: labeled network aware kernel
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: patch to policycoreutils
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: sepolgen typo fix
- From: Chad Sellers <csellers@xxxxxxxxxx>
- runcon cant really run(constraint issue?)
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: labeled network aware kernel
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Alexey S <selinux@xxxxxxxx>
- Re: access(2) vs. SELinux
- labeled network aware kernel
- From: Mark Webb <elihusmails@xxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: newrole and pam.d/*
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: newrole and pam.d/*
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: newrole and pam.d/*
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Alexey S <selinux@xxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Fix an errorneous using of a different return value in selinux_entrypoint test
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC PATCH] access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- newrole and pam.d/*
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [RFC PATCH] access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH] access(2) vs. SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: genhomedircon errors with NIS
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- genhomedircon errors with NIS
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: SELinux: unrecognized netlink message
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- [RFC PATCH] access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: SELinux: unrecognized netlink message
- From: Paul Moore <paul.moore@xxxxxx>
- Re: access(2) vs. SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: can't access problem a file with a given range (mls policy)
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Policy building and loading problems
- From: Shaz <shazalive@xxxxxxxxx>
- Re: daemons and MCS categories
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Fix an errorneous using of a different return value in selinux_entrypoint test
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- can't access problem a file with a given range (mls policy)
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Fwd: [LTP] [PATCH] Fix an errorneous using of a different return value in selinux_entrypoint test
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Fwd: [LTP] [PATCH] Create $SELINUXTMPDIR in each of the tests
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- SELinux: unrecognized netlink message
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Patch matchpathcon to eliminate file "/"
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Alexey S <selinux@xxxxxxxx>
- Re: access(2) vs. SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: access(2) vs. SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- access(2) vs. SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dynamic context transitions from kernel space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy building and loading problems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux behavior in permissive mode wrt invalid domains
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- dynamic context transitions from kernel space
- From: Fedor Sakharov <teo.montekki@xxxxxxxxx>
- Policy building and loading problems
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Problems related to the policy language
- From: Tim <timasyk@xxxxxxxxx>
- libselinux behavior in permissive mode wrt invalid domains
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Flask Policy Parser (FPP) support for merge_type, clone_type, and add and remove blocks
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policies for Devices?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: strange semanage user|login errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Alexey S <selinux@xxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: "Alexey S." <selinux@xxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: strange semanage user|login errors
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- strange semanage user|login errors
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: Policies for Devices?
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Policies for Devices?
- From: Robert Mykland <robert@xxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: my thoughts on how Labeled NFSv4 draft should move forward
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Joe Nall <joe@xxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Joe Nall <joe@xxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Joe Nall <joe@xxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problems related to the policy language
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Alexey S <selinux@xxxxxxxx>
- Re: Problems related to the policy language
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problems related to the whole policy infrastructure
- From: Kirill Novikov <redbyte.labs@xxxxxxxxx>
- Re: Policy infrastructure problems and improvement
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Problems related to the policy management infrastructure
- From: Dominick Grift <domg472@xxxxxxxxx>
- git dbus not seeing selinux
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Problems related to the whole policy infrastructure
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Problems related to the policy language
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Problems related to customizing policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Problems related to the policy management infrastructure
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Problems related to using SELinux
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Policy infrastructure problems and improvement
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Running snmpd in a different domain
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: Running snmpd in a different domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Running snmpd in a different domain
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Running snmpd in a different domain
- From: Bandan Das <bandan.das@xxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Paul Moore <paul.moore@xxxxxx>
- Re: SELinux userpace compile errors
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: SELinux userpace compile errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux userpace compile errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux userpace compile errors
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: nc -l does not need permission name_bind to bind to a port!?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: diff between name_bind,bind and node_bind
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: nc -l does not need permission name_bind to bind to a port!?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is there strict policy for fedora 10?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Is there strict policy for fedora 10?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Is there strict policy for fedora 10?
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- Re: diff between name_bind,bind and node_bind
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: nc -l does not need permission name_bind to bind to a port!?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: nc -l does not need permission name_bind to bind to a port!?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: diff between name_bind,bind and node_bind
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- diff between name_bind,bind and node_bind
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: Interoperation with SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [nfsv4] my thoughts on how Labeled NFSv4 draft should move forward
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- my thoughts on how Labeled NFSv4 draft should move forward
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: SELinux packages version (svn2950)...
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: SELinux packages version (svn2950)...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: SELinux packages version (svn2950)...
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: SELinux packages version (svn2950)...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: SELinux packages version (svn2950)...
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- SELinux packages version (svn2950)...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: request for review of httpd-related Boolean definitions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: request for review of httpd-related Boolean definitions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [ANN] SELinux userspace release
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- nc -l does not need permission name_bind to bind to a port!?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [ANN] SELinux userspace release
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] SELinux userspace release
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]