SELinux - Date Index
[Prev Page][Next Page]
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [saag] Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Memory leak in libselinux/src/label_file.c
- From: Hiroshi Shinji <hiroshi.shinji@xxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Paul Moore <paul.moore@xxxxxx>
- Re: xine_init() causes segfault in libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Common labeled security (comment on CALIPSO, labeled NFSv4)
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Correct manner to handler undefined classes/permissions? (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace object manager
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace object manager
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Paul Moore <paul.moore@xxxxxx>
- We have moved matchpathcon to /sbin from /usr/sbin
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fixes for libselinux/matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- patch to policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace object manager
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Correct manner to handler undefined classes/permissions? (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Correct manner to handler undefined classes/permissions? (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [PATCH] Permissive domain in userspace object manager
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Permissive domain in userspace object manager
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Andy Warner <warner@xxxxxxxxx>
- sepolgen typo fix
- From: Marshall Miller <mmiller@xxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [PATCH] Permissive domain in userspace (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Paul Moore <paul.moore@xxxxxx>
- Re: request for review of httpd-related Boolean definitions
- From: m <maximilianbianco@xxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: request for review of httpd-related Boolean definitions
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [RFC] Security policy reworks for SE-PostgreSQL
- From: Andy Warner <warner@xxxxxxxxx>
- setools make error
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- [RFC] Security policy reworks for SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- request for review of httpd-related Boolean definitions
- From: Scott Radvan <sradvan@xxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: xine_init() causes segfault in libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- xine_init() causes segfault in libselinux
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [PATCH 0/6] Labeled networking patches for 2.6.30
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Labeled networking patches for 2.6.30
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] smack: Add a new '-CIPSO' option to the network address label configuration
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] netlabel: Label incoming TCP connections correctly in SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] netlabel: Cleanup the Smack/NetLabel code to fix incoming TCP connections
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Permissive domain in userspace (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Labeled networking patches for 2.6.30
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- [PATCH 0/6] Labeled networking patches for 2.6.30
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/6] netlabel: Label incoming TCP connections correctly in SELinux
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 4/6] lsm: Remove the socket_post_accept() hook
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 5/6] netlabel: Cleanup the Smack/NetLabel code to fix incoming TCP connections
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 6/6] smack: Add a new '-CIPSO' option to the network address label configuration
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 3/6] selinux: Remove the "compat_net" compatibility code
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/6] lsm: Relocate the IPv4 security_inet_conn_request() hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/6] lsm: Relocate the IPv4 security_inet_conn_request() hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/6] lsm: Relocate the IPv4 security_inet_conn_request() hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to python bindings
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: Patch to python bindings
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: [idea] web-application security powered by SELinux]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Policy rework for SE-PostgreSQL (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] Policy rework for SE-PostgreSQL (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [PATCH] Policy rework for SE-PostgreSQL (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] Policy rework for SE-PostgreSQL (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Andy Warner <warner@xxxxxxxxx>
- [PATCH] Policy rework for SE-PostgreSQL (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] database audit integration (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [Fwd: [idea] web-application security powered by SELinux]
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: /usr/bin/firefox not mozilla_exec_t, why?
- From: Xavier Toth <txtoth@xxxxxxxxx>
- /usr/bin/firefox not mozilla_exec_t, why?
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [Fwd: [idea] web-application security powered by SELinux]
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- [PATCH] Permissive domain in userspace (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] database audit integration (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Expose avc_netlink_loop() for applications (Re: Some ideas in SE-PostgreSQL enhancement)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- [Fwd: [idea] web-application security powered by SELinux]
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Re: New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: Andy Warner <warner@xxxxxxxxx>
- Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: Andy Warner <warner@xxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: Shaz <shazalive@xxxxxxxxx>
- Re: The status of SE-PostgreSQL
- From: Shaz <shazalive@xxxxxxxxx>
- Re: installing setools errors
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- The status of SE-PostgreSQL
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- JLS2009: How does the security folks?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: installing setools errors
- From: Dominick Grift <domg472@xxxxxxxxx>
- installing setools errors
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- Re: How safe are ncurses apps?
- From: Stephen John Smoogen <smooge@xxxxxxxxx>
- How safe are ncurses apps?
- From: "justinmattock@xxxxxxxxx" <justinmattock@xxxxxxxxx>
- [ANN] CLIP v3.1.0 for RHEL 5.3
- From: Brandon Whalen <bwhalen@xxxxxxxxxx>
- Re: Policy Access Control
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: ?????: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ?????: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: adding LANG and XMODIFIER to newrole minimal environment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: fix boolean state smashing
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] CDS Framework 3.3
- From: Dave Sugar <dsugar@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- RE: Unable to disable SELinux
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding LANG and XMODIFIER to newrole minimal environment
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: adding LANG and XMODIFIER to newrole minimal environment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: questions
- From: Shaz <shazalive@xxxxxxxxx>
- Re: questions
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: questions
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [refpolicy] dbus/lvm read domain state
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: adding LANG and XMODIFIER to newrole minimal environment
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [refpolicy] dbus/lvm read domain state
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Unable to disable SELinux
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Unable to disable SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Unable to disable SELinux
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: questions
- From: Russell Coker <russell@xxxxxxxxxxxx>
- adding LANG and XMODIFIER to newrole minimal environment
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: questions
- From: Shaz <shazalive@xxxxxxxxx>
- Re: Unable to disable SELinux
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Unable to disable SELinux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/3] lsm: Relocate the IPv4 security_inet_conn_request() hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Ответ: VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Unable to disable SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Unable to disable SELinux
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- Re: questions
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: New MAC label support Internet Draft posted to IETF website
- From: Peter Staubach <staubach@xxxxxxxxxx>
- [RFC PATCH v1 1/3] lsm: Relocate the IPv4 security_inet_conn_request() hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 2/3] netlabel: Label incoming TCP connections correctly in SELinux
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 3/3] netlabel: Label incoming TCP connections correctly in Smack
- From: Paul Moore <paul.moore@xxxxxx>
- Re: New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC PATCH v1 0/3] Fix a problem with incoming TCP connections and NetLabel
- From: Paul Moore <paul.moore@xxxxxx>
- Re: questions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Significance of the level on a port configuration
- From: Paul Moore <paul.moore@xxxxxx>
- Re: questions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- questions
- From: sixiaolin0 <sixiaolin067@xxxxxxx>
- Re: Significance of the level on a port configuration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Significance of the level on a port configuration
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Help with python seobject.loginRecords
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH -v2] libselinux: cache avc_compute_create results in the avc
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Joe Nall <joe@xxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Joe Nall <joe@xxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Joe Nall <joe@xxxxxxxx>
- Re: Help with python seobject.loginRecords
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Significance of the level on a port configuration
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Significance of the level on a port configuration
- From: Andy Warner <warner@xxxxxxxxx>
- Help with python seobject.loginRecords
- From: Joe Nall <joe@xxxxxxxx>
- libsemanage.semanage_commit: Will not commit because caller does not have a tranaction lock yet.
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH -v2] libselinux: cache avc_compute_create results in the avc
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Adam Jackson Patch to accellerate X Windows/SELinux stuff.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH -v2] libselinux: cache avc_compute_create results in the avc
- From: Eric Paris <eparis@xxxxxxxxxx>
- [ANN] CLIP mail list
- From: Brandon Whalen <bwhalen@xxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: cache avc_compute_create results in the avc
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libselinux: cache avc_compute_create results in the avc
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: inode_doinit_with_dentry drop no dentry printk
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: inode_doinit_with_dentry drop no dentry printk
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: make inode_doinit_with_dentry printk debug
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Talking to Nalin today about the path substitution semanage problem, and he came up with a great idea.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Talking to Nalin today about the path substitution semanage problem, and he came up with a great idea.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I have not used the selabel interface replacement for matchpathcon, that much
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: make inode_doinit_with_dentry printk debug
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: I have not used the selabel interface replacement for matchpathcon, that much
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- I have not used the selabel interface replacement for matchpathcon, that much
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: new permission between tty audit and audit socket
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: open perm for sock files
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: open perm for sock files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: new permission between tty audit and audit socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: new permission between tty audit and audit socket
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: open perm for sock files
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: PAM, GNOME, etc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PAM, GNOME, etc
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- PAM, GNOME, etc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Patch to getdefaultcon to print just the correct match and add verbose option
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch matchpathcon to eliminate file "/"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to libselinux to add svirt/virtual_domain context files.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: dbus reading /proc/X/cmdline
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: dbus reading /proc/X/cmdline
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus reading /proc/X/cmdline
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: dbus reading /proc/X/cmdline
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: gnome and dbus
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- dbus reading /proc/X/cmdline
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: gnome and dbus
- From: Russell Coker <russell@xxxxxxxxxxxx>
- gnome and dbus
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Xorg: always use raw contexts in the xserver
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] libselinux: cache avc_compute_create results in the avc
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix a panic in selinux_netlbl_inode_permission()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [PATCH v2] refpolicy: Add missing network related MLS constraints
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix a panic in selinux_netlbl_inode_permission()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH] selinux: Fix a panic in selinux_netlbl_inode_permission()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: refpolicy compilation issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC] X+SELinux performance work
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC] X+SELinux performance work
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: refpolicy compilation issue
- From: "Kirill \"REDbyte\" Novikov" <redbyte.labs@xxxxxxxxx>
- Re: refpolicy compilation issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- refpolicy compilation issue
- From: "Kirill \"REDbyte\" Novikov" <redbyte.labs@xxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- RE: PHP/SELinux: libselinux wrappers
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Joe Nall <joe@xxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: /selinux/create + X windows = performance limiter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /selinux/create + X windows = performance limiter
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] [PATCH v2] refpolicy: Add missing network related MLSconstraints
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [PATCH v2] refpolicy: Add missing network related MLSconstraints
- From: Paul Moore <paul.moore@xxxxxx>
- RE: [refpolicy] [PATCH v2] refpolicy: Add missing network related MLSconstraints
- From: <chanson@xxxxxxxxxxxxx>
- RE: LCA 2009
- From: "Nayak Debabrata-a22788" <debabratanayak@xxxxxxxxxxxx>
- Re: LCA 2009
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: LCA 2009
- From: James Morris <jmorris@xxxxxxxxx>
- LCA 2009
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: semanage fcontext --list doesn't list contexts which include HOME_DIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage fcontext --list doesn't list contexts which include HOME_DIR
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: semanage fcontext --list doesn't list contexts which include HOME_DIR
- From: Joe Nall <joe@xxxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLS constraints
- From: Paul Moore <paul.moore@xxxxxx>
- semanage fcontext --list doesn't list contexts which include HOME_DIR
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: ext3 security labels missing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: ext3 security labels missing
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLS constraints
- From: Joe Nall <joe@xxxxxxxx>
- Re: ext3 security labels missing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- [PATCH v2] refpolicy: Add missing network related MLS constraints
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] selinux: Fix the NetLabel glue code for setsockopt()
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] cipso: Fix documentation comment
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 0/2] Fixes for 2.6.29
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Application-level Access Management
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ext3 security labels missing
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: ext3 security labels missing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: ext3 security labels missing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ext3 security labels missing
- From: Dennis Wronka <linuxweb@xxxxxxx>
- ext3 security labels missing
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: VMware-server 2.0 and selinux
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- VMware-server 2.0 and selinux
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Application-level Access Management
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Several fixes to restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sepolgen patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Several fixes to restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Make removing of a module a warning rather then an error.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils_semanage.patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: audit2allow patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Add btrfs to fixfiles
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] aliases for the boundry format
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils_restorecond.patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANNOUNCE] Flask Policy Parser (FPP)
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to libsemanage to remove labeling of /root
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Several fixes to restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Add btrfs to fixfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Add missing --level option to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Remove bogus audit2allow option
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Removing a module that does not exist should not be an error.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- run_init
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: <chanson@xxxxxxxxxxxxx>
- Re: sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Russell Coker <russell@xxxxxxxxxxxx>
- sysvinit doesnt see libselinux/libsepol (LFS system);
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: <chanson@xxxxxxxxxxxxx>
- Re: [PATCH -v2 2/3] SELinux: call capabilities code directory
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/5] SELinux: remove unused av.decided field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 4/5] SELinux: code readability with avc_cache
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/5] SELinux: convert the avc cache hash list to an hlist
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v2 3/3] SELinux: better printk when file with invalid label found
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v2 2/3] SELinux: call capabilities code directory
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/5] SELinux: more careful use of avd in avc_has_perm_noaudit
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/5] SELinux: remove the unused ae.used
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: NULL terminate al contexts from disk
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- RE: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: <chanson@xxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2 2/3] SELinux: call capabilities code directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2 3/3] SELinux: better printk when file with invalid label found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [refpolicy] [PATCH] refpolicy: Add missing network related MLSconstraints
- From: <chanson@xxxxxxxxxxxxx>
- Re: [PATCH -v2 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] aliases for the boundry format
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 3/5] SELinux: remove unused av.decided field
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] aliases for the boundry format
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/5] SELinux: more careful use of avd in avc_has_perm_noaudit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] SELinux: remove the unused ae.used
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: NULL terminate al contexts from disk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] SELinux: remove the unused ae.used
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: James Morris <jmorris@xxxxxxxxx>
- Re: cron sys_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux blocking Samba share mounting?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux blocking Samba share mounting?
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- [PATCH] refpolicy: Add missing network related MLS constraints
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] SELinux: NULL terminate al contexts from disk
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [PATCH 5/5] SELinux: convert the avc cache hash list to an hlist
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 4/5] SELinux: code readability with avc_cache
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/5] SELinux: remove unused av.decided field
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/5] SELinux: more careful use of avd in avc_has_perm_noaudit
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/5] SELinux: remove the unused ae.used
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] SELinux: remove the unused ae.used
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH -v2 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2 2/3] SELinux: call capabilities code directory
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2 3/3] SELinux: better printk when file with invalid label found
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/5] SELinux: more careful use of avd in avc_has_perm_noaudit
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 5/5] SELinux: convert the avc cache hash list to an hlist
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 4/5] SELinux: code readability with avc_cache
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 1/5] SELinux: remove the unused ae.used
- From: Eric Paris <eparis@xxxxxxxxxx>
- [DO NOT COMMIT PATCH 2/2] SELinux: make avc_cache per cpu - DO NOT COMMIT
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/5] SELinux: remove unused av.decided field
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: check seqno when updating an avc_node
- From: Eric Paris <eparis@xxxxxxxxxx>
- [DO NOT COMMIT PATCH 1/2] SELinux: place avc_cache hlist and lock together - DO NOT COMMIT!!!
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/2] SELinux: NULL terminate al contexts from disk
- From: Eric Paris <eparis@xxxxxxxxxx>
- SELinux blocking Samba share mounting?
- From: Steven Stromer <filter@xxxxxxxxxxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: Nicolas Williams <Nicolas.Williams@xxxxxxx>
- Re: cron sys_admin
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- cron sys_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
- From: James Morris <jmorris@xxxxxxxxx>
- Re: New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: mdadm failure in MLS Enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mdadm failure in MLS Enforcing
- From: Joe Nall <joe@xxxxxxxx>
- Re: Question about su
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: mdadm failure in MLS Enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mdadm failure in MLS Enforcing
- From: Joe Nall <joe@xxxxxxxx>
- Re: mdadm failure in MLS Enforcing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question about su
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Question about su
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Question about su
- From: Dominick Grift <domg472@xxxxxxxxx>
- Question about su
- From: Dennis Wronka <linuxweb@xxxxxxx>
- mdadm failure in MLS Enforcing
- From: Joe Nall <joe@xxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] aliases for the boundry format
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- [Fwd: Re: bind-mounted homedirs]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: better printk when file with invalid label found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: better printk when file with invalid label found
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: call capabilities code directory
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: better printk when file with invalid label found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: call capabilities code directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New MAC label support Internet Draft posted to IETF website
- From: Peter Staubach <staubach@xxxxxxxxxx>
- [PATCH 1/3] SELinux: fix selinux to safely handle any bugs even when not CONFIG_BUG
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] SELinux: call capabilities code directory
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: better printk when file with invalid label found
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- RE: odd policy behavior
- From: <chanson@xxxxxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security_compute_av_raw confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: security_compute_av_raw confusion
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: I need your new version of mcs with color incoding in Rawhide now...
- From: Joe Nall <joe@xxxxxxxx>
- Re: security_compute_av_raw confusion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security_compute_av_raw confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: security_compute_av_raw confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: security_compute_av_raw confusion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- security_compute_av_raw confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: problem with capabilities inheritance and auditing in python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- problem with capabilities inheritance and auditing in python
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH v1] selinux: Remove the "compat_net" compatibility code
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1] selinux: Remove the "compat_net" compatibility code
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Base module, modules.conf
- From: Dominick Grift <domg472@xxxxxxxxx>
- [RFC PATCH v1] selinux: Remove the "compat_net" compatibility code
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Base module, modules.conf
- From: Cheyenne Solo <ayla.cheyenne@xxxxxxxxx>
- Re: odd policy behavior
- From: "James W. Hoeft" <Jim@xxxxxxxxxxxxxx>
- Re: odd policy behavior
- From: Joe Nall <joe@xxxxxxxx>
- Re: odd policy behavior
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: odd policy behavior
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: odd policy behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: odd policy behavior
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How do Netlink work?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How do Netlink work?
- From: xing li <lixing.1006@xxxxxxxxx>
- Re: odd policy behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of symbolic links on ubifs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Security context of symbolic links on ubifs
- From: Tim <timasyk@xxxxxxxxx>
- Re: filesystem mount AVC denial
- From: James Morris <jmorris@xxxxxxxxx>
- Re: odd policy behavior
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: odd policy behavior
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: odd policy behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: odd policy behavior
- From: Xavier Toth <txtoth@xxxxxxxxx>
- RE: filesystem mount AVC denial
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: odd policy behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- odd policy behavior
- From: Xavier Toth <txtoth@xxxxxxxxx>
- I need your new version of mcs with color incoding in Rawhide now...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Security context of symbolic links on ubifs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: LTP SELinux policy error
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Security context of symbolic links on ubifs
- From: Tim <timasyk@xxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: filesystem mount AVC denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: LTP SELinux policy error
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- filesystem mount AVC denial
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: LTP SELinux policy error
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [LTP] LTP SELinux policy error
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: LTP SELinux policy error
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- RE: What happened to http://www.nsa.gov/selinux/ ????
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove hooks which simply defer to capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH][RFC] selinux: remove hooks which simply defer to capabilities
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 13/13] selinux: remove secondary ops call to file_mprotect
- From: James Morris <jmorris@xxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: LTP SELinux policy error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 13/13] selinux: remove secondary ops call to file_mprotect
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: LTP SELinux policy error
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 09/18] selinux: remove secondary ops call to inode_follow_link
- From: James Morris <jmorris@xxxxxxxxx>
- Re: LTP SELinux policy error
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 09/18] selinux: remove secondary ops call to inode_follow_link
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: Eric Paris <eparis@xxxxxxxxxx>
- LTP SELinux policy error
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 14/18] selinux: remove unused cred_commit hook
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 15/18] selinux: remove secondary ops call to task_setrlimit
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 12/18] selinux: remove secondary ops call to file_mprotect
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 13/18] selinux: remove secondary ops call to task_create
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 13/13] selinux: remove secondary ops call to file_mprotect
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 09/18] selinux: remove secondary ops call to inode_follow_link
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 06/18] selinux: remove secondary ops call to inode_link
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 03/18] selinux: remove secondary ops call to bprm_committed_creds
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 10/18] selinux: remove secondary ops call to inode_permission
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 18/18] selinux: remove secondary ops call to shm_shmat
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 17/18] selinux: remove secondary ops call to unix_stream_connect
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 16/18] selinux: remove secondary ops call to task_kill
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 11/18] selinux: remove secondary ops call to inode_setattr
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH][RFC] selinux: remove noop secondary_ops calls
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 01/18] selinux: remove unused bprm_check_security hook
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 08/18] selinux: remove secondary ops call to inode_mknod
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 07/18] selinux: remove secondary ops call to inode_unlink
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 05/18] selinux: remove secondary ops call to sb_umount
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 04/18] selinux: remove secondary ops call to sb_mount
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 02/18] selinux: remove secondary ops call to bprm_committing_creds
- From: James Morris <jmorris@xxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Bryan Kropf <Bryan_Kropf@xxxxxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: What happened to http://www.nsa.gov/selinux/ ????
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- What happened to http://www.nsa.gov/selinux/ ????
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [DSE-Dev] [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- Re: O'Rielly SELinux Book (2005)
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: O'Rielly SELinux Book (2005)
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Jarrett Lu <Jarrett.Lu@xxxxxxx>
- Re: (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Enabling the "noatime" option on filesystems...
- From: James Morris <jmorris@xxxxxxxxx>
- Enabling the "noatime" option on filesystems...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: O'Rielly SELinux Book (2005)
- From: "Sutton, Harry (MSE)" <harry.sutton@xxxxxx>
- O'Rielly SELinux Book (2005)
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: Mitigating SQL injection attacks with access-control
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- SE-PostgreSQL to be considered for upstream in PostgreSQL
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: James Morris <jmorris@xxxxxxxxx>
- Re: (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Mitigating SQL injection attacks with access-control
- From: Stephen Frost <sfrost@xxxxxxxxxxx>
- Mitigating SQL injection attacks with access-control
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- (forw) [bruce@xxxxxxxxxx: [ANNOUNCE] Need help on possible PG 8.4 security features]
- From: Stephen Frost <sfrost@xxxxxxxxxxx>
- Re: 3.6.3 policy on fc10 and kerneloops
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: 3.6.3 policy on fc10 and kerneloops
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 3.6.3 policy on fc10 and kerneloops
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- 3.6.3 policy on fc10 and kerneloops
- From: Xavier Toth <txtoth@xxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [Labeled-nfs] [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: "Kevin L. Smith" <kls@xxxxxxxxxxxxx>
- More MLS fun
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [nfsv4] New MAC label support Internet Draft posted to IETF website
- From: Peter Staubach <staubach@xxxxxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- New MAC label support Internet Draft posted to IETF website
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: run_init confusion
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Policy Access Control
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: run_init confusion
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: run_init confusion
- From: Joe Nall <joe@xxxxxxxx>
- run_init confusion
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [IPsec] IPsec Security Context drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Base module, modules.conf
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: netstat -Z
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Base module, modules.conf
- From: Joe Nall <joe@xxxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH] Add a new permission to db_procedure
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- LCA 2010 security mini-conf
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Jacques Thomas <jthomas@xxxxxxxxxxxxx>
- Re: Customizable types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: netstat -Z
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netstat -Z
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: netstat -Z
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- netstat -Z
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC v4]Provide a method for detecting labeling support on a file system
- From: James Morris <jmorris@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Customizable types
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Base module, modules.conf
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Base module, modules.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Announce: RSBAC 1.4.0 released
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Base module, modules.conf
- From: "Cheyenne Solo" <ayla.cheyenne@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Announce: RSBAC 1.4.0 released
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC v4]Provide a method for detecting labeling support on a file system
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]