SELinux - Date Index
[Prev Page][Next Page]
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC v4]Provide a method for detecting labeling support on a file system
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Announce: RSBAC 1.4.0 released
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Problem with the previous libsemanage patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Announce: RSBAC 1.4.0 released
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Article in Itwire
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: IPsec Security Context drafts posted to IETF
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- policycoreutils_semanage.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils_restorecond.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Make removing of a module a warning rather then an error.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to libsemanage to remove labeling of /root
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit2allow patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- sepolgen patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semodule patch to use new semanage interfaces
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Small fixes for audit2allow
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: chcat patch.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Problem in sepolgen
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- IPsec Security Context drafts posted to IETF
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Now that F11 has started, I am putting in the compression support.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [DSE-Dev] [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [DSE-Dev] [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: Reference policy: fc_sort bug (or feature?)
- From: Tim <timasyk@xxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: Reference policy: fc_sort bug (or feature?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: Postfix with domain keys
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: "denied null" AVCs from qemu-kvm with latest rawhide policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- "denied null" AVCs from qemu-kvm with latest rawhide policy
- From: "Tom London" <selinux@xxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: Add restorecon and install methods for libselinux python bindings.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: Postfix with domain keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: Postfix with domain keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Postfix with domain keys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Postfix with domain keys
- From: Martin Spinassi <martins.listz@xxxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [libsemanage] Also check for the uppoer bound on user ids in /etc/login.defs
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ANN: netlabel_tools version 0.19
- From: Paul Moore <paul.moore@xxxxxx>
- Re: semodule patch to use new semanage interfaces
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: semodule patch to use new semanage interfaces
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: semodule patch to use new semanage interfaces
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semodule patch to use new semanage interfaces
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: limitations of CONTEXT__CONTAINS interface
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: transition policy/logic for shell-, perl- and python-scripts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: limitations of CONTEXT__CONTAINS interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: shrink sizeof av_inhert selinux_class_perm and context
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Debian SE Linux package dependencies
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] SELinux: shrink sizeof av_inhert selinux_class_perm and context
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC v3]Provide a method for detecting labeling support on a file system.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- atd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Where can i find the source code of Userspace Packages with modifications for SELinux?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Reference policy: fc_sort bug (or feature?)
- From: Tim <timasyk@xxxxxxxxx>
- Re: class kernel_service not defined in policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: class kernel_service not defined in policy
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: class kernel_service not defined in policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: class kernel_service not defined in policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH] Policy:setrans.te - Re: [RFC] Add color translation support to mcstransd
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- class kernel_service not defined in policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Where can i find the source code of Userspace Packages with modifications for SELinux?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Where can i find the source code of Userspace Packages with modifications for SELinux?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Where can i find the source code of Userspace Packages with modifications for SELinux?
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: Protect Firefox Keyboard Mappings and Font Settings
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "Tom London" <selinux@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Protect Firefox Keyboard Mappings and Font Settings
- From: Dave Feustel <dfeustel@xxxxxxxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: transition policy/logic for shell-, perl- and python-scripts
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: FC10 MLS policy problems
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Where can i find the source code of Userspace Packages with modifications for SELinux?
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: when and how the selinux label all file system according to "file_contexts"?
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: when and how the selinux label all file system according to "file_contexts"?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: FC10 MLS policy problems
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Alternative location of policy files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: transition policy/logic for shell-, perl- and python-scripts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- transition policy/logic for shell-, perl- and python-scripts
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: when and how the selinux label all file system according to "file_contexts"?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- when and how the selinux label all file system according to "file_contexts"?
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "xing li" <lixing.1006@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: FC10 MLS policy problems
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Alternative location of policy files
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: Alternative location of policy files
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Question about SELinux userspace library and scripts?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Alternative location of policy files
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Alternative location of policy files
- From: Tim <timasyk@xxxxxxxxx>
- Re: Question about SELinux userspace library and scripts?
- From: Atsushi SAKAI <sakaia@xxxxxxxxxxxxxx>
- Re: Question about SELinux userspace library and scripts?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Question about SELinux userspace library and scripts?
- From: Atsushi SAKAI <sakaia@xxxxxxxxxxxxxx>
- Re: FC10 MLS policy problems
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- FC10 MLS policy problems
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: limitations of CONTEXT__CONTAINS interface
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: ath9k capability=16 won't compile into policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [refpolicy] ath9k capability=16 won't compile into policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ath9k capability=16 won't compile into policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Avc denies while running in Permissive mode...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Avc denies while running in Permissive mode...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: ath9k capability=16 won't compile into policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Tar problems when restoring polyinstantiated directories
- From: Nick Gray <nick@xxxxxxxxxxxxx>
- Re: ath9k capability=16 won't compile into policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ath9k capability=16 won't compile into policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC] sVirt 0.20
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC] sVirt 0.20
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- [RFC] sVirt 0.20
- From: James Morris <jmorris@xxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Non root user cannot execute semanage, semodule
- From: Rahul Jain <erahul29@xxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: open perms on sockets, AF_UNIX
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: open perms on sockets, AF_UNIX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: open perms on sockets, AF_UNIX
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Troubles with loading modular reference policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Troubles with loading modular reference policy
- From: "Tymur Korkishko" <timasyk@xxxxxxxxx>
- Re: [PATCH] SELinux: open perms on sockets, AF_UNIX
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: open perms on sockets, AF_UNIX
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Non root user cannot execute semanage, semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Non root user cannot execute semanage, semodule
- From: Rahul Jain <erahul29@xxxxxxxxx>
- Re: immutable X windows
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- immutable X windows
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: limitations of CONTEXT__CONTAINS interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: James Morris <jmorris@xxxxxxxxx>
- blip.tv and similar services
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- limitations of CONTEXT__CONTAINS interface
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC] Provide a method for detecting labeling support on a file system(Take 2).
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 03/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 03/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 14/14] NFSD: Server implementation of MAC Labeling
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 03/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 12/14] NFS: Client implementation of Labeled-NFS
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/14] NFS: Introduce lifecycle management for label attribute.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 09/14] NFS: Add security_label text mount option and handling code to NFS
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/3] SELinux: Condense super block security structure flags and cleanup necessary code.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: Unify context mount and genfs behavior
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Add new security mount option to indicate security label support.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC] Provide a method for detecting labeling support on a file system.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: I think it is time for us to put the attributes back into policy file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I think it is time for us to put the attributes back into policy file.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy for Konqueror
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: I think it is time for us to put the attributes back into policy file.
- From: Joe Nall <joe@xxxxxxxx>
- I think it is time for us to put the attributes back into policy file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] the new way of newrole
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Context transition error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Context transition error
- From: Vince Le Port <vince.rafale@xxxxxxxxx>
- ERROR 'syntax error' at token 'typeattribute'
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: deprecate and schedule the removal of the the compat_net functionality
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] selinux: deprecate and schedule the removal of the the compat_net functionality
- From: James Morris <jmorris@xxxxxxxxx>
- the new way of newrole
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: deprecate and schedule the removal of the the compat_net functionality
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] selinux: deprecate and schedule the removal of the the compat_net functionality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: deprecate and schedule the removal of the the compat_net functionality
- From: Paul Moore <paul.moore@xxxxxx>
- Small fixes for audit2allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Problem in sepolgen
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 06/14] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 10/14] NFS: Introduce lifecycle management for label attribute.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 07/14] KConfig: Add KConfig entries for Labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 04/14] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 14/14] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 12/14] NFS: Client implementation of Labeled-NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 09/14] NFS: Add security_label text mount option and handling code to NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 13/14] NFS: Extend NFS xattr handlers to accept the security namespace
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 03/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 02/14] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 01/14] patch fix_use_before_init_in_nfsd4_list_rec_dir
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 08/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [Labeled-nfs] [RFC v4] Security Label Support for NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 05/14] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 11/14] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Policy for Konqueror
- From: Dave Feustel <dfeustel@xxxxxxxxxxxxxx>
- Re: Policy for Konqueror
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Extracting constraints and MLS constraints from policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: PAM _pam_load_conf_file: unable to open /etc/pam.d/system-auth
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: PAM _pam_load_conf_file: unable to open /etc/pam.d/system-auth
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: PAM _pam_load_conf_file: unable to open /etc/pam.d/system-auth
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- PAM _pam_load_conf_file: unable to open /etc/pam.d/system-auth
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: SELinux User Guide: weekly report 20081128
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: SELinux User Guide: weekly report 20081128
- From: "Stephen John Smoogen" <smooge@xxxxxxxxx>
- AttributeError: RoleTypeSet instance has no attribute 'roles
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- SELinux Group on LinkedIn
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Policy for Konqueror
- From: Dave Feustel <dfeustel@xxxxxxxxxxxxxx>
- SELinux User Guide: weekly report 20081128
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [refpolicy] [RE:] pull request: wireless-2.6 2008-11-25
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Booleans for Users Executing Applications"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Testing Support for deferred mapping of contexts & enable processes with mac_admin to get the raw inode contexts
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC] Testing Support for deferred mapping of contexts & enable processes with mac_admin to get the raw inode contexts
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- user guide draft: "Booleans for Users Executing Applications"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Extracting constraints and MLS constraints from policy
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux on NFS.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RE:] pull request: wireless-2.6 2008-11-25
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Polyinstantiation in cron
- From: Joe Nall <joe@xxxxxxxx>
- Re: Polyinstantiation in cron
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Polyinstantiation in cron
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: externally usable interfaces from 3rd party policy modules
- From: Joe Nall <joe@xxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Problem Setting Policy To Enforcing Mode
- From: Rahul Jain <erahul29@xxxxxxxxx>
- externally usable interfaces from 3rd party policy modules
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Context transition error
- From: Vince Le Port <vince.rafale@xxxxxxxxx>
- SE Linux on iPaQ
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Problem Setting Policy To Enforcing Mode
- From: Rahul Jain <erahul29@xxxxxxxxx>
- [RFC] Add color translation support to mcstransd
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC] Add color translation support to mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- Re: Context transition error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Context transition error
- From: Vince Le Port <vince.rafale@xxxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problem Setting Policy To Enforcing Mode
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Problem Setting Policy To Enforcing Mode
- From: Rahul Jain <erahul29@xxxxxxxxx>
- Re: python execv 'self:fd use' AVC for fd to /lib64/ld-2.8.so
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux User Guide: weekly report 20081121
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- python execv 'self:fd use' AVC for fd to /lib64/ld-2.8.so
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Handling labeling on filesystems that don't support SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Add restorecon and install methods for libselinux python bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Handling labeling on filesystems that don't support SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Handling labeling on filesystems that don't support SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] semanage: Use semanage_mls_enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Introducing mod_privileges for Apache HTTPD
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: This policy causes checkmodule to segfault.
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: This policy causes checkmodule to segfault.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: 2.6.26 Debian kernel panic
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: allow shell-style wildcarding in X names
- From: Joe Nall <joe@xxxxxxxx>
- [PATCH] libselinux: allow shell-style wildcarding in X names
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: Use semanage_mls_enabled
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- This policy causes checkmodule to segfault.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux User Guide: 20081114
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- user guide draft: "Allowing Access: audit2allow"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Linux Permissions" and "Manual Pages for Services"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Linux Permissions" and "Manual Pages for Services"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH] semanage: Use semanage_mls_enabled
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide drafts: "Linux Permissions" and "Manual Pages for Services"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] semanage: Use semanage_mls_enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Joe Nall <joe@xxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Russell Coker <russell@xxxxxxxxxxxx>
- user guide drafts: "Linux Permissions" and "Manual Pages for Services"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Latest policycoreutils package has a minor problem
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Add semanage_mls_enabled interface
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] homedir_template generation skips USER lines
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] latest svn refpolicy confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- latest svn refpolicy confusion
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- [PATCH] homedir_template generation skips USER lines
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] SELinux: WARNING: inside open_file_mask_to_av with unknown mode:c1b6
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- SELinux: WARNING: inside open_file_mask_to_av with unknown mode:c1b6
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] SELinux: WARNING: inside open_file_mask_to_av with unknown mode:c1b6
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libsemanage: Add semanage_mls_enabled interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Label Translation on Fedora 9
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Label Translation on Fedora 9
- From: Joe Nall <joe@xxxxxxxx>
- Re: Label Translation on Fedora 9
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: policycoreutils patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: seobject_fcontext patch allows you to modify a preexisting file context.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: newrole error message corrections.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: policycoreutils audit2allow patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Paul Moore <paul.moore@xxxxxx>
- Latest policycoreutils package has a minor problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: seobject_mls.patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 2/4] vm: use new has_capability_noaudit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 4/4] SELinux: use new cap_noaudit interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -v3 2/4] vm: use new has_capability_noaudit
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v3 4/4] SELinux: use new cap_noaudit interface
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v3 3/4] filesystems: use has_capability_noaudit interface for reserved blocks checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v3 1/4] SECURITY: new capable_noaudit interface
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: seobject_mls.patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- seobject_fcontext patch allows you to modify a preexisting file context.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- seobject_mls.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- newrole error message corrections.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- semodule patch to use new semanage interfaces
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- chcat patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils audit2allow patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Now that F11 has started, I am putting in the compression support.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Kernel .config options for building LTP SECURITY TESTS
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: user guide draft: "Port Numbers"
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- SELinux User Guide: weekly report 20081107
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Restorecond.conf
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Restorecond.conf
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Restorecond.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon / matchpathcon
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- restorecon / matchpathcon
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: restorecon / matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: restorecon / matchpathcon
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: restorecon / matchpathcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide drafts: "Searching for and Viewing Denials" and "Analyzing Denials"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SE-PostgreSQL documentation
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- user guide draft: "Port Numbers"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Searching for and Viewing Denials" and "Analyzing Denials"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: using roles with mls policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: using roles with mls policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide drafts: "Searching for and Viewing Denials" and "Analyzing Denials"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: using roles with mls policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: using roles with mls policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: using roles with mls policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: Paul Moore <paul.moore@xxxxxx>
- Re: using roles with mls policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- using roles with mls policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: user guide drafts: "Searching for and Viewing Denials" and "Analyzing Denials"
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: setroubleshoot var types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setroubleshoot var types
- user guide drafts: "Searching for and Viewing Denials" and "Analyzing Denials"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH] SELinux: hold tasklist_lock and siglock while waking wait_chldexit
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: hold tasklist_lock and siglock while waking wait_chldexit
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SELinux on NFS.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH] SELinux: hold tasklist_lock and siglock while waking wait_chldexit
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: SELinux on NFS.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH -v2 1/3] SECURITY: new capable_noaudit interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Kernel .config options for building LTP SECURITY TESTS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] Kernel .config options for building LTP SECURITY TESTS
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: user guide drafts: "What Happens when Access is Denied" and "Top Three Causes of Problems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- user guide drafts: "What Happens when Access is Denied" and "Top Three Causes of Problems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- SELinux on NFS.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH -v2 1/3] SECURITY: new capable_noaudit interface
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2 3/3] filesystems: use has_capability_noaudit interface for reserved blocks checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2 2/3] vm: use new has_capability_noaudit
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Label Translation on Fedora 9
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Label Translation on Fedora 9
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Label Translation on Fedora 9
- From: Andy Warner <warner@xxxxxxxxx>
- [PATCH]SELinux: properly handle empty tty_files list
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide: troubleshooting chapter
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: README in libselinux
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- SELinux User Guide: weekly report 20081031
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: semanage help
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: SELinux policy parser
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: SELinux policy parser
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libvirt] [RFC] sVirt v0.10 - initial prototype
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux policy parser
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: README in libselinux
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: README in libselinux
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: semanage help
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] libselinux: use message types when logging messages
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH -v1 1/3] SECURITY: new capable_noaudit interface
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH -v1 1/3] SECURITY: new capable_noaudit interface
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v1 1/3] SECURITY: new capable_noaudit interface
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH -v1 1/3] SECURITY: new capable_noaudit interface
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] SELinux: check open perms in dentry_open not inode_permission
- From: James Morris <jmorris@xxxxxxxxx>
- Re: README in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: check open perms in dentry_open not inode_permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [libvirt] [RFC] sVirt v0.10 - initial prototype
- From: Atsushi SAKAI <sakaia@xxxxxxxxxxxxxx>
- Re: user guide draft: "Examples: Booleans for NFS"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Examples: Booleans for NFS"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- README in libselinux
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide draft: "Examples: Booleans for NFS"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: check open perms in dentry_open not inode_permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v1 2/3] vm: use new has_capability_noaudit
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v1 2/3] vm: use new has_capability_noaudit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -v1 3/3] filesystems: use has_capability_noaudit interface for reserved blocks checks
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v1 1/3] SECURITY: new capable_noaudit interface
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v1 2/3] vm: use new has_capability_noaudit
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: do not check open on dir path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: do not check open on dir path walk
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: do not check open on dir path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] SELinux: do not check open on dir path walk
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: do not spam dmesg about unix domain sockets
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: user guide draft: "Examples: Booleans for NFS"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: 2.6.26 Debian kernel panic
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide: troubleshooting chapter
- From: Dominick Grift <domg472@xxxxxxxxx>
- user guide: troubleshooting chapter
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: 2.6.26 Debian kernel panic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 2.6.26 Debian kernel panic
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- user guide drafts: "Changing the Default Mapping" and "xguest: Kiosk Mode"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- 2.6.26 Debian kernel panic
- From: Russell Coker <russell@xxxxxxxxxxxx>
- user guide draft: "Examples: Booleans for NFS"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: ext4_has_free_blocks always checks cap_sys_resource and makes SELinux unhappy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ext4_has_free_blocks always checks cap_sys_resource and makes SELinux unhappy
- From: Eric Paris <eparis@xxxxxxxxxx>
- ext4_has_free_blocks always checks cap_sys_resource and makes SELinux unhappy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: ext4_has_free_blocks always checks cap_sys_resource and makes SELinux unhappy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- SELinux User Guide: weekly report 20081024
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: semanage help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage help
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: semanage help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage help
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage help
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: semanage help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: changing the "+" in ls -l output to be "." or "+"
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP][PATCH 2/2] Add a new test case for bounds types
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP][PATCH 2/2] Add a new test case for bounds types
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- semanage help
- From: LC Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP][PATCH 2/2] Add a new test case for bounds types
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Conditional Access to Network Resources
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] sVirt v0.10 - initial prototype
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Conditional Access to Network Resources
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Conditional Access to Network Resources
- From: Dominick Grift <domg472@xxxxxxxxx>
- Conditional Access to Network Resources
- From: Chris Kuester <c.kuester@xxxxxxxxx>
- [RFC] sVirt v0.10 - initial prototype
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: James Morris <jmorris@xxxxxxxxx>
- xend and noatsecure
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: xend and noatsecure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Re: SELinux blocking disclaimer - help diagnosing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [SPAM?] Re: SELinux blocking disclaimer - help diagnosing
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- Re: user guide drafts: "Managing Users"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Managing Users"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SELinux blocking disclaimer - help diagnosing
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux blocking disclaimer - help diagnosing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux blocking disclaimer - help diagnosing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SELinux blocking disclaimer - help diagnosing
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- user guide drafts: "Managing Users"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Protecting against inadvertent file copy
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Protecting against inadvertent file copy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Protecting against inadvertent file copy
- From: Sanjai Narain <narain@xxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol: add new file setsuid_perms policy capability
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] selinux: new permission for chmod on suid or sgid files
- From: Eric Paris <eparis@xxxxxxxxxx>
- [patch] policy: add new permission setsuid to file class
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Creating new types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Andy Warner <warner@xxxxxxxxx>
- Creating new types
- From: "Paul Cocker" <paul.cocker@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: [refpolicy] keep getting the same avc denial: tmpfs_t:dir search;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- SELinux User Guide: weekly report 20081017
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: (u|r)bacsep: initial testing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: adding objects classes and permissions to policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- adding objects classes and permissions to policy
- From: Andy Warner <warner@xxxxxxxxx>
- Re: (u|r)bacsep: initial testing
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] keep getting the same avc denial: tmpfs_t:dir search;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Trying to figure out the signature of a screen capture.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Genfscon 'dash' issue
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- keep getting the same avc denial: tmpfs_t:dir search;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Genfscon 'dash' issue
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Yet another man page patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: matchpathcon -V does not always work as expected.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] newrole without even knowing
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [RFC v3] Security Label Support for NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Capabilities audit field
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] newrole without even knowing
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: [RFC v3] Security Label Support for NFSv4
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- newrole without even knowing
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- New libsemanage space saving patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Capabilities audit field
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH v7 01/17] netlabel: Fix some sparse warnings
- From: James Morris <jmorris@xxxxxxxxx>
- Re: per role template confusion
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: per role template confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: per role template confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]