SELinux - Date Index
[Prev Page][Next Page]
- [RFC PATCH v3 02/13] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 00/13] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 13/13] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 06/13] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 09/13] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 07/13] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 03/13] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [patch 04/35] corenetwork policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [ANN] SELinux userland repository, wiki and bug tracking on oss.tresys.com
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [LTP] [RFC] LTP IMA patch
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- [ANN] Reference Policy mail list
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.4)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [ANN] SELinux userland repository, wiki and bug tracking on oss.tresys.com
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: file_contexts duplicates
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file_contexts duplicates
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file_contexts duplicates
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- file_contexts duplicates
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-basedvirtualization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Communication between domains under labeled networks
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-basedvirtualization
- From: Atsushi SAKAI <sakaia@xxxxxxxxxxxxxx>
- SELinux User Guide: weekly report 20080815
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Ivan Gyurdiev <ivg231@xxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fixes to services_ppp
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- services apcupsd.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Updated man pages
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Updated fail2ban patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Subject: remove expand_rule function
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Missing interface for courier
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Minor fixes to first boot policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Missing interfaces for kudzu
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Subject: remove expand_rule function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux policy and performance impacts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: postgresql patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 20/35] rpc policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 12/35] getty policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 02/35] kudzu policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 05/35] courier policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 25/35] rdisc policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 24/35] bootloader policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 14/35] remotelogin policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 03/35] logrotate policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Amanda signals fstools
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Made it dontaudit like you asked.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- postgresql patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- A toy of SQL injection (Re: [PATCH 0/3] Thread/Child-Domain Assignment)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH] Revised Patch for local nodecon support in semanage (was: Adding local nodecon's through semanage)
- From: Christian Kuester <c.kuester@xxxxxxxxx>
- Re: Using su with pam_selinux
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- system_libraries.patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Using su with pam_selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: Nagios and RHEL 5
- From: David Härdeman <david@xxxxxxxxxxx>
- Re: [PATCH 0/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- graphical login
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [patch 23/35] iptables policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Nagios and RHEL 5
- From: Gunnar Hellekson <gunnar.hellekson@xxxxxxxxxx>
- [PATCH] Subject: remove expand_rule function
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH] Subject: remove expand_rule function
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [libvirt] [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libvirt] [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libvirt] [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libvirt] [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/7] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 3/7] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 6/7] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 7/7] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 4/7] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 2/7] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 0/7] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 5/7] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 1/7] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- Kerberos Patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Amanda signals fstools
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Made it dontaudit like you asked.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [PATCH 0/3] Thread/Child-Domain Assignment (rev.2)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Cleaned up patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: long contexts
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- New SELinux toolchain build system
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [LTP] [RFC] LTP IMA patch
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 29/35] ipsec policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 28/35] iscsi policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 34/35] qmail policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 27/35] inetd policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 17/35] brctl policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- long contexts
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [ANNOUNCE][RFC] sVirt: Integrating SELinux and Linux-based virtualization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: conditional expression type validation was off-by-one
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: conditional expression type validation was off-by-one
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 2/6] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Problem with MLS because /dev is labeled tmpfs_t
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Request for multiple mailing lists
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/6] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 2/6] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Request for multiple mailing lists
- From: "max bianco" <maximilianbianco@xxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [RFC PATCH v1 5/6] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 1/6] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 4/6] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 3/6] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 6/6] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 2/6] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 0/6] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Why is customizing labeling and seusers so SLOOOOOOOWWWWW.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Gconf application
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Can we make libsemanage default to expand-check=0
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux policy and performance impacts
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Paul Moore <paul.moore@xxxxxx>
- Nagios and RHEL 5
- From: "Cooper David Ctr 14WS/P3I" <david.cooper.ctr@xxxxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Can we make libsemanage default to expand-check=0
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Help: SELinux causing(?) boot failures...
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Why is customizing labeling and seusers so SLOOOOOOOWWWWW.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Help: SELinux causing(?) boot failures...
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Why is customizing labeling and seusers so SLOOOOOOOWWWWW.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: Paul Moore <paul.moore@xxxxxx>
- Gconf application
- From: "shaunak saha" <reach.shaunak@xxxxxxxxx>
- Re: SELinux policy and performance impacts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Request for multiple mailing lists
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: conditional expression type validation was off-by-one
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Andy Warner <warner@xxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Andy Warner <warner@xxxxxxxxx>
- SELinux User Guide: weekly report 2008-08-08
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Problem with MLS because /dev is labeled tmpfs_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: SELinux policy and performance impacts
- From: James Morris <jmorris@xxxxxxxxx>
- SELinux policy and performance impacts
- From: Matt Anderson <mra@xxxxxx>
- logging to FIFOs
- From: "Johnson, Richard" <Richard.Johnson@xxxxxxxxxxx>
- Re: Request for multiple mailing lists
- From: "Stanley A. Klein" <sklein@xxxxxxxxx>
- Re: Request for multiple mailing lists
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] Let dhcp use init fds
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Request for multiple mailing lists
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- ipsec patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 17/35] brctl policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] Let dpkg scripts ptrace
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [patch 21/35] kismet policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 22/35] oav policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 31/35] amanda policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 30/35] fetchmail policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 01/35] anaconda policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 11/35] hotplug policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 26/35] stunnel policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 19/35] kernel storage module policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 13/35] ricci policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 32/35] rsync policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 16/35] usernet policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Problem with MLS because /dev is labeled tmpfs_t
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: [patch 15/35] kernel terminal policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 06/35] soundserver policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 17/35] brctl policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 18/35] fsadm policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: Unify for- and while-loop style
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH] selinux: Unify for- and while-loop style
- From: Vesa-Matti Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: conditional expression type validation was off-by-one
- From: James Morris <jmorris@xxxxxxxxx>
- Re: selinux freaking out about samba share
- From: Lucas Emery <lucas@xxxxxxxxx>
- Re: selinux freaking out about cifs share
- From: max <maximilianbianco@xxxxxxxxx>
- Re: selinux freaking out about cifs share
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- selinux freaking out about cifs share
- From: Lucas Emery <lucas@xxxxxxxxx>
- [PATCH] selinux: conditional expression type validation was off-by-one
- From: Vesa-Matti Kari <vmkari@xxxxxxxxxxxxxx>
- Re: Can we make libsemanage default to expand-check=0
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 3/3] Thread/Child-Domain Assignment (rev.3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/3] Thread/Child-Domain Assignment (rev.3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 2/3] Thread/Child-Domain Assignment (rev.3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Question about newrole
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- [refpolicy patch] Updated Git daemon domain.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patchJ updated Git daemon domain.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Question about newrole
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Question about newrole
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 2/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Question about newrole
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Question about newrole
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Question about newrole
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Question about newrole
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Question about newrole
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question about newrole
- From: "Dennis Wronka" <linuxweb@xxxxxxx>
- Re: Question about newrole
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Question about newrole
- From: "Dennis Wronka" <linuxweb@xxxxxxx>
- Re: [RFC 2/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Can we make libsemanage default to expand-check=0
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question about newrole
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Add /etc/services to restorecond file.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: (u|r)bacsep: initial testing
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Can we make libsemanage default to expand-check=0
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Question about newrole
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: Question about newrole
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: policycoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Question about newrole
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: policycoreutils patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: I have added group support to libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] corrected/rebased samba patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.2)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- [PATCH 2/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 3/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 0/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- xdm_tmp_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- White space consistency patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [refpolicy] corrected/rebased samba patch
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Some questions regarding RedHat refpolicy patches
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [patch] libselinux: make setrans socket descriptor close-on-exec
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: Some questions regarding RedHat refpolicy patches
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [patch 03/35] logrotate policy update
- [patch 24/35] bootloader policy updates
- [patch 23/35] iptables policy update
- [patch 12/35] getty policy update
- [patch 33/35] mailscanner policy addition
- [patch 35/35] livecd policy addition
- [patch 06/35] soundserver policy update
- [patch 32/35] rsync policy update
- [patch 25/35] rdisc policy update
- [patch 07/35] w3c policy addition
- [patch 05/35] courier policy update
- [patch 17/35] brctl policy update
- [patch 22/35] oav policy updates
- [patch 18/35] fsadm policy update
- [patch 10/35] qemu policy update
- [patch 13/35] ricci policy update
- [patch 26/35] stunnel policy update
- [patch 19/35] kernel storage module policy updates
- [patch 08/35] logging policy update
- [patch 04/35] corenetwork policy update
- [patch 14/35] remotelogin policy update
- [patch 09/35] xen policy update
- [patch 00/35] Second round of Fedora/RedHat SELinux changes
- [patch 29/35] ipsec policy update
- [patch 27/35] inetd policy update
- [patch 31/35] amanda policy update
- [patch 34/35] qmail policy update
- [patch 20/35] rpc policy update
- [patch 15/35] kernel terminal policy update
- [patch 16/35] usernet policy updates
- [patch 28/35] iscsi policy update
- [patch 02/35] kudzu policy update
- [patch 30/35] fetchmail policy update
- [patch 01/35] anaconda policy update
- [patch 11/35] hotplug policy update
- [patch 21/35] kismet policy update
- Some questions regarding RedHat refpolicy patches
- From: David Härdeman <david@xxxxxxxxxxx>
- [refpolicy patch] Add Git daemon domain.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- SELinux User Guide: weekly report 2008-08-01
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- [refpolicy patch] Add Git daemon domain.
- From: Dominick Grift <domg472@xxxxxxxxx>
- policycoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I have added group support to libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- selinux-activate
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [refpolicy, take 3] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute (v2)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: unconfined_t and user_home_dir_type
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ANN: CDS Framework version 3.0
- From: Dave Sugar <dsugar@xxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: Should /dev/mem be SystemHigh?
- From: Joe Nall <joe@xxxxxxxx>
- Re: Should /dev/mem be SystemHigh?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Should /dev/mem be SystemHigh?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: unconfined_t and user_home_dir_type
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: /proc/mounts should show what it can
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Should /dev/mem be SystemHigh?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Should /dev/mem be SystemHigh?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- [PATCH -v3] SELinux: /proc/mounts should show what it can
- From: Eric Paris <eparis@xxxxxxxxxx>
- [refpolicy] Patch: Create non_security_file_type attribute (v2)
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: Ruby bindings patch for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Ruby bindings patch for libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Ruby bindings patch for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy patch, second try] samba policy updates
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Should /dev/mem be SystemHigh?
- From: Joe Nall <joe@xxxxxxxx>
- Re: unconfined_t and user_home_dir_type
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: policycoreutils packages were updated without a bump in the version number???
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mapping Linux GROUP to an SELinux user ?...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Setting login context for multiple Linux users using single semanage command...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- policycoreutils packages were updated without a bump in the version number???
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Ruby bindings patch for libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: unconfined_t and user_home_dir_type
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment
- From: Scott Schmit <i.grok@xxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: unconfined_t and user_home_dir_type
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- unconfined_t and user_home_dir_type
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Mapping Linux GROUP to an SELinux user ?...
- From: "Karl MacMillan" <kmacmillan@xxxxxxxxxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy-patch 06/23] logrotate policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- [refpolicy patch, second try] samba policy updates
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [refpolicy-patch 06/23] logrotate policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy-patch 15/23] soundserver policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC 2/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Paul Moore <paul.moore@xxxxxx>
- [REFPOLICY PATCH] Added policy module for the oident daemon.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RE: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RE: user_identify for httpd (warning: newbie question)
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Policy loading: initramfs vs. patched /sbin/init
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- [RFC 2/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- RE: [PATCH 1/3] Thread/Child-Domain Assignment
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: [PATCH 1/3] Thread/Child-Domain Assignment
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: user_identify for httpd (warning: newbie question)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- RE: libsepol.context_from_record: MLS is disabled, but MLS context"s0" found
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Policy loading: initramfs vs. patched /sbin/init
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: user_identify for httpd (warning: newbie question)
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 4/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 3/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 2/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 0/3] Thread/Child-Domain Assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy-patch 21/23] raid policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy-patch 18/23] miscfiles policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy-patch 19/23] netlabel policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- [refpolicy patch] latest try: merge irssi policy with irc module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux User Guide: weekly report 2008-07-25
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user_identify for httpd (warning: newbie question)
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- user_identify for httpd (warning: newbie question)
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH] Communication between domains under labeled networks
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: Policy loading: initramfs vs. patched /sbin/init
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: hierarchy_check_constraints() needs reworks?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Policy loading: initramfs vs. patched /sbin/init
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [refpolicy-patch 14/23] rhgb policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Mapping Linux GROUP to an SELinux user ?...
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [refpolicy-patch 14/23] rhgb policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: hierarchy_check_constraints() needs reworks?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy patch] mozilla replace local policy by interface calls.
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: libsepol.context_from_record: MLS is disabled, but MLS context "s0" found
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy-patch 13/23] portslave policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- libsepol.context_from_record: MLS is disabled, but MLS context "s0" found
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Mapping Linux GROUP to an SELinux user ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- RE: hierarchy_check_constraints() needs reworks?
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- [refpolicy patch] retry: merge irssi module with irc module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] SELinux: Trivial minor fixes that change C null character style
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] SELinux: trivial, remove unneeded local variable
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [refpolicy-patch 11/23] cpucontrol policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [refpolicy patch] merge irssi module with irc module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch] Round 2: Clean up white spaces.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: hierarchy_check_constraints() needs reworks?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- hierarchy_check_constraints() needs reworks?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [refpolicy-patch 14/23] rhgb policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy patch] services: add a duplicate delimiter.
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy patch] retry add irssi module.
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- [refpolicy patch 2/2] revisit and apply trivial modifications to fstools module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch 1/2] revisit and apply trivial redhat modifications to amanda module
- From: Dominick Grift <domg472@xxxxxxxxx>
- openssh and roles
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [refpolicy patch] add frozen-bubble-server module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Paul Moore <paul.moore@xxxxxx>
- Re: what is the point of semodule -u?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: what is the point of semodule -u?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- what is the point of semodule -u?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [refpolicy patch] retry add irssi module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy-patch 02/23] anaconda policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- [refpolicy patch] mozilla replace local policy by interface calls.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy-patch 20/23] pcmcia policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- [refpolicy patch] adds irssi module.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [refpolicy-patch 14/23] rhgb policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [refpolicy-patch 11/23] cpucontrol policy update
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Andy Warner <warner@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Andy Warner <warner@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Andy Warner <warner@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Communication between domains under labeled networks
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Andrew Warner <warner@xxxxxxxxx>
- Re: [refpolicy-patch 02/23] anaconda policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy-patch 07/23] corenetwork policy update
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Setting login context for multiple Linux users using single semanage command...
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: About unifying the coding style
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: questions about persistent storage of security contexts
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- [refpolicy patch] admin: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- questions about persistent storage of security contexts
- From: Andrew Warner <warner@xxxxxxxxx>
- [refpolicy patch] apps: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch] kernel: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch] roles: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch] system: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- [refpolicy patch] services: add a duplicate delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Setting login context for multiple Linux users using single semanage command...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- RE: SELinux User Guide
- From: "Joe_Wulf" <Joe_Wulf@xxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Patch: 1/6: selinux-policy: remove dupe delimiter.
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: About unifying the coding style
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- About unifying the coding style
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [patch] SELinux: trivial, unify iterator variable naming
- From: Paul Moore <paul.moore@xxxxxx>
- [patch] SELinux: trivial, remove unneeded local variable
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch] SELinux: trivial, unify iterator variable naming, part 3
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch] SELinux: trivial, unify iterator variable naming, part 2
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch] SELinux: Trivial minor fixes, pt. 2
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: SELinux User Guide
- From: max <maximilianbianco@xxxxxxxxx>
- [patch] SELinux: trivial, unify iterator variable naming
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch] SELinux: Trivial minor fixes that change C null character style
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [patch]: ss/services.c null character style fix
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch]: ss/services.c null character style fix
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- [patch]: ss/services.c remove unneeded assignment
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch] ss/services.c services-remove-unneeded-cast.patch
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch]: ss/services.c: trivial typo fix
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- [patch]: ss/services.c null character style fix
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: [refpolicy-patch 02/23] anaconda policy update
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [refpolicy-patch 08/23] secadm policy update
- [refpolicy-patch 23/23] qemu policy update
- [refpolicy-patch 04/23] kismet policy update
- [refpolicy-patch 00/23] Cherry-picks from Fedora SELinux patch
- [refpolicy-patch 07/23] corenetwork policy update
- [refpolicy-patch 05/23] kudzu policy update
- [refpolicy-patch 11/23] cpucontrol policy update
- [refpolicy-patch 21/23] raid policy update
- [refpolicy-patch 06/23] logrotate policy update
- [refpolicy-patch 22/23] xen policy update
- [refpolicy-patch 20/23] pcmcia policy update
- [refpolicy-patch 16/23] w3c policy addition
- [refpolicy-patch 14/23] rhgb policy update
- [refpolicy-patch 12/23] openca policy update
- [refpolicy-patch 19/23] netlabel policy update
- [refpolicy-patch 17/23] logging policy update
- [refpolicy-patch 10/23] courier policy update
- [refpolicy-patch 13/23] portslave policy update
- [refpolicy-patch 15/23] soundserver policy update
- [refpolicy-patch 03/23] unconfined_u policy updates
- [refpolicy-patch 01/23] slocate policy update
- [refpolicy-patch 09/23] apm policy update
- [refpolicy-patch 02/23] anaconda policy update
- [refpolicy-patch 18/23] miscfiles policy update
- Patch: 6/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Patch: 5/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Patch: 4/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Patch: 3/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Patch: 2/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Patch: 1/6: selinux-policy: remove dupe delimiter.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: SELinux User Guide: weekly report 20080708
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- SELinux User Guide: weekly report 20080708
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: SELinux User Guide
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contextsfileswhenusing -c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: handle conflicting file contexts as a fatal error
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contextsfileswhenusing -c
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contexts fileswhenusing -c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch v2] libselinux: handle duplicate file context entries as a fatal error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contexts fileswhenusing -c
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [patch] libselinux: handle conflicting file contexts as a fatal error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contexts files whenusing -c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [rfc][patch] setfiles: validate all file_contexts files when using -c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [rfc][patch] setfiles: validate all file_contexts files whenusing -c
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: firefox3
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: firefox3
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to make libselinux shut up when SELinux is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Critical bug in semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Critical bug in semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Patch to make libselinux shut up when SELinux is disabled.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux developer summit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Brett Lentz <blentz@xxxxxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: firefox3
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Critical bug in semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: refpolicy patch: samba enhancements
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Let dhcp use init fds
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Patch: Create non_security_file_type attribute
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Let dpkg scripts ptrace
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Communication between domains under labeled networks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: pam_mount
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: /proc/mounts should show what it can
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Attaching multiple user accounts to same home directory...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: firefox3
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux User Guide
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- SELinux User Guide
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Mohamed Hassan <mhassan@xxxxxxxxxxx>
- firefox3
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Patch: selinux-policy: concept: let users relabel their user_home_t files to user_tmp_t and vice versa.
- From: Dominick Grift <domg472@xxxxxxxxx>
- RE: Attaching multiple user accounts to same home directory...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Attaching multiple user accounts to same home directory...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Attaching multiple user accounts to same home directory...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Attaching multiple user accounts to same home directory...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Attaching multiple user accounts to same home directory...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Critical bug in semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch: selinux-policy: style: lo under li before m.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Fedora refpolicy patches
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Attaching multiple user accounts to same home directory...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Patch: selinux-policy: inconsistency: logging_send_syslog_msg is not optional policy.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Proposed patch for policycoreutils/sestatus
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: Patch: selinux-policy: inconsistency: logging_send_syslog_msg is not optional policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch: selinux-policy: inconsistency: logging_send_syslog_msg is not optional policy.
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [PATCH -v2] SELinux: /proc/mounts should show what it can
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Proposed patch for policycoreutils/sestatus
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] SELinux: /proc/mounts shoudl show what it can
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2] SELinux: /proc/mounts should show what it can
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: David Härdeman <david@xxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Brett Lentz <blentz@xxxxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: David Härdeman <david@xxxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Fedora refpolicy patches
- From: David Härdeman <david@xxxxxxxxxxx>
- I think the compiler is still broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Fedora refpolicy patches
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fedora refpolicy patches
- From: David Härdeman <david@xxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- (u|r)bacsep: initial testing
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: python gui gconf policy problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Buggy patch (Re: Proposed patch for policycoreutils/sestatus)
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 32bit -> 64bit x-compile fail (audit2why)
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- I have just uploaded 166 patch files for each domain that has a difference between refpolicy and fedora policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Proposed patch for policycoreutils/sestatus
- From: Vesa-Matti J Kari <vmkari@xxxxxxxxxxxxxx>
- corecommands file contexts and small change to chroot interface
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Latest init diffs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /etc/selinux/mls/contexts files labeled default_context_t
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rawhide policy on FC9 build fails
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 32bit -> 64bit x-compile fail (audit2why)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: python gui gconf policy problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: python gui gconf policy problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rawhide policy on FC9 build fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /etc/selinux/mls/contexts files labeled default_context_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux for embedded
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Willis Vandevanter" <vandevwa@xxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: OpenMoko/JFFS2 sestatus difficulties
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux for embedded
- From: James Morris <jmorris@xxxxxxxxx>
- OpenMoko/JFFS2 sestatus difficulties
- From: "Willis Vandevanter" <vandevwa@xxxxxxx>
- /etc/selinux/mls/contexts files labeled default_context_t
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: python gui gconf policy problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- 32bit -> 64bit x-compile fail (audit2why)
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: python gui gconf policy problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: python gui gconf policy problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- rawhide policy on FC9 build fails
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: python gui gconf policy problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- python gui gconf policy problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- SELinux for embedded
- From: Yuichi Nakamura <himainu-ynakam@xxxxxxxxx>
- Re: [RFC] An idea of thread/child-domain assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] An idea of thread/child-domain assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- refpolicy patch: samba enhancements
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: ping and the /tmp directory
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: ping and the /tmp directory
- From: "Tom London" <selinux@xxxxxxxxx>
- RE: ping and the /tmp directory
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: ping and the /tmp directory
- From: Joe Nall <joe@xxxxxxxx>
- ping and the /tmp directory
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: checkmodule error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: checkmodule error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkmodule error
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checkmodule error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]