SELinux - Date Index
[Prev Page][Next Page]
- Re: checkmodule error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- checkmodule error
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: policycoreutils in SID
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: policycoreutils in SID
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- policycoreutils in SID
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: new domain for libvirt
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fwd: newrole assertion - should be gnome-terminal assertion
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Ruby bindings patch for libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: newrole assertion - should be gnome-terminal assertion
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: newrole assertion - should be gnome-terminal assertion
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: newrole assertion - should be gnome-terminal assertion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole assertion - should be gnome-terminal assertion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: eliminate shadowed variables from audit2why
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: newrole assertion - should be gnome-terminal assertion
- From: Ted X Toth <txtoth@xxxxxxxxx>
- [PATCH] Fix a potentially uninitialised variable in SELinux hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: newrole assertion
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libselinux: eliminate shadowed variables from audit2why
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage patch to allow boolean files to be imported.
- From: "Karl MacMillan" <karlwmacmillan@xxxxxxxxx>
- Re: semanage patch to allow boolean files to be imported.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- semanage patch to allow boolean files to be imported.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- newrole assertion
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Developer summit
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- Re: Developer summit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Developer summit
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] Developer Summit Mailing List
- From: James Morris <jmorris@xxxxxxxxx>
- Re: running filecaps ltp test
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Christian Kuester <c.kuester@xxxxxxxxx>
- Re: running filecaps ltp test
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: running filecaps ltp test
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: running filecaps ltp test
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: running filecaps ltp test
- From: "David L Durant (Mags)" <emags4DLD@xxxxxxx>
- Re: running filecaps ltp test
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- running filecaps ltp test
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Christian Kuester <c.kuester@xxxxxxxxx>
- Re: gnome-screensav AVCs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: gnome-screensav AVCs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: window manager policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Adding local nodecon's through semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: Adding local nodecon's through semanage
- From: Paul Moore <paul.moore@xxxxxx>
- Adding local nodecon's through semanage
- From: Christian Kuester <c.kuester@xxxxxxxxx>
- Re: Fedora 9 with SEL enabled by default! But one weakness is immediately obvious....
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fedora 9 with SEL enabled by default! But one weakness is immediately obvious....
- From: "green bean" <1capybara@xxxxxxxxx>
- newrole error relabeling tty
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- new refpolicy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- cvs patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X in enforcing mode
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: restorecond should not be started by default
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch adds permissive to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: fixfiles patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- This patch adds permissive to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- fixfiles patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: mls support for xserver
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- restorecond should not be started by default
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rawhide audit2allow problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: mls support for xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- range_transition question
- From: Joe Nall <joe@xxxxxxxx>
- X in enforcing mode
- From: Joe Nall <joe@xxxxxxxx>
- segatex-6.50 released
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Patch for libselinux man page submitted by Karel Zack
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- mls support for xserver
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: window manager policy
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: window manager policy
- From: Joe Nall <joe@xxxxxxxx>
- Re: window manager policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: SELinux backups
- From: Nick Gray <nick@xxxxxxxxxxxxx>
- [refpolicy] Patch: Create non_security_file_type attribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Paul Moore <paul.moore@xxxxxx>
- refpolicy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: first cut of window manager/metacity policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: rawhide audit2allow problem
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux backups
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- SELinux backups
- From: Nick Gray <nick@xxxxxxxxxxxxx>
- ANN: netlabel_tools version 0.18
- From: Paul Moore <paul.moore@xxxxxx>
- Re: rawhide audit2allow problem
- From: "Tom London" <selinux@xxxxxxxxx>
- Re: window manager policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rawhide audit2allow problem
- From: "Karl MacMillan" <kmacmillan@xxxxxxxxxxxxxxxxx>
- Re: rawhide audit2allow problem
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- rawhide audit2allow problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [refpolicy] Let dhcp use init fds
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- [refpolicy] Let dpkg scripts ptrace
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] CGI scripts/PostgreSQL stream connect
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] Communication between domains under labeled networks
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: first cut of window manager/metacity policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- first cut of window manager/metacity policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [refpolicy] postfix 2.5.2 - data dir /var/lib/postfix
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Reminder: SELiunx Developer Symposium
- From: James Morris <jmorris@xxxxxxxxx>
- Re: pam_mount
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: window manager policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [patch] sepolgen: fix role-type associations and role allow rules
- From: Karl MacMillan <kmacmillan@xxxxxxxxxxxxxxxxx>
- Re: window manager policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: window manager policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to disable/remove MLS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to disable/remove MLS
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- Re: How to disable/remove MLS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: type transition conflicts uncovered
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to disable/remove MLS
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- How to disable/remove MLS
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- rbacsep: type transition conflicts uncovered
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: pam_mount
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: x_extension use
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: x client policy interfaces
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] CGI scripts/PostgreSQL stream connect
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: su command not found
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: su command not found
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- su command not found
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- pam_mount
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: x_extension use
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- Re: releasibility in mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- Re: releasibility in mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- Re: releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- allow sysadm_t usb_device_t:chr_file ioctl;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- x client policy interfaces
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: window manager policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: window manager policy
- From: Joe Nall <joe@xxxxxxxx>
- Re: window manager policy
- From: Joe Nall <joe@xxxxxxxx>
- x_extension use
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [patch] sepolgen: fix role-type associations and role allow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] sepolgen: fix role-type associations and role allow rules
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: window manager policy
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if present
- From: James Morris <jmorris@xxxxxxxxx>
- window manager policy
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [refpolicy] postfix 2.5.2 - data dir /var/lib/postfix
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: Question about XACE/X-SELinux
- From: "T S" <t_mail@xxxxxxxxxxxxxxxx>
- [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: kernel/kernel.* diffs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] rbacsep: eliminate untrusted content types
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: gnome-screensav AVCs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: gnome-screensav AVCs
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: gnome-screensav AVCs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: gnome-screensav AVCs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: gnome-screensav AVCs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [rfc] refpolicy user based separation
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- gnome-screensav AVCs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question about XACE/X-SELinux
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Question about XACE/X-SELinux
- From: "T S" <t_mail@xxxxxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- [PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: new domain for libvirt
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New domain for qemu
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: SELinux Bootstrap - without chroot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux Bootstrap - without chroot
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [PATCH-v3] libsepol: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: defining a new class in a policy module
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: defining a new class in a policy module
- From: Mohamed Hassan <mhassan@xxxxxxxxxxx>
- Re: defining a new class in a policy module
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- defining a new class in a policy module
- From: Mohamed Hassan <mhassan@xxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label - try 2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: new and updated man pages for AVC, mapping, label - try 2
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: checkpolicy misrepresents the line an error is on
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- checkpolicy misrepresents the line an error is on
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [patch] libsepol write.c has shadowed var
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libsepol write.c has shadowed var
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: [patch] libsepol write.c has shadowed var
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libsepol write.c has shadowed var
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [rfc] refpolicy user based separation
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: libsepol segfault when module requires a user not in base
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol segfault when module requires a user not in base
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: SELinux References/Books
- From: max <maximilianbianco@xxxxxxxxx>
- Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: libsepol segfault when module requires a user not in base
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] /usr/lib32 type
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: SELinux References/Books
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- libsepol segfault when module requires a user not in base
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] libselinux: new and updated man pages for AVC, mapping, label
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: dynamic security class and access vector lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dynamic security class and access vector lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dynamic security class and access vector lookup
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: dynamic security class and access vector lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- dynamic security class and access vector lookup
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: X in MLS enforcing problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: SELinux References/Books
- From: "max bianco" <maximilianbianco@xxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if present
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicy
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: SELinux References/Books
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: how do I use selabel to get an x selection object context
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: SELinux References/Books
- From: max <maximilianbianco@xxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: SELinux References/Books
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- how do I use selabel to get an x selection object context
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- SELinux References/Books
- From: max <maximilianbianco@xxxxxxxxx>
- Re: libselinux patch to add interfaces in avc.h to python bindings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: remove unused and shadowed addrlen variable
- From: Paul Moore <paul.moore@xxxxxx>
- ANN: Updated SELinux core userland release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Current Fedora Prelude patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fedora diffs for vmware policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- postgresql fedora differences
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: MLS constraint interfaces
- From: "Chad Hanson" <chanson@xxxxxxxxxxxxx>
- Re: [RFC] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Context ordering based on MLS dominance.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC] SELinux: allow fstype unknown to policy to use xattrs if present
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: kernel/kernel.* diffs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: remove unused and shadowed addrlen variable
- From: James Morris <jmorris@xxxxxxxxx>
- Corecommand.patch based off todays policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- libselinux patch to add interfaces in avc.h to python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: use do_each_thread as a proper do/while block
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: use do_each_thread as a proper do/while block
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Context ordering based on MLS dominance.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: remove unused and shadowed addrlen variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Context ordering based on MLS dominance.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Context ordering based on MLS dominance.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- libselinux: Introduce interfaces to use context_dom selinuxfs entry
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- SELINUX: Add interface to compute MLS dominance relationship.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- [RFC] Context ordering based on MLS dominance.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: To domain transition or not?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- libxcb xselinux
- From: Ted X Toth <txtoth@xxxxxxxxx>
- MLS constraint interfaces
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: releasibility in mcstransd
- From: Joe Nall <joe@xxxxxxxx>
- rbacsep: home/tmp polyinstantiation
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: tracking down execstack & execmem violations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: tracking down execstack & execmem violations
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: tracking down execstack & execmem violations
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- RE: tracking down execstack & execmem violations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: tracking down execstack & execmem violations
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: tracking down execstack & execmem violations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- tracking down execstack & execmem violations
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: Paul Moore <paul.moore@xxxxxx>
- Re: avc_* functions not in libselinux-python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_* functions not in libselinux-python
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: avc_* functions not in libselinux-python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: more user friendly unknown handling printk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Questions regarding labeled ipsec/MAC networking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_av
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: more user friendly unknown handling printk
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: drop load_mutex in security_load_policy
- From: James Morris <jmorris@xxxxxxxxx>
- Questions regarding labeled ipsec/MAC networking
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: X in MLS enforcing problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: X in MLS enforcing problem
- From: "Chad Hanson" <chanson@xxxxxxxxxxxxx>
- X in MLS enforcing problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: releasibility in mcstransd
- From: "Chad Hanson" <chanson@xxxxxxxxxxxxx>
- RE: To domain transition or not?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: releasibility in mcstransd
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH] SELinux: more user friendly unknown handling printk
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_av
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- releasibility in mcstransd
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: drop load_mutex in security_load_policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)
- From: Eric Paris <eparis@xxxxxxxxxx>
- [patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: drop load_mutex in security_load_policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_av
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: To domain transition or not?
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_av
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: No AVC messages found
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: To domain transition or not?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- To domain transition or not?
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [refpolicy] /usr/lib32 type
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: No AVC messages found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: No AVC messages found
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: kernel/kernel.* diffs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] Let xserver chat to hal
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: No AVC messages found
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] /usr/lib32 type
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Ted X Toth <txtoth@xxxxxxxxx>
- No AVC messages found
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- [refpolicy] Let xserver chat to hal
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- [refpolicy] /usr/lib32 type
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] Open code kernel locks
- From: Paul Moore <paul.moore@xxxxxx>
- RE: modules.conf problem
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: modules.conf problem
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [patch] libsepol: fix endianness bug in network node address handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: open code load_mutex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: open code load_mutex
- From: James Morris <jmorris@xxxxxxxxx>
- SE Linux and GPG
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: open code load_mutex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: modules.conf problem
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: open code sidtab lock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: open code policy_rwlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] SELinux: open code sidtab lock
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH RFC 0/3] Open code kernel locks
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 2/3] SELinux: open code load_mutex
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/3] SELinux: open code policy_rwlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- modules.conf problem
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [patch][stable] policycoreutils user_u seuser vs. genhomedircon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Trying to get XAce policy straightened out but our tool chain is too broken to handle it.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch] selinux: fix endianness bug in network node address handling
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] selinux: simplify ioctl checking
- From: James Morris <jmorris@xxxxxxxxx>
- [patch] selinux: fix endianness bug in network node address handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libsepol: fix endianness bug in network node address handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- [patch] selinux: simplify ioctl checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: NetLabel
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: NetLabel
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: NetLabel
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: NetLabel
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- NetLabel
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: changing role to user_r
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: changing role to user_r
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: changing role to user_r
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: changing role to user_r
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Recent problems recompiling libsemanage with new libustr (1.0.4)
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: changing role to user_r
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Recent problems recompiling libsemanage with new libustr (1.0.4)
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: question about security
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: question about security
- From: Russell Coker <russell@xxxxxxxxxxxx>
- changing role to user_r
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Here is my current diff on xserver policy.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: question about security
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Casey Schaufler <rancidfat@xxxxxxxxx>
- Here is my current diff on xserver policy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about security
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: question about security
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: question about security
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: question about security
- From: Matthew Hammer <matthewhammer89@xxxxxxxxx>
- question about security
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: Writing SELinux Policy...(Allow ALL, Deny Few)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Fwd: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [patch][stable] policycoreutils user_u seuser vs. genhomedircon
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: copy/paste policy patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Writing SELinux Policy...(Allow ALL, Deny Few)
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: copy/paste policy patch
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: rbacsep: collapsing xserver
- From: "Joe Nall" <joe@xxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rbacsep: collapsing xserver
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Problem with multisame specification warning messages RHEL 5
- From: Ali Nebi <anebi@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH Take 3] user and role remapping in expander (was Re: roles in base module)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is there a command line tool that returns 1 if a file is in the wrong context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is there a command line tool that returns 1 if a file is in the wrong context?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Quick question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 7 simple noobie questions = 1-line answers ok :)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 7 simple noobie questions = 1-line answers ok :)
- From: "Danny Howerton" <danny.howerton@xxxxxxxxx>
- Re: Quick question
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- 7 simple noobie questions = 1-line answers ok :)
- From: "green bean" <1capybara@xxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Quick question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Quick question
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- Re: Quick question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH Take 3] user and role remapping in expander (was Re: roles in base module)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Quick question
- From: Ioannis Aslanidis <iaslanidis@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH Take 3] user and role remapping in expander (was Re: roles in base module)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is there a command line tool that returns 1 if a file is in the wrong context?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New domain for podsleuth
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problem with multisame specification warning messages RHEL 5
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New domain for nsplugin
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Updated kernel/filesystem.* patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/1] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New policy for kerneloops
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New domain for nsplugin
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New domain for podsleuth
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: New Domain for kismet
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libselinux: add support for /contexts/postgresql_contexts
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Problem with multisame specification warning messages RHEL 5
- From: Ali Nebi <anebi@xxxxxxxxxxxx>
- Re: netif and node check in RHEL5
- From: "Takesi satoh" <t_mail@xxxxxxxxxxxxxxxx>
- [PATCH Take 3] user and role remapping in expander (was Re: roles in base module)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Is there a command line tool that returns 1 if a file is in the wrong context?
- From: Joe Nall <joe@xxxxxxxx>
- Re: overriding home directory file contexts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: netif and node check in RHEL5
- From: Paul Moore <paul.moore@xxxxxx>
- Re: netif and node check in RHEL5
- From: "Takesi satoh" <t_mail@xxxxxxxxxxxxxxxx>
- We need to do a better job of merging policy into Refpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- I have copied a bunch of patches for most of kernel/system directory
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- kernel/kernel.* diffs
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Updated kernel/filesystem.* patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fedora 10 modules config for MLS and Targeted policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: overriding home directory file contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/1] Latest network peer labeling patch
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/1] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- RE: overriding home directory file contexts
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: overriding home directory file contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- overriding home directory file contexts
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: refpolicy: syscall init_module needs sys_nice & setsched
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- refpolicy: syscall init_module needs sys_nice & setsched
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: Suggested global change to policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Suggested global change to policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: enable processes with mac_admin to get the raw inode contexts
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: enable processes with mac_admin to get the raw inode contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: netif and node check in RHEL5
- From: Paul Moore <paul.moore@xxxxxx>
- Suggested global change to policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: SELINUX admin with LDAP
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- netif and node check in RHEL5
- From: "Takesi satoh" <t_mail@xxxxxxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: roles in base module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Potential Memory leak in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Potential Memory leak in libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- new domain for policy kit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- new domain for libvirt
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New domain for prelude
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New domain for nsplugin
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New domain for podsleuth
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- new domain for gnomeclock
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to add auth_switch to lots of domains.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New policy for kerneloops
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New Domain for kismet
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- New domain for qemu
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: roles in base module
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: roles in base module
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: File_contexts file and semanage...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- File_contexts file and semanage...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: roles in base module
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] Community developer server accounts available
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: roles in base module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: roles in base module
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Differences between openssh and pam_selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: RFC cron jobs execute under user domain
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Differences between openssh and pam_selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: rbacsep: RFC cron jobs execute under user domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rbacsep: RFC cron jobs execute under user domain
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: keep the code clean formating and syntax
- From: James Morris <jmorris@xxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: "Jan-Frode Myklebust" <janfrode@xxxxxxxxx>
- Re: [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: keep the code clean formating and syntax
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Jan-Frode Myklebust <janfrode@xxxxxxxxx>
- Re: [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL5 initrc_t vs. unconfined_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH-v3] libsepol: allow genfscon statements in modules
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RHEL5 initrc_t vs. unconfined_t
- From: "Jan-Frode Myklebust" <janfrode@xxxxxxxxx>
- Re: [PATCH-v3] libsepol: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH-v3] libsepol: allow genfscon statements in modules
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux Project Wiki migration
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: fix sleeping allocation in security_context_to_sid (Was: + selinux-dopey-hack.patch added to -mm tree)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux Policy test cases updates
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- SELinux Policy test cases updates
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: I think this is a bug in the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: split ptrace checking in proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: split ptrace checking in proc
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: simplify ioctl checking
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC][PATCH] security: split ptrace checking in proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Compat_net an pam login problem.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Compat_net an pam login problem.
- From: "Scally, Katrina-P54861" <Katrina.Scally@xxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I think this is a bug in the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- I think this is a bug in the kernel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC][PATCH] selinux: simplify ioctl checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: roles in base module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH v5] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v5] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- [PATCH-v3] libsepol: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- [PATCH-v3] checkpolicy: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- roles in base module
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: rbacsep: transition/inherit perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rbacsep: transition/inherit perms
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH v4] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] libsepol: allow genfscon statements in modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC-v2] libsepol and checkpolicy: make genfs statements valid in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: copy/paste policy patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH v3] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC] checkpolicy: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC] libsepol: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v3] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]