SELinux - Date Index
[Prev Page][Next Page]
- [RFC] libsepol: allow genfscon statements in modules
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH v3] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v3] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: segfault using dismod when linking modules
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [refpolicy] initrc_t access to sshd /proc to adjust OOM killer
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: segfault using dismod when linking modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- segfault using dismod when linking modules
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: copy/paste policy patch
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC][PATCH v2] selinux: support deferred mapping of contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] NFS/LSM: Make NFSv4 set LSM mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Security: Make secctx_to_secid() take const secdata
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Security: Make secctx_to_secid() take const secdata
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [20/37] SELinux: no BUG_ON(!ss_initialized) in selinux_clone_mnt_opts
- From: Greg KH <gregkh@xxxxxxx>
- Re: refpolicy roles / RBAC separation RFC
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- refpolicy roles / RBAC separation RFC
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [ANN] 2008 SELinux Developer Summit Schedule Published
- From: James Morris <jmorris@xxxxxxxxx>
- Re: copy/paste policy patch
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: copy/paste policy patch
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: copy/paste policy patch
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: copy/paste policy patch
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: copy/paste policy patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH -v3] LSM/SELinux: show LSM mount options in /proc/mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v3] LSM/SELinux: show LSM mount options in /proc/mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: audit2allow -R
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: audit2allow -R
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: audit2allow -R
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 0/2] Fixes for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] SELinux: Fix a RCU free problem with the netport cache
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- RE: sepolgen-ifgen
- From: "Kim Lawson-Jenkins" <lawson@xxxxxxxxxxxxxxxx>
- audit2allow -R
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sepolgen-ifgen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labelling with genfscon
- From: run zhang <zhang4run@xxxxxxxxx>
- sepolgen-ifgen
- From: "Kim Lawson-Jenkins" <lawson@xxxxxxxxxxxxxxxx>
- copy/paste policy patch
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: labelling with genfscon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: labelling with genfscon
- From: run zhang <zhang4run@xxxxxxxxx>
- Re: How to handle USB devices....
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to handle USB devices....
- From: "Tom London" <selinux@xxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy: domains need access to the apt's pty and fifos
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] potential rsync patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: labelling with genfscon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy: domains need access to the apt's pty and fifos
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: refpolicy: patch for gpg-agent
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH -v3] LSM/SELinux: show LSM mount options in /proc/mounts
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH -v3] LSM/SELinux: show LSM mount options in /proc/mounts
- From: Eric Paris <eparis@xxxxxxxxxx>
- labelling with genfscon
- From: run zhang <zhang4run@xxxxxxxxx>
- [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/2] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH]Introduce generalized hooks for getting and setting inode secctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: open_init_pty: eats much of the CPU time
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] SELinux: include/security.h whitespace, syntax, and other cleanups
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: hashtab.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: mls.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: selinux/include/security.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: avc_ss.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: context.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: netlabel.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: mls_types.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: include/security.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: ss/conditional.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: policydb.h whitespace, syntax, and other cleanups
- [PATCH] SELinux: objsec.h whitespace, syntax, and other cleanups
- Re: port numbers for sctp support?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: port numbers for sctp support?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux with NFSv4
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: no BUG_ON(!ss_initialized) in selinux_clone_mnt_opts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/13] SELinux: netif.c whitespace, syntax, and static declaraction cleanups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: SELinux with NFSv4
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] SELinux: no BUG_ON(!ss_initialized) in selinux_clone_mnt_opts
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: avc_init & avc_open
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_init & avc_open
- From: Joe Nall <joe@xxxxxxxx>
- Re: avc_init & avc_open
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_init & avc_open
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_init & avc_open
- From: Joe Nall <joe@xxxxxxxx>
- Re: [patch] libsemanage: don't call genhomedircon if policy was not rebuilt
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [patch] libsemanage: don't call genhomedircon if policy was not rebuilt
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_init & avc_open
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- avc_init & avc_open
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 01/13] SELinux: netif.c whitespace, syntax, and static declaraction cleanups
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 01/13] SELinux: netif.c whitespace, syntax, and static declaraction cleanups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] RFC: hal_read_log interface
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- [PATCH 10/13] SELinux: hashtab.c whitespace, syntax, and static declaraction cleanups
- [PATCH 09/13] SELinux: ebitmap.c whitespace, syntax, and static declaraction cleanups
- [PATCH 02/13] SELinux: netlabel.c whitespace, syntax, and static declaraction cleanups
- [PATCH 04/13] SELinux: netnode.c whitespace, syntax, and static declaraction cleanups
- [PATCH 08/13] SELinux: conditional.c whitespace, syntax, and static declaraction cleanups
- [PATCH 07/13] SELinux: avtab.c whitespace, syntax, and static declaraction cleanups
- [PATCH 01/13] SELinux: netif.c whitespace, syntax, and static declaraction cleanups
- [PATCH 13/13] SELinux: sidtab.c whitespace, syntax, and static declaraction cleanups
- [PATCH 12/13] SELinux: services.c whitespace, syntax, and static declaraction cleanups
- [PATCH 11/13] SELinux: mls.c whitespace, syntax, and static declaraction cleanups
- [PATCH 05/13] SELinux: nlmsgtab.c whitespace, syntax, and static declaraction cleanups
- [PATCH 03/13] SELinux: netlink.c whitespace, syntax, and static declaraction cleanups
- [PATCH 06/13] SELinux: xfrm.c whitespace, syntax, and static declaraction cleanups
- Re: semanage man page updated for booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semanage man page updated for booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Enabling policy capabilities
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] RFC: hal_read_log interface
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] lvm runs shell scripts
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] trivial HAL doc patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: semanage man page updated for booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage man page updated for booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: upstart/SELinux problem loading the wrong policy with kernel version change
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy: loadable_module.spt improvement?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- refpolicy: loadable_module.spt improvement?
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] NFS/LSM: Make NFSv4 set LSM mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Fwd: adding a new security class
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Fwd: adding a new security class
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- selinux mini-summit sub-policy topic
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH] changing whitespace for fun and profit: policydb.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: memory_device_t
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: memory_device_t
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- [PATCH] SELinux: one little, two little, three little whitespaces, the avc.c saga.
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: cleanup on isle selinuxfs.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: memory_device_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: memory_device_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- memory_device_t
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Fwd: adding a new security class
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Fwd: adding a new security class
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [PATCH] SELinux: whitespace and formating fixes for hooks.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] SELinux: clean up printks
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Fwd: adding a new security class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: adding a new security class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: adding a new security class
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Fwd: adding a new security class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: adding a new security class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] NFS/LSM: Make NFSv4 set LSM mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Fwd: adding a new security class
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Fwd: adding a new security class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Setools: Fix missing command name in logwatch script
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: open_init_pty: eats much of the CPU time
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: open_init_pty: eats much of the CPU time
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- open_init_pty: eats much of the CPU time
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: refpolicy: patch for gpg-agent
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [refpolicy] potential rsync patch
- From: Patrick Neely <patrick.neely@xxxxxxxxxxxxxxx>
- Reminder: 2008 SELinux Developer Summit CFP
- From: Paul Moore <paul.moore@xxxxxx>
- [refpolicy] trivial HAL doc patch
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- [refpolicy] RFC: hal_read_log interface
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- polyinstantiated home subdirectories show up on Desktop
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: setfscreatecon-w/invalid-context can mistakenly succeed
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: setfscreatecon-w/invalid-context can mistakenly succeed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfscreatecon-w/invalid-context can mistakenly succeed
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: setfscreatecon-w/invalid-context can mistakenly succeed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] SELinux: Add network port SID cache
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/2] SELinux: Made netnode cache adds faster
- From: James Morris <jmorris@xxxxxxxxx>
- setfscreatecon-w/invalid-context can mistakenly succeed
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] SELinux: Add network port SID cache
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v3 2/2] SELinux: Add network port SID cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] SELinux: Made netnode cache adds faster
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Testing Apache Policy
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: [RFC PATCH v2 0/2] Labeled networking patches for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v2 0/2] Labeled networking patches for 2.6.26
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v2 2/2] LSM: Make the Labeled IPsec hooks more stack friendly
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v2 1/2] NetLabel: Allow passing the LSM domain as a shared pointer
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Enabling policy capabilities
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] Labeled networking patches for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- Re: copy&paste security_compute_av from python
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: copy&paste security_compute_av from python
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v3 2/2] SELinux: Add network port SID cache
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v3 1/2] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v3 0/2] Series short description
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/3] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Enabling policy capabilities
- From: Paul Moore <paul.moore@xxxxxx>
- Enabling policy capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Made netnode cache adds faster
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A Question about MLS in SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] setools 3.3.4: Fix build failure with gcc-4.3.X
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- [PATCH] setools 3.3.4: Fix configure.ac to allow generation of configuration files
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- Re: [RFC PATCH 1/2] NetLabel: Allow passing the LSM domain as a shared pointer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- A Question about MLS in SELinux
- From: "zhao hui" <zhaohui1976@xxxxxxxxx>
- [PATCH v2 1/2] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] SELinux: don't BUG if fs reuses a superblock
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2 0/2] SELinux networking patches for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v2 2/2] SELinux: Add network port SID cache
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 2/2] LSM: Make the Labeled IPsec hooks more stack friendly
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 1/2] NetLabel: Allow passing the LSM domain as a shared pointer
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 0/2] Labeled networking patches for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- Re: avc_* functions not in libselinux-python
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH] SELinux: don't BUG if fs reuses a superblock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: copy&paste security_compute_av from python
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [PATCH] SELinux: don't BUG if fs reuses a superblock
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Cleanup the secid/secctx conversion functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Add network port SID cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc_* functions not in libselinux-python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Add network port SID cache
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/3] SELinux: Made netnode cache adds faster
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: Add network port SID cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: nfs_xdev_get_sb appears to sometimes reuse a sb and makes SELinux angry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: nfs_xdev_get_sb appears to sometimes reuse a sb and makes SELinux angry
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: nfs_xdev_get_sb appears to sometimes reuse a sb and makes SELinux angry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- nfs_xdev_get_sb appears to sometimes reuse a sb and makes SELinux angry
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: dpkg bug related to SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- avc_* functions not in libselinux-python
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [RFC PATCH 2/2] LSM: Make the Labeled IPsec hooks more stack friendly
- From: Paul Moore <paul.moore@xxxxxx>
- Re: gdm login problem when polyinstantiating /tmp
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: gdm login problem when polyinstantiating /tmp
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Cleanup the secid/secctx conversion functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] SELinux: Cleanup the secid/secctx conversion functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semanage man page updated for booleans
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: selinux support in cron withou system_u
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: upstart/SELinux problem loading the wrong policy with kernel version change
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- selinux support in cron withou system_u
- From: Marcela Maslanova <mmaslano@xxxxxxxxxx>
- Re: upstart/SELinux problem loading the wrong policy with kernel version change
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dpkg bug related to SE Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- upstart/SELinux problem loading the wrong policy with kernel version change
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/3] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH 0/2] Labeled networking tweaks for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- Re: dpkg bug related to SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 2/3] SELinux: Made netnode cache adds faster
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 0/3] Some SELinux patches for 2.6.26
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 3/3] SELinux: Add network port SID cache
- From: Paul Moore <paul.moore@xxxxxx>
- Re: mcstransd
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] NetLabel: Allow passing the LSM domain as a shared pointer
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH 2/2] LSM: Make the Labeled IPsec hooks more stack friendly
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Audit2allow + allow rule for 'granted' access
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- RE: Audit2allow + allow rule for 'granted' access
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Audit2allow + allow rule for 'granted' access
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- Re: dpkg bug related to SE Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dpkg bug related to SE Linux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mcstransd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- gdm login problem when polyinstantiating /tmp
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- mcstransd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: semanage library problem on RHEL5
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- dpkg bug related to SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Audit2allow + allow rule for 'granted' access
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: 2008 SELinux Developer Summit CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Audit2allow + allow rule for 'granted' access
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- RE: Removing 2 modules that depend on eachother
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- Re: Removing 2 modules that depend on eachother
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Removing 2 modules that depend on eachother
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- Re: Error running semanage from trunk
- From: "Caleb Case" <calebcase@xxxxxxxxx>
- Re: Error running semanage from trunk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Error running semanage from trunk
- From: "Brian M. Williams" <bwilliams@xxxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- RE: Need to break or reduce the dependency on a static libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Need to break or reduce the dependency on a static libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Need to break or reduce the dependency on a static libsepol
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RFC: fcglob prototype
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RFC: changing the "+" in ls -l output to be "." or "+"
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: Dave Sugar <dsugar@xxxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: semanage library problem on RHEL5
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semanage library problem on RHEL5
- From: Josef Kubin <jkubin@xxxxxxxxxx>
- Re: file(1)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file(1)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: turn mount options strings into defines
- From: James Morris <jmorris@xxxxxxxxx>
- ANN: SELinux Developer Summit 2008, Ottawa
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Need to break or reduce the dependency on a static libsepol
- From: "David Sugar" <dsugar@xxxxxxxxxx>
- Re: copy&paste security_compute_av from python
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH 1/2] SELinux: turn mount options strings into defines
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: turn mount options strings into defines
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] SELinux: display SELinux mount options in /proc/mounts
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: Need to break or reduce the dependency on a static libsepol
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: SSH + file_contexts + kerberos
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] SELinux: display mount options in /proc/mounts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Need to break or reduce the dependency on a static libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: copy&paste security_compute_av from python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] SELinux: display mount options in /proc/mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: copy&paste security_compute_av from python
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- SSH + file_contexts + kerberos
- From: "Karrels, Jeffrey J \(US SSA\)" <jeffrey.karrels@xxxxxxxxxxxxxx>
- Re: [RFC] SELinux: display mount options in /proc/mounts
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] SELinux: display mount options in /proc/mounts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] SELinux: display mount options in /proc/mounts
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: RBAC in RHEL5
- From: "Takesi satoh" <t_mail@xxxxxxxxxxxxxxxx>
- Re: Things were going great until...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: doc typo fix: s/behaviors/behavior/
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file(1)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RBAC in RHEL5
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: file(1)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: James Morris <jmorris@xxxxxxxxx>
- RBAC in RHEL5
- From: "Takesi satoh" <t_mail@xxxxxxxxxxxxxxxx>
- Re: Login Identities not applied when logging in...
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Login Identities not applied when logging in...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Login Identities not applied when logging in...
- From: "Lisa R." <lraykow@xxxxxxx>
- doc typo fix: s/behaviors/behavior/
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- RE: file(1)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Things were going great until...
- From: "Lisa R." <lraykow@xxxxxxx>
- Re: file(1)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: file(1)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: file(1)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: file(1)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Debian SE Linux status
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: file(1)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 14/45] Security: Make NFSD work with detached security [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 42/45] NFS: Read pages from FS-Cache into an NFS inode [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/45] Security: Change current->fs[ug]id to current_fs[ug]id() [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 39/45] NFS: FS-Cache page management [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: policy package names for Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 37/45] NFS: Invalidate FsCache page flags when cache removed [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: file(1)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: policy package names for Debian
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 16/45] FS-Cache: Recruit a couple of page flags for cache management [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/45] CacheFiles: Export things for CacheFiles [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/45] Security: Add a kernel_service object class to SELinux [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 34/45] NFS: Define and create superblock-level objects [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/45] CacheFiles: Add a hook to write a single page of data to an inode [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 35/45] NFS: Define and create inode-level cache objects [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 30/45] NFS: Add FS-Cache option bit and debug bit [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 29/45] NFS: Add comment banners to some NFS functions [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 32/45] NFS: Register NFS for caching and retrieve the top-level index [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/45] Security: Allow kernel services to override LSM settings for task actions [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/45] CacheFiles: Permit the page lock state to be monitored [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/45] Security: De-embed task security record from task and use refcounting [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/45] AFS: prevent double cell registration [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 31/45] NFS: Permit local filesystem caching to be enabled for NFS [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/45] CacheFiles: Add missing copy_page export for ia64 [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/45] AFS: Add a MAINTAINERS record for AFS [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: policy package names for Debian
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 28/45] FS-Cache: Make kAFS use FS-Cache [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/45] Permit filesystem local caching [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/45] Add missing consts to xattr function arguments [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/45] KEYS: Don't generate user and user session keyrings unless they're accessed [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 36/45] NFS: Use local disk inode cache [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/45] KEYS: Add keyctl function to get a security label [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/45] KEYS: Make the keyring quotas controllable through /proc/sys [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/45] KEYS: Allow clients to set key perms in key_create_or_update() [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Debian SE Linux status
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- [PATCH 44/45] NFS: Display local caching state [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 43/45] NFS: Store pages from an NFS inode into a local cache [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 33/45] NFS: Define and create server-level objects [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 41/45] NFS: nfs_readpage_async() needs to be accessible as a fallback for local caching [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 45/45] NFS: Add mount options to enable local caching on NFS [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 38/45] NFS: Add some new I/O counters for FS-Cache doing things for NFS [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 40/45] NFS: Add read context retention for FS-Cache to call back with [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/45] KEYS: Increase the payload size when instantiating a key [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/45] FS-Cache: Provide an add_wait_queue_tail() function [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/45] KEYS: Make key_serial() a function if CONFIG_KEYS=y [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/45] KEYS: Check starting keyring as part of search [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/45] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/45] KEYS: Allow the callout data to be passed as a blob rather than a string [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/45] FS-Cache: Release page->private after failed readahead [ver #35]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: policy package names for Debian
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policy package names for Debian
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Debian SE Linux status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file(1)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Debian SE Linux status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policy package names for Debian
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- policy package names for Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Debian SE Linux status
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- file(1)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [refpolicy] lvm runs shell scripts
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: SELinux policy for Fedora Directory Server 1.1.0
- From: Pär Aronsson <par.aronsson@xxxxxxxxx>
- Testing SELinux in Ubuntu (Hardy Heron)
- From: "Caleb Case" <ccase@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: USER_AVC vs USER_MAC_POLICY_LOAD ?
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: USER_AVC vs USER_MAC_POLICY_LOAD ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- USER_AVC vs USER_MAC_POLICY_LOAD ?
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: ls in Debian/Unstable
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Bug#472590: ls in Debian/Unstable
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Add missing consts to xattr function arguments
- From: David Howells <dhowells@xxxxxxxxxx>
- avc's
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: ls in Debian/Unstable
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: avc's
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- avc's
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: ls in Debian/Unstable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- ls in Debian/Unstable
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Removing DAC.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [Fwd: Re: Removing DAC.]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Removing DAC.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: add permissive domain support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC][PATCH] user_transition support for libsepol/checkpolicy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Removing DAC.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Removing DAC.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Removing DAC.
- From: "cinthya aranguren" <cinthya.aranguren@xxxxxxxxx>
- Re: Removing DAC.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Steve G <linux_4ever@xxxxxxxxx>
- Re: Removing DAC.
- From: "cinthya aranguren" <cinthya.aranguren@xxxxxxxxx>
- Re: Removing DAC.
- From: "cinthya aranguren" <cinthya.aranguren@xxxxxxxxx>
- [PATCH] checkpolicy: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] libsepol: add permissive domain support
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Removing DAC.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Removing DAC.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: /bin/passwd and a basic MLS install of Fedora 8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: problem when running checkmodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: /bin/passwd and a basic MLS install of Fedora 8
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Removing DAC.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Removing DAC.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Removing DAC.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Removing DAC.
- From: "cinthya aranguren" <cinthya.aranguren@xxxxxxxxx>
- /bin/passwd and a basic MLS install of Fedora 8
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
- From: Valdis.Kletnieks@xxxxxx
- problem when running checkmodule
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: selection labeling
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: James Morris <jmorris@xxxxxxxxx>
- Re: unix_domain_sockets in mls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: unix_domain_sockets in mls
- From: "B Topscher" <bryan@xxxxxxxxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: unix_domain_sockets in mls
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: James Morris <jmorris@xxxxxxxxx>
- unix_domain_sockets in mls
- From: "B Topscher" <bryan@xxxxxxxxxxxxxxxx>
- Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [patch] libselinux: don't warn about failed selinuxfs mount if selinux disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: selection labeling
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: policycoreutils semanage --proto --protocol inconsistent flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Audit2allow/audit2why patch for policycoreutils.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selection labeling
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: unconfined_t Domain with MLS Policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC]Introduce generalized hooks for getting and setting inode secctx v3
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: selection labeling
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: unconfined_t Domain with MLS Policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- unconfined_t Domain with MLS Policy
- From: "Henley, Tim-P64420" <Timothy.Henley@xxxxxxxxx>
- Audit2allow/audit2why patch for policycoreutils.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- semanage patch from Caleb with man page fix
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils semanage --proto --protocol inconsistent flags
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: SELinux policy for Fedora Directory Server 1.1.0
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: myjboss and jbossjava selinux-modules
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: First Attempt at root login on console always FAILS ??
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: First Attempt at root login on console always FAILS ??
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: pam.d
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: First Attempt at root login on console always FAILS ??
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- 2.6.25
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: prelink, cron-job and SELinux compliance
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policy module for httpd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 2.6.25-rc5
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: First Attempt at root login on console always FAILS ??
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- [patch] selinux: handle files opened with flags 3 by checking ioctl permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: First Attempt at root login on console always FAILS ??
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SE-PostgreSQL Security Policy (try #3)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: How to handle security_dentry_open when the open flags are 'special'
- From: James Morris <jmorris@xxxxxxxxx>
- Re: policy module for httpd
- From: Joe Nall <joe@xxxxxxxx>
- policy module for httpd
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: prelink, cron-job and SELinux compliance
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- pam.d
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- First Attempt at root login on console always FAILS ??
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: How to handle security_dentry_open when the open flags are 'special'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: 2.6.25-rc5
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Installing and building policy modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux/matchpathcon has a memory leak
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- libselinux/matchpathcon has a memory leak
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to handle security_dentry_open when the open flags are 'special'
- From: "Stephen Smalley" <stephen.smalley@xxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Installing and building policy modules
- From: kihamba nengo <knengo@xxxxxxxxx>
- How to handle security_dentry_open when the open flags are 'special'
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: How to handle security_dentry_open when the open flags are 'special'
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Getting started with SELinux and Slackware
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH-v3] SELinux: introduce permissive types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Getting started with SELinux and Slackware
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: James Morris <jmorris@xxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: 2.6.25-rc5
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: printk normalization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: Getting started with SELinux and Slackware
- From: "Martin J. Green" <mail@xxxxxxxxxxxxxxxxxx>
- [PATCH] SELinux: printk normalization
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: 2.6.25-rc5
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-v4] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH-v4] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] libsepol: support for permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Semanage return codes...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Semanage return codes...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- SELinux policy for Fedora Directory Server 1.1.0
- From: Pär Aronsson <par.aronsson@xxxxxxxxx>
- RE: Re: Getting started with SELinux and Slackware
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Getting started with SELinux and Slackware
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH-v2] checkpolicy: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: [PATCH-v2] checkpolicy: support for permissive types
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- RE: [PATCH] checkpolicy: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH-v3] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: [PATCH] checkpolicy: support for permissive types
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: support for permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- [ANN] Now v8.3 based SE-PostgreSQL is available
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Getting started with SELinux and Slackware
- From: "Martin J. Green" <mail@xxxxxxxxxxxxxxxxxx>
- Re: 2.6.25-rc5
- From: James Morris <jmorris@xxxxxxxxx>
- 2.6.25-rc5
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: Re: Getting started with SELinux and Slackware
- From: "Martin J. Green" <mail@xxxxxxxxxxxxxxxxxx>
- [PATCH-v3] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: x fails to start on fc9
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Refpolicy quilt series for Debian
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: x fails to start on fc9
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: x fails to start on fc9
- From: Joe Nall <joe@xxxxxxxx>
- Re: [DSE-Dev] Refpolicy quilt series for Debian
- From: Erich Schubert <erich@xxxxxxxxxx>
- Re: refpolicy: domains need access to the apt's pty and fifos
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: prelink, cron-job and SELinux compliance
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problem compiling policy on Fedora 5.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Problem compiling policy on Fedora 5.
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- x fails to start on fc9
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Joe Nall <joe@xxxxxxxx>
- prelink, cron-job and SELinux compliance
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: refpolicy: domains need access to the apt's pty and fifos
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- PATCH: add downgrade test to libsepol test harness
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: introduce permissive types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]