selinux May 2009 archive
Main Archive Page > Month Archives  > selinux archives
selinux: By Date

selinux By Date

SubjectAuthorDate
[refpolicy] libjackserver.so file contextStefan Schulze Frielinghaus
RE: [Clip] Unexpected role change from custom role back to user_r SOLVEDWest, Gary-P55389
Re: Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zeroEric Paris
RE: [Clip] Unexpected role change from custom role back to user_rWest, Gary-P55389
Re: I am a beginner,can you recommand me some website?Dominick Grift
I am a beginner,can you recommand me some website?sixiaolin0
[ANN] Apache/SELinux plus releaseKaiGai Kohei
RE: [Clip] Unexpected role change from custom role back to user_rWest, Gary-P55389
RE: [Clip] Unexpected role change from custom role back to user_rStephen Smalley
RE: [Clip] Unexpected role change from custom role back to user_rWest, Gary-P55389
Re: selinux and sctpPaul Moore
Re: Unexpected role change from custom role back to user_rStephen Smalley
Unexpected role change from custom role back to user_rWest, Gary-P55389
Re: selinux and sctpNigel Rumens
Re: selinux and sctpNigel Rumens
Re: selinux and sctpJames Morris
Re: selinux and sctpStephen Smalley
Re: Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zeroDaniel J Walsh
Problem with SELinux and glusterfs when trying to allow memprotect/mmap_zeroIoannis Aslanidis
Re: selinux and sctpPaul Moore
Re: Introducing SELinux SanboxJustin Mattock
Re: Introducing SELinux SanboxDaniel J Walsh
Re: Introducing SELinux SanboxDaniel J Walsh
Re: Introducing SELinux SanboxJustin Mattock
Introducing SELinux SanboxDaniel J Walsh
Re: selinux and sctpStephen Smalley
Re: selinux and sctpDaniel J Walsh
Re: selinux and sctpMark Webb
Re: selinux and sctpNigel Rumens
Re: selinux and sctpDaniel J Walsh
Re: SELinux acl's optionsJustin Mattock
Re: SELinux acl's optionsDominick Grift
SELinux acl's optionsJustin Mattock
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLChristopher J. PeBenito
Re: avc: denied nullDominick Grift
Re: Incorrect avc logs for the packet object classPaul Moore
Re: Incorrect avc logs for the packet object classPaul Moore
Re: Incorrect avc logs for the packet object classStephen Smalley
Re: Incorrect avc logs for the packet object classStephen Smalley
Re: Incorrect avc logs for the packet object classStephen Smalley
Re: Incorrect avc logs for the packet object classPaul Moore
Re: chcat fixesDaniel J Walsh
Re: avc: denied nullDominick Grift
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLChristopher J. PeBenito
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLChristopher J. PeBenito
Re: chcat fixesChristopher J. PeBenito
Re: avc: denied nullEamon Walsh
Re: Policy loading problemPaul Howarth
Add btrfs to fixfiles.Daniel J Walsh
chcat fixesDaniel J Walsh
Incorrect avc logs for the packet object classMarshall Miller
setfiles will only put out a "*" if > 1000 files are fixed.Daniel J Walsh
Re: Policy loading problemDennis Wronka
Re: SELinux context patchChad Sellers
Re: Policy loading problemStephen Smalley
Re: Policy loading problemStephen Smalley
Re: Policy loading problemDennis Wronka
policycoreutils-po is F11 policycoreutils translations patchDaniel J Walsh
Re: Policy loading problemStephen Smalley
Re: Policy loading problemDennis Wronka
Re: Policy loading problemDennis Wronka
Re: Policy loading problemStephen Smalley
Re: Policy loading problemStephen Smalley
Re: Policy loading problemStephen Smalley
Re: Policy loading problemDennis Wronka
Re: Policy loading problemStephen Smalley
Re: Policy loading problemDennis Wronka
Re: selinux policy for geditJustin Mattock
Re: selinux policy for geditDaniel J Walsh
Re: Sources for SELinux GConf ??James Carter
Re: Policy loading problemStephen Smalley
Re: avc: denied nullDominick Grift
selinux policy for gedithechao55429
Policy loading problemDennis Wronka
Re: avc: denied nullEamon Walsh
SELinux tools listJoshua Brindle
Re: This patch fixes the exception handling in libselinux-python bindingsDaniel J Walsh
Sources for SELinux GConf ??Joshua Kramer
Re: This patch fixes the exception handling in libselinux-python bindingsChad Sellers
Re: Minor issue with reading selinuxfs booleans.James Morris
Re: Minor issue with reading selinuxfs booleans.Stephen Smalley
Minor issue with reading selinuxfs booleans.Eamon Walsh
Re: daemons and MCS categoriesKaiGai Kohei
Re: [PATCH] SELinux: move SELINUX_MAGIC into magic.hJames Morris
Re: avc: denied nullEamon Walsh
This patch fixes the exception handling in libselinux-python bindingsDaniel J Walsh
This patch outputs <<none>> from the matchpathcon command when it gets enoentDaniel J Walsh
This patch add seusers support to SELinuxDaniel J Walsh
SELinux context patchDaniel J Walsh
Re: Authorization Workflow for Message Queueing PlatformJoshua Kramer
Re: patch to policycoreutilsJoshua Brindle
Re: Patch to getdefaultcon to print just the correct match and add verbose optionJoshua Brindle
Re: sepolgen typo fixJoshua Brindle
Re: Memory leak in libselinux/src/label_file.cJoshua Brindle
Re: Help with python seobject.loginRecordsJoshua Brindle
Re: Patch matchpathcon to eliminate file "/"Joshua Brindle
Re: We have moved matchpathcon to /sbin from /usr/sbinJoshua Brindle
[PATCH] SELinux: move SELINUX_MAGIC into magic.hEric Paris
Re: Authorization Workflow for Message Queueing PlatformStephen Smalley
Re: threads and contextStephen Smalley
threads and contextXavier Toth
Re: avc: denied nullDominick Grift
Re: daemons and MCS categoriesJoe Nall
Re: avc: denied nullStephen Smalley
Re: Dropping SELinux privilegesStephen Smalley
avc: denied nullDominick Grift
Re: Dropping SELinux privilegesselinux_at_nospam
Re: daemons and MCS categoriesKaiGai Kohei
Re: daemons and MCS categoriesJoe Nall
Re: write selinux policyJoshua Brindle
Re: write selinux policyDominick Grift
write selinux policyhechao55429
Re: Dropping SELinux privilegesJoshua Brindle
Dropping SELinux privilegesSebastien Raveau
Re: Patch to getdefaultcon to print just the correct match and add verbose optionChad Sellers
Re: make: *** No rule to make target with latest svnJustin Mattock
make: *** No rule to make target with latest svnJustin Mattock
Re: the problem about install refpolicyStephen Smalley
the problem about install refpolicyhechao55429
Re: daemons and MCS categoriesKaiGai Kohei
Authorization Workflow for Message Queueing PlatformJoshua Kramer
Re: Nodecon configuration question [solved]Thomas
Re: Nodecon configuration questionStephen Smalley
Re: Nodecon configuration questionThomas
Re: daemons and MCS categoriesKaiGai Kohei
Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodiesChristopher J. PeBenito
Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodiesJustin P. Mattock
Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodiesJustin Mattock
Re: Nodecon configuration questionStephen Smalley
Nodecon configuration questionThomas Bludau
Re: [refpolicy] how to enable gconf(arole_dbus_t errors) and all of the gnome goodiesChristopher J. PeBenito
Re: daemons and MCS categoriesChristopher J. PeBenito
Re: EOF missing newline bug in squid.fc / toolchainChristopher J. PeBenito
Re: [PATCH] Update ltp selinux test script and policySubrata Modak
Re: [PATCH] Fix ltp selinux testsuite for rhel5Subrata Modak
Re: [PATCH] Update selinux ioctl testSubrata Modak
Re: [PATCH] Update ltp selinux testsuite READMESubrata Modak
Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the testsSubrata Modak
Re: [PATCH] Fix MLS handling in selinux testsSubrata Modak
Re: daemons and MCS categoriesKaiGai Kohei
EOF missing newline bug in squid.fc / toolchainEamon Walsh
how to enable gconf(arole_dbus_t errors) and all of the gnome goodiesJustin P. Mattock
Re: SELinux and access(2), we want to know.Casey Schaufler
Re: SELinux and access(2), we want to know.Serge E. Hallyn
Re: SELinux and access(2), we want to know.Stephen Smalley
Re: does this picture reflect the basics of the current selinux architecture?Sebastian Pfaff
Re: SELinux and access(2), we want to know.Stephen Smalley
Re: SELinux and access(2), we want to know.Daniel J Walsh
Re: SELinux and access(2), we want to know.Stephen Smalley
Re: does this picture reflect the basics of the current selinux architecture?Stephen Smalley
does this picture reflect the basics of the current selinux architecture?Sebastian Pfaff
[PATCH] An interface to allow web-apps minimum privileges (Re: [RFC] mod_selinux security policy)KaiGai Kohei
Re: SELinux and access(2), we want to know.max
Re: SELinux and access(2), we want to know.Eamon Walsh
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLKaiGai Kohei
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLKaiGai Kohei
Re: SELinux and access(2), we want to know.Casey Schaufler
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLKaiGai Kohei
Re: SELinux and access(2), we want to know.Serge E. Hallyn
Re: SELinux and access(2), we want to know.Eric Paris
Re: We have moved matchpathcon to /sbin from /usr/sbinChad Sellers
Re: SELinux and access(2), we want to know.Serge E. Hallyn
Re: [PATCH] libsemanage: Add Ruby BindingsStephen Smalley
SELinux and access(2), we want to know.Eric Paris
Re: [PATCH] libsemanage: Add Ruby BindingsDaniel J Walsh
Re: Memory leak in libselinux/src/label_file.cChad Sellers
Re: [PATCH] libsemanage: Add Ruby BindingsStephen Smalley
Re: Fixes for libselinux/matchpathconDaniel J Walsh
Re: Fixes for libselinux/matchpathconChad Sellers
Re: [PATCH] libsemanage: Add Ruby BindingsDaniel J Walsh
Re: [PATCH] libsemanage: Add Ruby BindingsDavid P. Quigley
Re: [PATCH] libsemanage: Add Ruby BindingsJoshua Brindle
[PATCH] libsemanage: Add Ruby BindingsDavid P. Quigley
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLChristopher J. PeBenito
Re: [refpolicy] [RFC] Security policy reworks for SE-PostgreSQLChristopher J. PeBenito
Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)KaiGai Kohei
Re: [refpolicy] [RFC] mod_selinux security policyKaiGai Kohei
Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)KaiGai Kohei
Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole (fwd)James Morris
[PATCH] Update ltp selinux testsuite READMEStephen Smalley
Re: policy as configuration dataStephen Smalley
Re: policy development library documentationStephen Smalley
Re: policy development library documentationDaniel J Walsh
Re: policy as configuration dataDaniel J Walsh
Re: policy as configuration dataJoshua Brindle
policy development library documentationMark Webb
Re: policy as configuration dataStephen Smalley
Re: Problems with freeing thread local storage in libselinuxTomas Mraz
Problems with freeing thread local storage in libselinuxManoj Srivastava
policy as configuration dataCaleb Case
Re: Using interfaces defined elsewhereBandan Das
Re: Using interfaces defined elsewhereDaniel J Walsh
SETRANS + libavg = SIGSEGV on HardyCaleb Case
[PATCH] Fix ltp selinux testsuite for rhel5Stephen Smalley
Using interfaces defined elsewhereBandan Das
[PATCH] Update selinux ioctl testStephen Smalley
[PATCH] Update ltp selinux test script and policyStephen Smalley
Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the testsStephen Smalley
Re: [PATCH] selinux: Fix send_sigiotask hookDavid Howells
[PATCH] selinux: Fix send_sigiotask hookStephen Smalley
Re: [LTP] Fwd: [PATCH] Create $SELINUXTMPDIR in each of the testsStephen Smalley
Re: Some ideas in SE-PostgreSQL enhancement (Re: The status of SE-PostgreSQL)Eamon Walsh