selinux September 2009 archive
Main Archive Page > Month Archives  > selinux archives
selinux: By Date

selinux By Date

SubjectAuthorDate
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildJames Morris
semanage Equal.patchDaniel J Walsh
Add modules support to semanageDaniel J Walsh
Fix boolean handling in semanageDaniel J Walsh
Re: load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policyDaniel J Walsh
Remove setrans management from semanageDaniel J Walsh
Re: load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policyStephen Smalley
load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policyDaniel J Walsh
[PATCH v5 2/2] selinux: generate flask headers during kernel buildStephen Smalley
[PATCH v5 1/2] selinux: dynamic class/perm discoveryStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: MCS and default labelsPaul Moore
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: MCS and default labelsKyle Moffett
Re: MCS and default labelsPaul Moore
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH] SELinux: reset the security_ops before flushing the avc cacheJames Morris
Re: MCS and default labelsKyle Moffett
Re: [RFC][PATCH] selinux: dynamic class/perm discoveryKaiGai Kohei
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildKaiGai Kohei
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildKaiGai Kohei
Re: MCS and default labelsPaul Moore
Re: Configuring libsemanage to invoke a policy checkerDaniel J Walsh
Re: SElinux troublesDaniel J Walsh
Configuring libsemanage to invoke a policy checkerStephen Smalley
Re: SElinux troublesDaniel J Walsh
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: [PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
[PATCH v4 2/2] selinux: generate flask headers during kernel buildStephen Smalley
[PATCH v4 1/2] selinux: dynamic class/perm discoveryStephen Smalley
Re: [PATCH 2/3] checkpolicy: Add support for multiple target OSesPaul Nuzzi
Re: [PATCH 1/3] libsepol: Add support for multiple target OSesPaul Nuzzi
Re: MCS and default labelsKyle Moffett
Re: SElinux troublesStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: SElinux troublesDaniel J Walsh
Re: MCS and default labelsKyle Moffett
Re: MCS and default labelsRussell Coker
[PATCH v3 2/2] selinux: generate flask headers during kernel buildStephen Smalley
[PATCH v3 1/2] selinux: dynamic class/perm discoveryStephen Smalley
Re: SElinux troublesStephen Smalley
Re: SElinux troublesDaniel J Walsh
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: This patch fixes the exception handling in libselinux-python bindingsDaniel J Walsh
Re: [RFC][PATCH] selinux: dynamic class/perm discoveryStephen Smalley
Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel buildStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: [RFC][PATCH v2 2/2] selinux: generate flask headers during kernel buildKaiGai Kohei
Re: pam_namespace context inside of name.instJustin P. Mattock
Re: MCS and default labelsRussell Coker
Re: pam_namespace context inside of name.instJustin Mattock
Re: pam_namespace context inside of name.instDominick Grift
Re: pam_namespace context inside of name.instJustin P. Mattock
Re: pam_namespace context inside of name.instDominick Grift
pam_namespace context inside of name.instJustin Mattock
[RFC][PATCH v2 2/2] selinux: generate flask headers during kernel buildStephen Smalley
[RFC][PATCH v2 1/2] selinux: dynamic class/perm discoveryStephen Smalley
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
Re: Matchpathcon patch to print <<none>> when it gets enoent.Joshua Brindle
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
[PATCH] restorecond: Ignore IN_IGNORED inotify eventsMartin Orr
Re: [RFC][PATCH] selinux: dynamic class/perm discoveryKaiGai Kohei
[RFC][cr_tests PATCH] checkpoint/restart: define selinux testsSerge E. Hallyn
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
[RFC][PATCH] selinux: dynamic class/perm discoveryStephen Smalley
Re: [PATCH] SELinux: audit_access perm used only to dontaudit denials in that access syscallEric Paris
[PATCH] SELinux: do not destroy the avc_cache_nodepEric Paris
[PATCH] SELinux: reset the security_ops before flushing the avc cacheEric Paris
Re: Naive question on ftp selinux policyChris PeBenito
Naive question on ftp selinux policyElia Pinto
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianManoj Srivastava
CIL infrastructure repo and talks at Summit/LPCJoshua Brindle
Re: XACE: tclass malformedEamon Walsh
Re: [refpolicy] new policy for dkim-filterChristopher J. PeBenito
Re: policycoreutils: The error message on forkpty() failure is not clear or useful.Joshua Brindle
Re: I think I sent this patch before, it is the upgrade patch.Joshua Brindle
Re: [PATCH] setfiles fails to relabel if selinux not enabledJoshua Brindle
Re: libsemanage patchJoshua Brindle
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianJoshua Brindle
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianDaniel J Walsh
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianJoshua Brindle
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
Re: [GIT] security / creds fixesEric Paris
Re: [PATCH] setfiles fails to relabel if selinux not enabledStephen Smalley
Re: This patch fixes the exception handling in libselinux-python bindingsJoshua Brindle
Re: [PATCH 1/3] libsepol: Add support for multiple target OSesStephen Smalley
Re: [GIT] security / creds fixesStephen Smalley
Re: [PATCH 1/3] libsepol: Add support for multiple target OSesPaul Nuzzi
Re: [GIT] security / creds fixesEric Paris
Re: libsemanage patchDaniel J Walsh
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianDaniel J Walsh
Re: [PATCH] setfiles fails to relabel if selinux not enabledJeff Johnson
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianJoshua Brindle
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianDaniel J Walsh
Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecondDaniel J Walsh
Re: SELinux BOFs at LinuxCon and Linux Plumbers Conferencedebora_at_nospam
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianManoj Srivastava
Re: semodule/libsemanage patch to allow enable and disable of modules.Daniel J Walsh
Re: libsemanage patchJoshua Brindle
Re: semodule/libsemanage patch to allow enable and disable of modules.Joshua Brindle
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: libsemanage patchJoshua Brindle
Re: policycoreutils: audit2allow -l doesn't work with dmesg pipeJoshua Brindle
Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on DebianJoshua Brindle
Re: I think I sent this patch before, it is the upgrade patch.Joshua Brindle
Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecondJoshua Brindle
Re: [PATCH] setfiles fails to relabel if selinux not enabledStephen Smalley
Re: [PATCH] setfiles fails to relabel if selinux not enabledJeff Johnson
Re: [PATCH 1/3] libsepol: Add support for multiple target OSesJoshua Brindle
RE: [PATCH] setfiles fails to relabel if selinux not enabledStephen Smalley
Re: SELinux BOFs at LinuxCon and Linux Plumbers ConferenceStephen Smalley
Re: SELinux BOFs at LinuxCon and Linux Plumbers ConferenceDominick Grift
SELinux BOFs at LinuxCon and Linux Plumbers Conferencedebora_at_nospam
Re: [PATCH] setfiles fails to relabel if selinux not enabledDaniel J Walsh
RE: [PATCH] setfiles fails to relabel if selinux not enabledJoshua Brindle
Re: [PATCH] setfiles fails to relabel if selinux not enabledStephen Smalley
[PATCH] setfiles fails to relabel if selinux not enabledCaleb Case
Re: [PATCH] libsepol/checkpolicy: Add support for multiple target OSesStephen Smalley
Re: [PATCH] libsepol/checkpolicy: Add support for multiple target OSesChad Sellers
[PATCH 3/3] sepolgen: Add support for multiple target OSespjnuzzi
[PATCH 2/3] checkpolicy: Add support for multiple target OSespjnuzzi
[PATCH 1/3] libsepol: Add support for multiple target OSespjnuzzi
Re: [refpolicy] new policy for dkim-filterChristopher J. PeBenito
Re: [PATCH] libsepol/checkpolicy: Add support for multiple target OSesStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: MCS and default labelsMichal Svoboda
Re: [PATCH] libsepol/checkpolicy: Add support for multiple target OSesStephen Smalley
Re: [PATCH] libsepol/checkpolicy: Add support for multiple target OSesJoshua Brindle
Re: Installing modular policy using RPMJoshua Brindle
Re: how to always add rules to a policyJustin P. Mattock
Re: [refpolicy] new policy for dkim-filterChristopher J. PeBenito
Re: [refpolicy] new policy for dkim-filterPaul Howarth
[PATCH] libsepol/checkpolicy: Add support for multiple target OSespjnuzzi
Re: MCS and default labelsStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: how to always add rules to a policyPaul Howarth
how to always add rules to a policybriaeros007
Re: MCS and default labelsMichal Svoboda
Re: how to use require and gen_require properlyStefan Schulze Frielinghaus
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitJustin P. Mattock
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitEric Paris
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitJustin Mattock
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitEric Paris
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitJustin Mattock
Re: [git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitEric Paris
[git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commitJustin Mattock
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Installing modular policy using RPMJeff Johnson
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
I think I sent this patch before, it is the upgrade patch.Daniel J Walsh
Re: [refpolicy] new policy for dkim-filterPaul Howarth
[PATCH] id: don't print context if POSIXLY_CORRECT is setJim Meyering
Re: Policy file and Selinux Policy questionDaniel J Walsh
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Policy file and Selinux Policy questionElia Pinto
Re: [refpolicy] new policy for dkim-filterChris PeBenito
Re: how to use require and gen_require properlyChris PeBenito
how to use require and gen_require properlyStefan Schulze Frielinghaus
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: [refpolicy] new policy for dkim-filterPaul Howarth
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: [PATCH] setools: missing \ in libqpol/src/include/qpol/Makefile.{am,in}Chad Sellers
Re: XACE: tclass malformedDominick Grift
Re: [refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
Re: XACE: tclass malformedEamon Walsh
[PATCH 1/4] cr: define ckpt_debug if CONFIG_CHECKPOINT=nSerge E. Hallyn
[PATCH 2/4] cr: add generic LSM c/r supportSerge E. Hallyn
[PATCH 1/1] mktree: accept the lsm_name field in header and add -k flagSerge E. Hallyn
[PATCH 3/4] cr: add smack support to lsm c/rSerge E. Hallyn
[PATCH 4/4] cr: add selinux supportSerge E. Hallyn
[PATCH 0/4] LSM checkpoint/restart: introductionSerge E. Hallyn
Re: [refpolicy] new policy for dkim-filterPaul Howarth
[refpolicy] new policy for dkim-filterStefan Schulze Frielinghaus
[PATCH] setools: missing \ in libqpol/src/include/qpol/Makefile.{am,in}Manoj Srivastava
Re: [PATCH] Add functionality to upstart to load policy early in bootManoj Srivastava
XACE: tclass malformedDominick Grift
Re: opensuse and SELinux = some dbus roblem with xdm/gdmJustin Mattock
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartSerge E. Hallyn
Re: opensuse and SELinux = some dbus roblem with xdm/gdmJustin P. Mattock
Re: setfiles leaks file descriptorsDaniel J Walsh
Re: opensuse and SELinux = some dbus roblem with xdm/gdmStephen Smalley
Re: opensuse and SELinux = some dbus roblem with xdm/gdmJustin P. Mattock
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartCasey Schaufler
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartSerge E. Hallyn
Re: MCS and default labelsStephen Smalley
Re: MCS and default labelsMichal Svoboda
Re: [refpolicy] shutdown domainStefan Schulze Frielinghaus
Re: MCS and default labelsStephen Smalley
Re: MCS and default labelsMichal Svoboda
Re: opensuse and SELinux = some dbus roblem with xdm/gdmStephen Smalley
Re: Limitations in modular policyStephen Smalley
Re: setfiles leaks file descriptorsStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: RHEL, RHCS, and Selinux : hype, reality or dream?Elia Pinto
Re: setfiles leaks file descriptorsStephen Smalley
Re: MCS and default labelsMichal Svoboda
Re: opensuse and SELinux = some dbus roblem with xdm/gdmJustin P. Mattock
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartCasey Schaufler
Re: Limitations in modular policyKaiGai Kohei
Re: RHEL, RHCS, and Selinux : hype, reality or dream?James Morris
setfiles leaks file descriptorsDaniel J Walsh
opensuse and SELinux = some dbus roblem with xdm/gdmJustin Mattock
RHEL, RHCS, and Selinux : hype, reality or dream?Elia Pinto
Re: [PATCH] Add functionality to upstart to load policy early in bootStephen Smalley
Re: [PATCH] Add functionality to upstart to load policy early in bootStephen Smalley
Re: MCS and default labelsStephen Smalley
Re: MCS and default labelsMichal Svoboda
Re: libsemanage patchChad Sellers
Re: MCS and default labelsStephen Smalley
Re: Limitations in modular policyStephen Smalley
Re: policycoreutils: audit2allow gives bad policy for role violationsStephen Smalley
Re: [policy] post a message to logged in usersChristopher J. PeBenito
Re: policycoreutils: audit2allow -l doesn't work with dmesg pipeStephen Smalley
Re: [refpolicy] shutdown domainStefan Schulze Frielinghaus
Re: [refpolicy] shutdown domainChristopher J. PeBenito
MCS and default labelsMichal Svoboda
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartSerge E. Hallyn
Limitations in modular policyKaiGai Kohei
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartCasey Schaufler
[PATCH] Add functionality to upstart to load policy early in bootManoj Srivastava
Re: Problem install Reference PolicyDennis Wronka
Re: libsemanage patchDaniel J Walsh
Re: Problem install Reference PolicyJustin P. Mattock
Re: Problem install Reference Policywaqar afridi
Re: Problem install Reference PolicyJustin P. Mattock
[refpolicy] shutdown domainStefan Schulze Frielinghaus
Re: [policy] post a message to logged in usersStefan Schulze Frielinghaus
[policy] post a message to logged in usersStefan Schulze Frielinghaus
Re: can't login in enforcing mode for some reason.Justin P. Mattock
Re: can't login in enforcing mode for some reason.Dennis Wronka
Problem install Reference Policywaqar afridi
Re: can't login in enforcing mode for some reason.Justin P. Mattock
Re: can't login in enforcing mode for some reason.Dennis Wronka
Re: can't login in enforcing mode for some reason.Justin P. Mattock
can't login in enforcing mode for some reason.Justin Mattock
RE: SELinux and SSH Timers ?...Hasan Rezaul-CHR010
RE: SELinux and SSH Timers ?...Stephen Smalley
RE: SELinux and SSH Timers ?...Hasan Rezaul-CHR010
RE: SELinux and SSH Timers ?...Hasan Rezaul-CHR010
RE: SELinux and SSH Timers ?...Stephen Smalley
RE: SELinux and SSH Timers ?...Hasan Rezaul-CHR010
Re: libsemanage patchJoshua Brindle
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartSerge E. Hallyn
Re: [PATCH 3/5] cr: add generic LSM c/r supportSerge E. Hallyn
Re: I cannot change my shell contextDaniel J Walsh
Re: SELinux and SSH Timers ?...Stephen Smalley
Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartCasey Schaufler
[RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restartSerge E. Hallyn
[RFC PATCH 1/2] cr: lsm: provide hooks for an LSM to track policy changesSerge E. Hallyn
Re: semodule/libsemanage patch to allow enable and disable of modules.Chad Sellers
Re: SELinux and SSH Timers ?...Stephen Smalley
SELinux and SSH Timers ?...Hasan Rezaul-CHR010
Re: restorecon and symbolic linksStephen Smalley
Re: I cannot change my shell contextDennis Wronka
Re: SELinux Packages and Library interactions...Stephen Smalley
Re: restorecon and symbolic linksMartin Orr
Re: [PATCH] libselinux: disable refcounting in the userspace AVCKaiGai Kohei
Re: [PATCH] libselinux: disable refcounting in the userspace AVCKaiGai Kohei
Re: [PATCH] libselinux: disable refcounting in the userspace AVCEamon Walsh
Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flagCasey Schaufler
SELinux Packages and Library interactions...Hasan Rezaul-CHR010
RE: [PATCH] libselinux: disable refcounting in the userspace AVCJoshua Brindle
Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flagCasey Schaufler
RE: [PATCH] libselinux: disable refcounting in the userspace AVCStephen Smalley
RE: [PATCH] libselinux: disable refcounting in the userspace AVCJoshua Brindle
Re: restorecon and symbolic linksStephen Smalley
Re: restorecon and symbolic linksMartin Orr
Re: [PATCH] libselinux: disable refcounting in the userspace AVCStephen Smalley
[PATCH] libselinux: disable refcounting in the userspace AVCEamon Walsh
Re: [libsepol] Unchecked input leades to integer underflowManoj Srivastava
CentOS / RHEL5: where is setrans.conf?Joshua Kramer
Re: CentOS / RHEL5: where is setrans.conf?josh_at_nospam
Re: restorecon and symbolic linksStephen Smalley
Re: restorecon and symbolic linksMartin Orr
Re: policycoreutils - semanage does not set umaskStephen Smalley
Re: restorecon and symbolic linksMartin Orr
Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flagRussell Coker
Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flagCasey Schaufler
Re: [PATCH 3/5] cr: add generic LSM c/r supportCasey Schaufler