SELinux - Date Index
[Prev Page][Next Page]
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: Re: Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Use of optional_policy in templates (compiler bug or feature?)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] keep getting the same avc denial: tmpfs_t:dir search;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Trying to figure out the signature of a screen capture.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Trying to figure out the signature of a screen capture.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Use of optional_policy in templates (compiler bug or feature?)
- From: Joe Nall <joe@xxxxxxxx>
- Re: Genfscon 'dash' issue
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Genfscon and cramfs issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- keep getting the same avc denial: tmpfs_t:dir search;
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Genfscon and cramfs issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Genfscon 'dash' issue
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Yet another man page patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: matchpathcon -V does not always work as expected.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] newrole without even knowing
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [RFC v3] Security Label Support for NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Capabilities audit field
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] newrole without even knowing
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Re: Genfscon 'dash' issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Re: [RFC v3] Security Label Support for NFSv4
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- newrole without even knowing
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- New libsemanage space saving patch.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Capabilities audit field
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Capabilities audit field
- From: James Morris <jmorris@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Capabilities audit field
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: gdm ubuntu 8.10
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- gdm ubuntu 8.10
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH v7 01/17] netlabel: Fix some sparse warnings
- From: James Morris <jmorris@xxxxxxxxx>
- Re: per role template confusion
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: per role template confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: per role template confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: per role template confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: per role template confusion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Genfscon 'dash' issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- SELinux User Guide: weekly report 20081010
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- user guide drafts: "Mounting File Systems"
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Call for representation at the LCA2009 Security Mini-Conf
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Genfscon 'dash' issue
- From: korkishko Tymur <k.tymur@xxxxxxxxxxx>
- Call for representation at the LCA2009 Security Mini-Conf
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment (rev.2)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment (rev.2)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: per role template confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: building base policy on RHEL5
- From: Dominick Grift <domg472@xxxxxxxxx>
- building base policy on RHEL5
- From: Andy Warner <warner@xxxxxxxxx>
- Re: per role template confusion
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- per role template confusion
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] Thread/Child-Domain Assignment (rev.2)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: BUGREPORT: A type alias of invisible primary one
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide drafts: Archiving Files with tar/star
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- user guide drafts: Archiving Files with tar/star
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- RE: user guide drafts: Maintaining SELinux Labels
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: user guide drafts: Maintaining SELinux Labels
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Customizing SELinux Policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- user guide drafts: Maintaining SELinux Labels
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- permissive domain interface (Re: typebounds lookup from userspace)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 02/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 02/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH v7 09/17] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 00/17] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 12/17] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 13/17] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 04/17] netlabel: Remove unneeded in-kernel API functions
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 11/17] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 05/17] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 06/17] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 03/17] selinux: Correctly handle IPv4 packets on IPv6 sockets in all cases
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 07/17] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 10/17] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 14/17] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH v7 02/17] selinux: Cleanup the NetLabel glue code
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH v7 16/17] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 17/17] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 15/17] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 01/17] netlabel: Fix some sparse warnings
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH v7 08/17] smack: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- RE: user guide drafts: "Working with SELinux" sections
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Customizing SELinux Policy
- From: "Alain Reguera Delgado" <alain.reguera@xxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: "Andrew G. Morgan" <morgan@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [autotools][patch] AC_INIT VERSION info fix + checkpolicy test
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [PATCH] selinux: Fix an uninitialized variable BUG/panic in selinux_secattr_to_sid()
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [autotools][patch] AC_INIT VERSION info fix + checkpolicy test
- From: "Jason Tang" <jtang@xxxxxxxxxx>
- [PATCH] selinux: Fix an uninitialized variable BUG/panic in selinux_secattr_to_sid()
- From: Paul Moore <paul.moore@xxxxxx>
- SELinux User Guide: weekly report 20081003
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Working with SELinux" sections
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC PATCH v6 15/16] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 15/16] cipso: Add support for native local labeling and fixup mapping names
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v6 15/16] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 11/16] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 16/16] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 04/16] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 02/16] selinux: Correctly handle IPv4 packets on IPv6 sockets in all cases
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 01/16] selinux: Cleanup the NetLabel glue code
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH v6 12/16] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 12/16] selinux: Set socket NetLabel based on connection endpoint
- From: Joe Nall <joe@xxxxxxxx>
- RE: genhomedircon problems
- From: "Johnson, Richard" <Richard.Johnson@xxxxxxxxxxx>
- genhomedircon problems
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v6 16/16] netlabel: Add configuration support for local labeling
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 15/16] cipso: Add support for native local labeling and fixup mapping names
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 11/16] netlabel: Add functionality to set the security attributes of a packet
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 12/16] selinux: Set socket NetLabel based on connection endpoint
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 10/16] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 09/16] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 08/16] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- user guide drafts: SELinux Modes, Booleans, SELinux Contexts - Labeling Files
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide drafts: "Working with SELinux" sections
- From: Valdis.Kletnieks@xxxxxx
- Re: [RFC PATCH v6 04/16] selinux: Better local/forward check in selinux_ip_postroute()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 03/16] netlabel: Remove unneeded in-kernel API functions
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 02/16] selinux: Correctly handle IPv4 packets on IPv6 sockets in all cases
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v6 01/16] selinux: Cleanup the NetLabel glue code
- From: James Morris <jmorris@xxxxxxxxx>
- Re: user guide drafts: "Working with SELinux" sections
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH 06/14] KConfig: Add KConfig entries for Labeled NFS
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 02/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 01/14] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 02/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] capability: WARN when invalid capability is requested rather than BUG/panic
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Yet another man page patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- matchpathcon -V does not always work as expected.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: sepostgresql.pp conflicts on F9 (Re: How to find SELinux policy type?)
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: sepostgresql.pp conflicts on F9 (Re: How to find SELinux policy type?)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: sepostgresql.pp conflicts on F9 (Re: How to find SELinux policy type?)
- From: Dominick Grift <domg472@xxxxxxxxx>
- sepostgresql.pp conflicts on F9 (Re: How to find SELinux policy type?)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Some missing man pages from libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [autotools] libselinux build system comments
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: Patch to make libsemanage/selinux policy require less space.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide drafts: "Working with SELinux" sections
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC v3] Security Label Support for NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 10/14] NFSv4: Introduce new label structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 04/14] Security: Add Hook to test if the particular xattr is part of a MAC model.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 14/14] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 09/14] NFS: Introduce lifecycle management for label attribute.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 12/14] NFS: Client implementation of Labeled-NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 01/14] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 11/14] NFS/RPC: Add the auth_seclabel security flavor to allow the process label to be sent to the server.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 07/14] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 06/14] KConfig: Add KConfig entries for Labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 02/14] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 03/14] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 05/14] SELinux: Add new labeling type native labels
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 08/14] NFS: Add security_label text mount option and handling code to NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 13/14] NFS: Extend NFS xattr handlers to accept the security namespace
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Patch to make libsemanage/selinux policy require less space.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [autotools] libselinux build system comments
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to make libsemanage/selinux policy require less space.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: [autotools] libselinux build system comments
- From: "Jason Tang" <jtang@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: use default proc sid on symlinks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: use default proc sid on symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ipcs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [autotools][patch] AC_INIT macro fixes
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [autotools] libselinux build system comments
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- RE: [autotools] libselinux build system comments
- From: "Jason Tang" <jtang@xxxxxxxxxx>
- Re: [autotools] libselinux build system comments
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- [autotools][patch] libsepol build system comments
- From: "Jason Tang" <jtang@xxxxxxxxxx>
- [autotools] libselinux build system comments
- From: "Jason Tang" <jtang@xxxxxxxxxx>
- Patch to make libsemanage/selinux policy require less space.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux User Guide: weekly report 20080926
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Valdis.Kletnieks@xxxxxx
- Re: user guide drafts: "Working with SELinux" sections
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH][autotools] libselinux/load_policy.o compile error
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: Fwd: checkmodule: duplicate declaration of type/attribute problem
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Fwd: checkmodule: duplicate declaration of type/attribute problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: checkmodule: duplicate declaration of type/attribute problem
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- checkmodule: duplicate declaration of type/attribute problem
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: BUGREPORT: A type alias of invisible primary one
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Some missing man pages from libselinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- apol bugs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: James Morris <jmorris@xxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: How to find SELinux policy type?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- RE: How to find SELinux policy type?
- From: "Mike Sweetser - Adhost" <mikesw@xxxxxxxxxx>
- How to find SELinux policy type?
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: use default proc sid on symlinks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: use default proc sid on symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: use default proc sid on symlinks
- From: James Morris <jmorris@xxxxxxxxx>
- user guide drafts: "Working with SELinux" sections
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: BUGREPORT: A type alias of invisible primary one
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [RFC][PATCH] selinux: use default proc sid on symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Latest flask definitions for libselinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Latest flask definitions for libselinux.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Latest flask definitions for libselinux.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Latest flask definitions for libselinux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Latest flask definitions for libselinux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Man page fixes for libselinux.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Valdis.Kletnieks@xxxxxx
- Re: typebounds lookup from userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: typebounds lookup from userspace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- typebounds lookup from userspace
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: apol and linking
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: apol and linking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- apol and linking
- From: Russell Coker <russell@xxxxxxxxxxxx>
- SELinux User Guide: weekly report 20080919
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Latest translations of SELinux policoreutils patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Latest translations of SELinux policoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Latest translations of SELinux policoreutils patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: Hong <kindloaf@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: Hong <kindloaf@xxxxxxxxx>
- [RFC PATCH v6 01/16] selinux: Cleanup the NetLabel glue code
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 08/16] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 11/16] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 09/16] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 05/16] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 03/16] netlabel: Remove unneeded in-kernel API functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 13/16] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 16/16] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 15/16] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 00/16] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 14/16] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 10/16] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 06/16] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 04/16] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 02/16] selinux: Correctly handle IPv4 packets on IPv6 sockets in all cases
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 07/16] smack: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v6 12/16] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC] Apache/SELinux : Enables to prevent web application flaws.
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH][autotools] libselinux/load_policy.o compile error
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- [OT] voice at SecureOS BoF : Japan Linux Conference 2008
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- SELinux User Guide: weekly report 20080913
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: Changes to semanage to allow it to handle transactions.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Latest translations of SELinux policoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changes to semanage to allow it to handle transactions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Changes to semanage to allow it to handle transactions.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Add glob support for restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: fixfiles fixes
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Changes to semanage to allow it to handle transactions.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Only call gen_requires once.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: setkey ipsec no avc's message
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: setkey ipsec no avc's message
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- setkey ipsec no avc's message
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: xpyb Fedora package?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [patch] Update selinux info in MAINTAINERS and Kconfig help text
- From: James Morris <jmorris@xxxxxxxxx>
- Only call gen_requires once.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [patch] Update selinux info in MAINTAINERS and Kconfig help text
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] ssh issue with latest policy
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: strange memory use of mcstransd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- strange memory use of mcstransd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Ivan Gyurdiev <ivg231@xxxxxxxxx>
- xpyb Fedora package?
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Userspace versioning and releases
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ssh issue with latest policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Userspace versioning and releases
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] Updated SELinux userspace release and URL change
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: semodule memory use
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: semodule memory use
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage fcontext - policy loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semanage fcontext - policy loading
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: semodule memory use
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: semodule memory use
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- semodule memory use
- From: Russell Coker <russell@xxxxxxxxxxxx>
- dpkg bug related to SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: BUGREPORT: A type alias of invisible primary one
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: BUGREPORT: A type alias of invisible primary one
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- BUGREPORT: A type alias of invisible primary one
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide draft: "Confined and Unconfined User Domains" review
- From: James Morris <jmorris@xxxxxxxxx>
- user guide draft: "Confined and Unconfined User Domains" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- PHP/SELinux: libselinux wrappers
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: X11 abstract unix domain socket context question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- X11 abstract unix domain socket context question
- From: Joe Nall <joe@xxxxxxxx>
- Changes to semanage to allow it to handle transactions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Add glob support for restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- fixfiles fixes
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Why are the socket mls constraints are different between ipsec and netlabel?
- From: Paul Moore <paul.moore@xxxxxx>
- rsync issues with 'security.selinux': copying unlabelled files to a 'labelled' file system ... ?
- From: "Tom London" <selinux@xxxxxxxxx>
- Why are the socket mls constraints are different between ipsec and netlabel?
- From: Joe Nall <joe@xxxxxxxx>
- Re: I hope the user guide will explain what to do with a message such as this one
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- I hope the user guide will explain what to do with a message such as this one
- From: "Stanley A. Klein" <sklein@xxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/14] smack: Fix missing calls to netlbl_skbuff_err()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v5 04/14] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 05/14] smack: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 06/14] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 10/14] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 00/14] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 07/14] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 11/14] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 01/14] netlabel: Remove unneeded in-kernel API functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 14/14] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 09/14] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 13/14] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 08/14] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 12/14] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 03/14] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v5 02/14] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v4 02/14] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] Milter Mail Filters
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 12/14] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 11/14] selinux: Cache NetLabel secattrs in the socket's security struct
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 10/14] selinux: Set socket NetLabel based on connection endpoint
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 09/14] netlabel: Add functionality to set the security attributes of a packet
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 04/14] selinux: Fix missing calls to netlbl_skbuff_err()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 03/14] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 02/14] selinux: Better local/forward check in selinux_ip_postroute()
- From: James Morris <jmorris@xxxxxxxxx>
- SELinux User Guide: weekly report 20080905
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Ivan Gyurdiev <ivg231@xxxxxxxxx>
- root plug confusion
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH][gnome.if]: bad gen_require type
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH][gnome.if]: bad gen_require type
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH][autotools] libselinux/load_policy.o compile error
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH][gnome.if]: bad gen_require type
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH][autotools] libselinux/load_policy.o compile error
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [PATCH][gnome.if]: bad gen_require type
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH][autotools] libselinux/load_policy.o compile error
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH][gnome.if]: bad gen_require type
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH][origin/autotools] fix libtool_compat header error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][origin/autotools] fix libtool_compat header error
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [LTP] [RFC] LTP IMA patch
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: setroubleshoot problems with MLS policy in enforcing mode
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH][autotools] libselinux/load_policy.o compile error
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [PATCH][origin/autotools] fix libtool_compat header error
- From: Vikram Noel Ambrose <noel.ambrose@xxxxxxxxx>
- Re: [PATCH][origin/autotools] fix libtool_compat header error
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH -v3] SELinux: memory leak in security_context_to_sid_core
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v3] SELinux: memory leak in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] checkpolicy: error(s) encountered while parsing configuration
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: user guide draft: "Targeted Policy" review
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: memory leak in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] checkpolicy: error(s) encountered while parsing configuration
- From: Hong <kindloaf@xxxxxxxxx>
- Re: [PATCH -v2] SELinux: memory leak in security_context_to_sid_core
- From: Eric Paris <eparis@xxxxxxxxxx>
- Hey we made it big time, we are being made fun of in a cartoon!
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH -v2] SELinux: memory leak in security_context_to_sid_core
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH -v2] SELinux: memory leak in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: memory leak in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] checkpolicy: error(s) encountered while parsing configuration
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] SELinux: memory leak in security_context_to_sid_core
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: memory leak in security_context_to_sid_core
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: James Morris <jmorris@xxxxxxxxx>
- Re: user guide draft: "Targeted Policy" review
- From: Dominick Grift <domg472@xxxxxxxxx>
- user guide draft: "Targeted Policy" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/14] Labeled networking patches for 2.6.28
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v4 14/14] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 13/14] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 09/14] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 00/14] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 08/14] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 06/14] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 05/14] smack: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 07/14] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 03/14] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 01/14] netlabel: Remove unneeded in-kernel API functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 12/14] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 11/14] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 04/14] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 10/14] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v4 02/14] selinux: Better local/forward check in selinux_ip_postroute()
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH] SELinux: memory leak in security_context_to_sid_core
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [refpolicy] checkpolicy: error(s) encountered while parsing configuration
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: How can I know violations in denied timing ?
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How can I know violations in denied timing ?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] checkpolicy: error(s) encountered while parsing configuration
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- RE: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- How can I know violations in denied timing ?
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- [PATCH] libsepol : Add support for a new policy version (POLICYDB_VERSION_BOUNDARY)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: James Morris <jmorris@xxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: checkpolicy: error(s) encountered while parsing configuration
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: checkpolicy: error(s) encountered while parsing configuration
- From: Hong <kindloaf@xxxxxxxxx>
- checkpolicy: error(s) encountered while parsing configuration
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: James Morris <jmorris@xxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: semodule -i error
- From: "shaunak saha" <reach.shaunak@xxxxxxxxx>
- Re: About SELinux in Ubuntu
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: About SELinux in Ubuntu
- From: Hong <kindloaf@xxxxxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: semodule -i error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semodule -i error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semodule -i error
- From: "shaunak saha" <reach.shaunak@xxxxxxxxx>
- Re: semodule -i error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semodule -i error
- From: "shaunak saha" <reach.shaunak@xxxxxxxxx>
- Re: semodule -i error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: About Domain Transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: About SELinux in Ubuntu
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semodule -i error
- From: "shaunak saha" <reach.shaunak@xxxxxxxxx>
- Re: About Domain Transition
- From: Dominick Grift <domg472@xxxxxxxxx>
- SELinux User Guide: weekly report 20080829
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: About Domain Transition
- From: Hong <kindloaf@xxxxxxxxx>
- RE: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: About Domain Transition
- From: Dominick Grift <domg472@xxxxxxxxx>
- About Domain Transition
- From: Hong <kindloaf@xxxxxxxxx>
- About SELinux in Ubuntu
- From: Hong <kindloaf@xxxxxxxxx>
- Re: [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: [PATCH] SELinux: add boundary support and thread context assignment
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: add boundary support and thread context assignment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: add boundary support and thread context assignment
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy (v2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Socket and inode label consistency
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Socket and inode label consistency
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- setroubleshoot problems with MLS policy in enforcing mode
- From: Robert Story <rstory@xxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: "Stephen John Smoogen" <smooge@xxxxxxxxx>
- Re: Socket and inode label consistency
- From: Paul Moore <paul.moore@xxxxxx>
- Re: user guide draft: "SELinux Contexts and Attributes" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semodule -i not working
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: user guide draft: "Introduction" review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Socket and inode label consistency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [LTP][PATCH 2/2] Add a new test case for bounds types
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [LTP][PATCH 1/2] Replacement of deprecated interfaces
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- user guide draft: "SELinux Contexts and Attributes" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: semodule -i not working
- From: Shaz <shazalive@xxxxxxxxx>
- user guide draft: "Introduction" review
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Ivan Gyurdiev <ivg231@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Socket and inode label consistency
- From: Trent Jaeger <tjaeger@xxxxxxxxxxx>
- Re: [patch] selinux: simplify ioctl checking, SELinux enhancements in 2.6.26
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/1] selinux: add support for installing a dummy policy (v2)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Labeled networking patches for 2.6.28
- From: Joe Nall <joe@xxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PAM security transitions
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Revised Patch for local nodecon support in semanage (was: Adding local nodecon's through semanage)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semodule -i not working
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: James Morris <jmorris@xxxxxxxxx>
- semodule -i not working
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC 2/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: [RFC 1/2] labeled ipsec internet drafts
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [patch] libselinux: fix EMBEDDED=y build
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [patch] libselinux: fix EMBEDDED=y build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: PAM security transitions
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] Thread/Child-Domain Assignment (rev.4)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- [PATCH 1/3] Thread/Child-Domain Assignment (rev.6)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PAM security transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: James Morris <jmorris@xxxxxxxxx>
- Re: New SELinux toolchain build system
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: PAM security transitions
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: add support for installing a dummy policy
- From: James Morris <jmorris@xxxxxxxxx>
- PAM security transitions
- From: Vikram Ambrose <Vikram.Ambrose@xxxxxxxxxxxxx>
- [PATCH 1/1] selinux: add support for installing a dummy policy
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: libsemage patch to not compile modules for seusers and fcontext
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux User Guide: weekly report 20080822
- From: Murray McAllister <mmcallis@xxxxxxxxxx>
- Re: [PATCH] Revised Patch for local nodecon support in semanage (was: Adding local nodecon's through semanage)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v3 10/13] selinux: Cache NetLabel secattrs in the socket's security struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 12/13] cipso: Add support for native local labeling and fixup mapping names
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 05/13] netlabel: Replace protocol/NetLabel linking with refrerence counts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 04/13] smack: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 01/13] netlabel: Remove unneeded in-kernel API functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 11/13] netlabel: Changes to the NetLabel security attributes to allow LSMs to pass full contexts
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 08/13] netlabel: Add functionality to set the security attributes of a packet
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 02/13] selinux: Fix a problem in security_netlbl_sid_to_secattr()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 00/13] Labeled networking patches for 2.6.28
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 13/13] netlabel: Add configuration support for local labeling
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 06/13] netlabel: Add a generic way to create ordered linked lists of network addrs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 09/13] selinux: Set socket NetLabel based on connection endpoint
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 07/13] netlabel: Add network address selectors to the NetLabel/LSM domain mapping
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v3 03/13] selinux: Fix missing calls to netlbl_skbuff_err()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [patch 04/35] corenetwork policy update
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [ANN] SELinux userland repository, wiki and bug tracking on oss.tresys.com
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Make Dummy Policy
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]