SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] SELinux: introduce permissive types
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] audit tty selinux permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] audit tty selinux permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] audit tty selinux permission
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Joe Nall <joe@xxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Ronald van den Blink <selinux@xxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Joe Nall <joe@xxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PATCH: fix libsepol tests build error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- PATCH: fix libsepol tests build error
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Dropping selinux-doc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- nfs_t mount label
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: nfs_t mount label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Erich Schubert <erich@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Ronald van den Blink <selinux@xxxxxx>
- ANN: Updated SELinux core userland release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Ronald van den Blink <selinux@xxxxxx>
- [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC]Introduce generalized hooks for getting and setting inode secctx
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2] NFS: use new LSM interfaces to explicitly set mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: How to handle NFS and conflicting mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
- From: Erich Schubert <erich@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: Ronald van den Blink <selinux@xxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- refpolicy: domains need access to the apt's pty and fifos
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: Unreserved portnumbers in corenetwork
- [PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] NFS: use new LSM interfaces to explicitly set mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Unreserved portnumbers in corenetwork
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: How to handle NFS and conflicting mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- How to handle NFS and conflicting mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: How to handle NFS and conflicting mount options
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: PATCH: avoid -Werror for parser-generated sources
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [patch] refpolicy: exim policy fixes
- From: Devin Carraway <selinux-list@xxxxxxxxx>
- Unreserved portnumbers in corenetwork
- Re: Problem compiling SELinux poilcy
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Chris Wright <chrisw@xxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Refpolicy: Add new permissions for open perms
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Ok I am trying to build interfaces using X Controls.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: refpolicy: patch for gpg-agent
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc2.7, new patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- PATCH: avoid -Werror for parser-generated sources
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: refpolicy: patch rpc
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: ANN: Flexible Mandatory Access Control (FMAC) for Solaris
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: PATCH: fix uninitialized use of handle in struct policy_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] loadkeys and init fds
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: PATCH: fix uninitialized use of handle in struct policy_file
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [patch] refpolicy: exim policy fixes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ANN: Flexible Mandatory Access Control (FMAC) for Solaris
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: fix uninitialized use of handle in struct policy_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libsepol: drop unused buffer field from policy_file
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: xguest_u, LDAP and /tmp
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [patch] libsepol: drop unused buffer field from policy_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: fix uninitialized use of handle in struct policy_file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: fix uninitialized use of handle in struct policy_file
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Problem with corenet_* statements.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problem with corenet_* statements.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- xguest_u, LDAP and /tmp
- From: Hal <hal_bg@xxxxxxxxx>
- Re: Ok I am trying to build interfaces using X Controls.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Ok I am trying to build interfaces using X Controls.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: PATCH: fix uninitialized use of handle in struct policy_file
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- RE: PATCH: fix uninitialized use of handle in struct policy_file
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: PATCH: fix uninitialized use of handle in struct policy_file
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- PATCH: fix uninitialized use of handle in struct policy_file
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Problem with corenet_* statements.
- From: "Gienek Nowacki" <nowackig@xxxxxxxxx>
- Re: Ok I am trying to build interfaces using X Controls.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PATH: minor checkpolicy cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Ok I am trying to build interfaces using X Controls.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: mcs translation daemon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mcs translation daemon
- From: Joe Nall <joe@xxxxxxxx>
- PATH: minor checkpolicy cleanup
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- sudo
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- mcs translation daemon
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- regarding the last message
- myjboss and jbossjava selinux-modules
- segatex-5.30 released
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- RE: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: James Antill <james.antill@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: "Tom London" <selinux@xxxxxxxxx>
- [ANNOUNCE] The Linux Test Project has been Released for FEBRUARY 2008
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: James Morris <jmorris@xxxxxxxxx>
- Re: apache_content_template
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7, new patch
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH 32/37] NFS: Add read context retention for FS-Cache to call back with [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH 07/37] Security: De-embed task security record from task and use refcounting [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/37] NFS: Define and create superblock-level objects [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 16/37] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/37] Security: Make NFSD work with detached security [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/37] FS-Cache: Release page->private after failed readahead [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 30/37] NFS: Add some new I/O event counters for FS-Cache events [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/37] NFS: Register NFS for caching and retrieve the top-level index [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/37] Security: Add a kernel_service object class to SELinux [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/37] CacheFiles: Add a hook to write a single page of data to an inode [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 28/37] NFS: Use local disk inode cache [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 36/37] NFS: Display local caching state [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 31/37] NFS: FS-Cache page management [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/37] NFS: Add comment banners to some NFS functions [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/37] KEYS: Add keyctl function to get a security label [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 34/37] NFS: Read pages from FS-Cache into an NFS inode [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/37] CacheFiles: Permit the page lock state to be monitored [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/37] CacheFiles: Add missing copy_page export for ia64 [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 33/37] NFS: nfs_readpage_async() needs to be accessible as a fallback for local caching [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 35/37] NFS: Store pages from an NFS inode into a local cache [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/37] FS-Cache: Recruit a couple of page flags for cache management [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/37] FS-Cache: Provide an add_wait_queue_tail() function [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/37] NFS: Add FS-Cache option bit and debug bit [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/37] Permit filesystem local caching [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/37] KEYS: Check starting keyring as part of search [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 37/37] NFS: Add mount options to enable local caching on NFS [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/37] KEYS: Increase the payload size when instantiating a key [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 29/37] NFS: Invalidate FsCache page flags when cache removed [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/37] NFS: Define and create inode-level cache objects [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/37] KEYS: Allow the callout data to be passed as a blob rather than a string [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/37] NFS: Permit local filesystem caching to be enabled for NFS [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/37] NFS: Define and create server-level objects [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/37] CacheFiles: Export things for CacheFiles [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/37] Security: Change current->fs[ug]id to current_fs[ug]id() [ver #34]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC PATCH] SELinux: Cleanup the secid/secctx conversion functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Permissive mode for xace is broken.
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: new capability to support open permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: James Antill <james.antill@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [Fwd: gnome login broken.... "null" avcs...]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [patch] libsepol: accept Flask as string identifier in policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: create new open permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] SELinux: create new open permission
- From: Paul Moore <paul.moore@xxxxxx>
- Re: libselinux does not work properly in upstart/initrd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH -v2] SELinux: create new open permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- libselinux does not work properly in upstart/initrd
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: create new open permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] SELinux: create new open permission
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] libsepol: new capability to support open permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: create new open permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: create new open permission
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Why does checkpolicy need libsepol-static
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Refpolicy: Add new permissions for open perms
- From: Eric Paris <eparis@xxxxxxxxxx>
- Why does checkpolicy need libsepol-static
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH] libsepol: new capability to support open permissions
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PATCH: use yyerror2() in checkpolicy parser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Tonights rawhide contains a fix to stop xspy.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Tonights rawhide contains a fix to stop xspy.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Speaking of networking...
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Speaking of networking...
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Speaking of networking...
- From: James Morris <jmorris@xxxxxxxxx>
- PATCH: use yyerror2() in checkpolicy parser
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: apache_content_template
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Ok latest Xserver is in rawhide, and permissive mode seems to be working.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: apache_content_template
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: apache_content_template
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: PATCH: avoid -Werror for parser-generated sources
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PATCH: avoid -Werror for parser-generated sources
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- RE: policycaps implementation in checkmodule
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- policycaps implementation in checkmodule
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: apache_content_template
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Speaking of networking...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Speaking of networking...
- From: Paul Moore <paul.moore@xxxxxx>
- Re: apache_content_template
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: apache_content_template
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: Speaking of networking...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/5] New labeled networking permissions for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Speaking of networking...
- From: Paul Moore <paul.moore@xxxxxx>
- Speaking of networking...
- From: James Morris <jmorris@xxxxxxxxx>
- Re: default user roles
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 0/5] New labeled networking permissions for 2.6.25
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- apache_content_template
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: refpolicy: patch rpc
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 0/5] New labeled networking permissions for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 0/5] New labeled networking permissions for 2.6.25
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Global requirements were not met
- From: Ronald van den Blink <selinux@xxxxxx>
- Re: Global requirements were not met
- From: Ronald van den Blink <selinux@xxxxxx>
- [PATCH 4/5] REFPOL: Allow network service domains to receive unlabeled traffic
- Re: Global requirements were not met
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 2/5] REFPOL: Allow network admin domains to receive unlabeled traffic
- [PATCH 3/5] REFPOL: Allow network apps domains to receive unlabeled traffic
- [PATCH 5/5] REFPOL: Allow network system domains to receive unlabeled traffic
- [PATCH 1/5] REFPOL: Add new labeled networking permissions
- [PATCH 0/5] New labeled networking permissions for 2.6.25
- Re: Installing SELinux on Backtrack
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Problem compiling SELinux poilcy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Global requirements were not met
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Global requirements were not met
- Re: [PATCH][RFC] Unify printk messgaes
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] Unify printk messgaes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH][RFC] Unify printk messgaes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Problem compiling SELinux poilcy
- From: kihamba nengo <knengo@xxxxxxxxx>
- Installing SELinux on Backtrack
- From: kihamba nengo <knengo@xxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Correct the NetLabel locking for the sk_security_struct
- From: James Morris <jmorris@xxxxxxxxx>
- Re: how to implement permissive domains + an old bug
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH] SELinux: Correct the NetLabel locking for the sk_security_struct
- From: Paul Moore <paul.moore@xxxxxx>
- Re: how to implement permissive domains + an old bug
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Implicit conversion to pointer.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Silly audit2allows
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Implicit conversion to pointer.
- From: Manoj Srivastava <manoj.srivastava@xxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Silly audit2allows
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: So how would I write policy with xace/XSELinux to stop xspy from working?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] dovecot.fc.patch (resend)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Silly audit2allows
- From: Joe Nall <joe@xxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Silly audit2allows
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: [PATCH] SE-PostgreSQL Security Policy
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: I have begun merging XWindows Controls into Rawhide.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] SELinux: Correct the NetLabel locking for the sk_security_struct
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH] SELinux: Correct the NetLabel locking for the sk_security_struct
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH][RFC] remove unused backpointers from security objects
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: So how would I write policy with xace/XSELinux to stop xspy from working?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: how to implement permissive domains + an old bug
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] dovecot.fc.patch (resend)
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- [refpolicy] loadkeys and init fds
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy: patch rpc
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] rsyslogd, rklogd and Debian
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] dovecot.fc.patch (resend)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Permissive mode for xace is broken.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] storage.if addition
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- I have begun merging XWindows Controls into Rawhide.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Permissive mode for xace is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH][RFC] remove unused backpointers from security objects
- From: James Morris <jmorris@xxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] remove unused backpointers from security objects
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libselinux: save errno value in avc_has_perm()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] remove unused backpointers from security objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- refpolicy: patch rpc
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH][RFC] remove unused backpointers from security objects
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH] SELinux: differentiate between open and r/w operations
- From: James Morris <jmorris@xxxxxxxxx>
- [refpolicy] dovecot.fc.patch (resend)
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- [refpolicy] storage.if addition
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- getting xselinux into xcb-proto/libxcb
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [refpolicy] rsyslogd, rklogd and Debian
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: So how would I write policy with xace/XSELinux to stop xspy from working?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] libselinux: save errno value in avc_has_perm()
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: So how would I write policy with xace/XSELinux to stop xspy from working?
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: Not that anyone would ever run in permissive mode but...
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: Not that anyone would ever run in permissive mode but...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: differentiate between open and r/w operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Gen_require scoping?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: differentiate between open and r/w operations
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Gen_require scoping?
- Re: default user roles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Not that anyone would ever run in permissive mode but...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: default user roles
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: default user roles
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC PATCH] SELinux: differentiate between open and r/w operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: default user roles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- default user roles
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: refpolicy: patch for ldconfig from glibc 2.7
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: segfault in semodule
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: segfault in semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: segfault in semodule
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Gen_require scoping?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: FC8 enforcing auditd, mcstransd, NFS statd fail to start
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: segfault in semodule
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: ps aux output under sysadm context in refpolicy
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- segfault in semodule
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [Fwd: excessively verbose policy]
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: ps aux output under sysadm context in refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Gen_require scoping?
- refpolicy: patch for ldconfig from glibc 2.7
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: ps aux output under sysadm context in refpolicy
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: ps aux output under sysadm context in refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secadm/sysadm discussion
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: ps aux output under sysadm context in refpolicy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: excessively verbose policy]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 06/37] Security: Separate task security context from task_struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- ps aux output under sysadm context in refpolicy
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Darrel Goeddel <dgoeddel@xxxxxxxxxxxxx>
- So how would I write policy with xace/XSELinux to stop xspy from working?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: FC8 enforcing auditd, mcstransd, NFS statd fail to start
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFS] Application changing remote policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFS] Application changing remote policy
- From: "shahbaz khan" <shazalive@xxxxxxxxx>
- Re: FC8 enforcing auditd, mcstransd, NFS statd fail to start
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: James Carter <jwcart2@xxxxxxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/37] Permit filesystem local caching
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- FC8 enforcing auditd, mcstransd, NFS statd fail to start
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [PATCH 35/37] NFS: Store pages from an NFS inode into a local cache
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH 29/37] NFS: Invalidate FsCache page flags when cache removed
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How would I go about figuring out if two SELinux MLS Levels intersect?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 16/37] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3
- From: David Howells <dhowells@xxxxxxxxxx>
- refpolicy: patch for gpg-agent
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH 33/37] NFS: nfs_readpage_async() needs to be accessible as a fallback for local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/37] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/37] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/37] Security: Add a kernel_service object class to SELinux
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 32/37] NFS: Add read context retention for FS-Cache to call back with
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/37] KEYS: Increase the payload size when instantiating a key
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/37] NFS: Define and create server-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 37/37] NFS: Add mount options to enable local caching on NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 34/37] NFS: Read pages from FS-Cache into an NFS inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/37] CacheFiles: Permit the page lock state to be monitored
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/37] CacheFiles: Add missing copy_page export for ia64
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 36/37] NFS: Display local caching state
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/37] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/37] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/37] CacheFiles: Add a hook to write a single page of data to an inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 31/37] NFS: FS-Cache page management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 30/37] NFS: Add some new I/O event counters for FS-Cache events
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: refpolicy: patch for Debian backup cron daily jobs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 10/37] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/37] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/37] NFS: Add comment banners to some NFS functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/37] NFS: Register NFS for caching and retrieve the top-level index
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/37] FS-Cache: Provide an add_wait_queue_tail() function
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/37] FS-Cache: Release page->private after failed readahead
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/37] NFS: Permit local filesystem caching to be enabled for NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 28/37] NFS: Use local disk inode cache
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/37] CacheFiles: Export things for CacheFiles
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/37] NFS: Define and create superblock-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/37] NFS: Define and create inode-level cache objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/37] NFS: Add FS-Cache option bit and debug bit
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: refpolicy: patch for Debian backup cron daily jobs
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Paul Moore <paul.moore@xxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy: patch for Debian backup cron daily jobs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [patch] refpolicy: exim policy fixes
- From: Devin Carraway <selinux-list@xxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- NFS/LSM: allow NFS to control all of its own mount options
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] invalid memory allocation in policydb_index_others()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Resend: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] samba
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] pam_mount
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH] invalid memory allocation in policydb_index_others()
- From: "J. Tang" <jtang@xxxxxxxxxx>
- Re: secadm/sysadm discussion
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy: patch for Debian backup cron daily jobs
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy: patch for Debian cracklib-runtime daily cron job
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- refpolicy: patch for Debian backup cron daily jobs
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- refpolicy: patch for Debian cracklib-runtime daily cron job
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- RE: secadm/sysadm discussion
- From: "Chad Hanson" <chanson@xxxxxxxxxxxxx>
- Re: xguest LDAP authentication
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: secadm/sysadm discussion
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- xguest LDAP authentication
- From: Hal <hal_bg@xxxxxxxxx>
- SELinux
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: secadm/sysadm discussion
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: s.m.a.c.k
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [ANN]segatex-4.90 released
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: Brindle example of labeled IPSec
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Brindle example of labeled IPSec
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Brindle example of labeled IPSec
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Brindle example of labeled IPSec
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Brindle example of labeled IPSec
- From: Paul Moore <paul.moore@xxxxxx>
- secadm/sysadm discussion
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- secadm/sysadm discussion
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Brindle example of labeled IPSec
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secadm question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: how to implement permissive domains + an old bug
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- how to implement permissive domains + an old bug
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: secadm question
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: secadm question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: secadm question
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: secadm question
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: secadm question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: secadm question
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: secadm question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secadm question
- From: Paul Moore <paul.moore@xxxxxx>
- Re: secadm question
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: secadm question
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: secadm question
- From: Paul Moore <paul.moore@xxxxxx>
- RFC: fcglob prototype
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- secadm question
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- pommed
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- s.m.a.c.k.
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- svn refpolicy ppp.if syntax error
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux power consumption (was Re: s.m.a.c.k)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: s.m.a.c.k
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CORBA and network labeling capabilities
- From: Paul Moore <paul.moore@xxxxxx>
- SELinux power consumption (was Re: s.m.a.c.k)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 3/4] REFPOL: Remove the unlabeled_t SECMARK policy in kernel_sendrecv_unlabeled_association
- From: Paul Moore <paul.moore@xxxxxx>
- s.m.a.c.k
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: CORBA and network labeling capabilities
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: CORBA and network labeling capabilities
- From: Paul Moore <paul.moore@xxxxxx>
- RE: CORBA and network labeling capabilities
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- s.m.a.c.k
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: s.m.a.c.k
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CORBA and network labeling capabilities
- From: Paul Moore <paul.moore@xxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Disabling SELinux by kernel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Disabling SELinux by kernel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Disabling SELinux by kernel vulnerability
- From: Yuichi Nakamura <himainu-ynakam@xxxxxxxxx>
- Re: Disabling SELinux by kernel vulnerability
- From: Yuichi Nakamura <himainu-ynakam@xxxxxxxxx>
- RE: Disabling SELinux by kernel vulnerability
- From: "Waide, Ronan" <waider@xxxxxxxxxx>
- [PATCH] SE-PostgreSQL Security Policy
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- CORBA and network labeling capabilities
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: PATCH: libsepol use correct pointer type in sizeof()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PATCH: libsepol use correct pointer type in sizeof()
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Disabling SELinux by kernel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: Disabling SELinux by kernel vulnerability
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: Disabling SELinux by kernel vulnerability
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/4] REFPOL: Add forwarding permissions to the packet object class
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Disabling SELinux by kernel vulnerability
- From: Yuichi Nakamura <himainu-ynakam@xxxxxxxxx>
- Re: [PATCH 4/4] REFPOL: Add new labeled networking permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 1/4] REFPOL: Add "rogue" Fedora packet class permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 3/4] REFPOL: Remove the unlabeled_t SECMARK policy in kernel_sendrecv_unlabeled_association
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: if (2.6.24.1 && capset && bind9) bug()
- Re: [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole transition problems w/ local user domain
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: newrole transition problems w/ local user domain
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: newrole transition problems w/ local user domain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/37] Security: Add a kernel_service object class to SELinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 06/37] Security: Separate task security context from task_struct
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 05/37] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [PATCH 27/37] NFS: Define and create inode-level cache objects
- From: David Howells <dhowells@xxxxxxxxxx>
- newrole transition problems w/ local user domain
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 21/37] NFS: Add comment banners to some NFS functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] REFPOL: Remove the unlabeled_t SECMARK policy in kernel_sendrecv_unlabeled_association
- [PATCH 4/4] REFPOL: Add new labeled networking permissions
- [PATCH 0/4] Reference Policy patches for the new labeled networking code in 2.6.25
- [PATCH 1/4] REFPOL: Add "rogue" Fedora packet class permissions
- [PATCH 2/4] REFPOL: Add forwarding permissions to the packet object class
- [PATCH 16/37] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: new user types
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 19/37] CacheFiles: Export things for CacheFiles
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 34/37] NFS: Read pages from FS-Cache into an NFS inode
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: new user types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 29/37] NFS: Invalidate FsCache page flags when cache removed
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 33/37] NFS: nfs_readpage_async() needs to be accessible as a fallback for local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 30/37] NFS: Add some new I/O event counters for FS-Cache events
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: new user types
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 28/37] NFS: Use local disk inode cache
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/37] CacheFiles: Add a hook to write a single page of data to an inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 35/37] NFS: Store pages from an NFS inode into a local cache
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/37] KEYS: Increase the payload size when instantiating a key
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 36/37] NFS: Display local caching state
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/37] CacheFiles: Permit the page lock state to be monitored
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/37] CacheFiles: Add missing copy_page export for ia64
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/37] NFS: Permit local filesystem caching to be enabled for NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 37/37] NFS: Add mount options to enable local caching on NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/37] FS-Cache: Provide an add_wait_queue_tail() function
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/37] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/37] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/37] Security: Add a kernel_service object class to SELinux
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/37] NFS: Define and create superblock-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/37] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/37] NFS: Register NFS for caching and retrieve the top-level index
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/37] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 32/37] NFS: Add read context retention for FS-Cache to call back with
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/37] FS-Cache: Release page->private after failed readahead
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/37] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/37] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/37] NFS: Define and create server-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 31/37] NFS: FS-Cache page management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/37] NFS: Add FS-Cache option bit and debug bit
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fixfiles: broken option processing?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]