SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 37/37] NFS: Add mount options to enable local caching on NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/37] FS-Cache: Provide an add_wait_queue_tail() function
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/37] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/37] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/37] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/37] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/37] Security: Add a kernel_service object class to SELinux
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/37] NFS: Define and create superblock-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/37] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/37] NFS: Register NFS for caching and retrieve the top-level index
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/37] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/37] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 32/37] NFS: Add read context retention for FS-Cache to call back with
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/37] FS-Cache: Release page->private after failed readahead
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/37] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/37] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/37] NFS: Define and create server-level objects
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 31/37] NFS: FS-Cache page management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/37] NFS: Add FS-Cache option bit and debug bit
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fixfiles: broken option processing?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux and Linux user mapping
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Why do we need to differentiate between open and read/write in policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: new user types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: avc_compute_member convenience function
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: new user types
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: fixfiles: broken option processing?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- SELinux Support for Ubuntu Hardy
- From: "Caleb Case" <ccase@xxxxxxxxxx>
- Re: fixfiles: broken option processing?
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: fixfiles: broken option processing?
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [patch] selinux: support 64-bit capabilities
- From: James Morris <jmorris@xxxxxxxxx>
- new user types
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- ps access
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- [PATCH] libselinux: avc_compute_member convenience function
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: fixfiles: broken option processing?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: provide more error reporting on load policy failures
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [patch] libselinux: provide more error reporting on load policy failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] refpolicy: add capability2 class
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Resend: Sudo Changes for SELinux
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [patch] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux and Linux user mapping
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: Resend: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch] selinux: support 64-bit capabilities
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- RE: Resend: Sudo Changes for SELinux
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] refpolicy: add capability2 class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [gov-eng] Multithreaded applications, SELinux, and RAM Protection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: java threads
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: java threads
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: java threads
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: java threads
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 24/27] NFS: Use local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [gov-eng] Multithreaded applications, SELinux, and RAM Protection
- From: Shawn Wells <swells@xxxxxxxxxx>
- Multithreaded applications, SELinux, and RAM Protection
- From: Shawn Wells <swells@xxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: James Morris <jmorris@xxxxxxxxx>
- java threads
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: Why am I not transitioning correctly?
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- invalid context
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: Why am I not transitioning correctly?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why am I not transitioning correctly?
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: Why am I not transitioning correctly?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Why am I not transitioning correctly?
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support 64-bit capabilities
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [RFC][PATCH] selinux: support 64-bit capabilities
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [patch] libselinux: disable setlocaldefs if no local boolean oruser files exist
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- fixfiles: broken option processing?
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [patch] libselinux: disable setlocaldefs if no local boolean or user files exist
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Resend: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Resend: Sudo Changes for SELinux
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux and Linux user mapping
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [PATCH] libselinux: add "poly_property" type to X contexts backend
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: matchpathcon flags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- matchpathcon flags
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: SELinux and Linux user mapping
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: How to contribute: policy?
- From: "Scott Lowrey" <slowrey@xxxxxxxxxxxxx>
- SELinux and Linux user mapping
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: segfault in checkpolicy stable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: segfault in checkpolicy stable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- segfault in checkpolicy stable
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: How to contribute: policy?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: How to contribute: policy?
- From: "Scott Lowrey" <slowrey@xxxxxxxxxxxxx>
- Re: [patch] libselinux: don't preservebools for Linux >= 2.6.22
- From: "Chad Sellers" <csellers@xxxxxxxxxx>
- [patch] libselinux: don't preservebools for Linux >= 2.6.22
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: su problems again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to contribute: policy?
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Accurately setting Security Context of a user when ssh-ing in
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: Remove security_get_policycaps()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: su problems again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: su problems again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkpolicy patch: avoid warning in rawhide
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] SELinux: Remove security_get_policycaps()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: su problems again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to contribute: policy?
- From: "Eoin Ryan" <ryaneoin@xxxxxxxxx>
- Re: su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: su problems again
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: reindexing time for SELinux?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: checkpolicy patch: avoid warning in rawhide
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- su problems again
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Re: reindexing time for SELinux?
- From: "Seth D. Guikema" <sguikema@xxxxxxx>
- Re: setools is still broken in rawhide.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checkpolicy patch: avoid warning in rawhide
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Service control via /etc/init.d/ using strict policy
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: Service control via /etc/init.d/ using strict policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: "Jeremy A. Mowery" <jmowery@xxxxxxxxxx>
- Service control via /etc/init.d/ using strict policy
- From: "Eoin Ryan" <ryaneoin@xxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: reindexing time for SELinux?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH] libsemanage: free policydb before fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- checkpolicy patch: avoid warning in rawhide
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: reindexing time for SELinux?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: setools is still broken in rawhide.
- From: "Jeremy A. Mowery" <jmowery@xxxxxxxxxx>
- RE: [PATCH] libsemanage: free policydb before fork
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [refpolicy] samba
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [PATCH] libsemanage: free policydb before fork
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- reindexing time for SELinux?
- From: "Seth D. Guikema" <sguikema@xxxxxxx>
- Re: [refpolicy] samba
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libsemanage: free policydb before fork
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: UNCLASSIFIED - Realtime Scheduling...
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: free policydb before fork
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [refpolicy] pam_mount
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- [refpolicy] samba
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- [PATCH] libsemanage: free policydb before fork
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- setools is still broken in rawhide.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I have spit out my current diffs in policy on fedoraproject.org
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] optionally consume input at expand time to save memory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I have spit out my current diffs in policy on fedoraproject.org
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [ANNOUNCE] The Linux Test Project has been Released for JANUARY 2008
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- RE: [patch] libsemanage: free base immediately after expand
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- non-SELinux question
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: genhomedircon is broken in libsemanage
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [patch] libsepol: tune avtab to reduce memory usage
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: I have spit out my current diffs in policy on fedoraproject.org
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch] libsepol: tune avtab to reduce memory usage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [patch] libsemanage: free base immediately after expand
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: UNCLASSIFIED - Realtime Scheduling...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I have spit out my current diffs in policy on fedoraproject.org
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- I have spit out my current diffs in policy on fedoraproject.org
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: James Antill <james.antill@xxxxxxxxxx>
- [patch] libsemanage: free base immediately after expand
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] optionally consume input at expand time to save memory
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [patch] libsepol: tune avtab to reduce memory usage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- usb_hcd_poll_rh_status (rh_timer_func)
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [patch] Tuning avtab to reduce memory usage
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: [PATCH 24/27] NFS: Use local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch] Tuning avtab to reduce memory usage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- shadow
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [patch] Tuning avtab to reduce memory usage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- shadow
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: shadow
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- UNCLASSIFIED - Realtime Scheduling...
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: UNCLASSIFIED - Realtime Scheduling...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: UNCLASSIFIED - Realtime Scheduling...
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: problems updating /etc/shadow using strict example policy on Fedora Core 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- problems updating /etc/shadow using strict example policy on Fedora Core 3
- From: "Kim Lawson-Jenkins" <lawson@xxxxxxxxxxxxxxxx>
- RE: genhomedircon is broken in libsemanage
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [patch] selinux-testsuite: update README
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [patch] selinux-testsuite: extend unconfined_runs_test
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Accurately setting Security Context of a user when ssh-ing in
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Accurately setting Security Context of a user when ssh-ing in
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Resend: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 24/27] NFS: Use local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] security: add iptables "security" table for MAC rules
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] security: add iptables "security" table for MAC rules
- From: James Morris <jmorris@xxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: genhomedircon is broken in libsemanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC] security: add iptables "security" table for MAC rules
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] security: add iptables "security" table for MAC rules
- From: James Morris <jmorris@xxxxxxxxx>
- RE: genhomedircon is broken in libsemanage
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [RFC] security: add iptables "security" table for MAC rules
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] SELinux: Fix double free in selinux_netlbl_sock_setsid()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [GIT PULL] pull request for lblnet-2.6_testing
- From: Paul Moore <paul.moore@xxxxxx>
- genhomedircon is broken in libsemanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] security: add iptables "security" table for MAC rules
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH] SELinux: Fix double free in selinux_netlbl_sock_setsid()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: OLS 2008 SELinux Proposals for review and comments
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- OLS 2008 SELinux Proposals for review and comments
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: racoon got dead due to permission lacking
- From: Paul Moore <paul.moore@xxxxxx>
- Re: racoon got dead due to permission lacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: racoon got dead due to permission lacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- mcs
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: racoon got dead due to permission lacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: UNCLASSIFIED - Clarification of Symlink labelling...
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] fixfiles -C: behave as advertised
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT v2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: mcs policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it time we removed the version number from policy.22/policy21?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Is it time we removed the version number from policy.22/policy21?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Is it time we removed the version number from policy.22/policy21?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: UNCLASSIFIED - Clarification of Symlink labelling...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- UNCLASSIFIED - Clarification of Symlink labelling...
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- racoon got dead due to permission lacking
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- mcs policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- /var
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: /var
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT v2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] fixfiles -C: behave as advertised
- From: Marshall Miller <mmiller@xxxxxxxxxx>
- [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT v2
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- /var
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] fixfiles -C: relabel all file contexts that have changed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Brett Lentz <blentz@xxxxxxxxxxxxx>
- [PATCH] selinux: make mls_compute_sid always polyinstantiate
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: audit2allow patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Steve G <linux_4ever@xxxxxxxxx>
- Re: Deprecating setlocaldefs, preservebools support in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Deprecating setlocaldefs, preservebools support in libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] fixfiles -C: relabel all file contexts that have changed
- From: Marshall Miller <mmiller@xxxxxxxxxx>
- Re: audit2allow patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: patch to setfiles/fixfiles to handle file names with special characters in them.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: audit2allow patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I am more worried about open then read and write, SELinux needs open access checks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- patch to setfiles/fixfiles to handle file names with special characters in them.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- audit2allow patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: James Morris <jmorris@xxxxxxxxx>
- I am more worried about open then read and write, SELinux needs open access checks.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Swig patch for libselinux to stop warning messages and update to latest swig
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to use new audit2why interface in via audit2allow
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to improve sepopolgen error reporting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fixes for policycoreutils scripts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Patch to install selinux python with correct permissions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [patch] selinux-testsuite: update README
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] selinux-testsuite: extend unconfined_runs_test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 07/27] Security: De-embed task security record from task and use refcounting [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/27] NFS: Separate caching by superblock, explicitly if necessary [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/27] KEYS: Add keyctl function to get a security label [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/27] FS-Cache: Release page->private after failed readahead [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/27] CacheFiles: Add missing copy_page export for ia64 [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/27] Security: Make NFSD work with detached security [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/27] NFS: Use local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/27] CacheFiles: Add a hook to write a single page of data to an inode [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/27] KEYS: Check starting keyring as part of search [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/27] CacheFiles: Export things for CacheFiles [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id() [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/27] KEYS: Increase the payload size when instantiating a key [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/27] Security: Add a kernel_service object class to SELinux [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/27] NFS: Configuration and mount option changes to enable local caching on NFS [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/27] NFS: Display local caching state [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/27] NFS: Fix memory leak [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/27] Permit filesystem local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/27] FS-Cache: Provide an add_wait_queue_tail() function [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/27] CacheFiles: Permit the page lock state to be monitored [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/27] Security: Pre-add additional non-caching classes [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to add python audit2why bindings.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to install selinux python with correct permissions.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch 1/1] libsemanage: genhomedircon remove error on missing HOME_DIR or HOME_ROOT
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: Kohei KaiGai <kaigai@xxxxxxxxxxxxx>
- [PATCH 23/27] NFS: Fix memory leak
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/27] NFS: Use local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/27] NFS: Display local caching state
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/27] CacheFiles: Permit the page lock state to be monitored
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/27] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/27] Security: Add a kernel_service object class to SELinux
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/27] FS-Cache: Provide an add_wait_queue_tail() function
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/27] NFS: Separate caching by superblock, explicitly if necessary
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/27] KEYS: Increase the payload size when instantiating a key
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/27] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/27] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/27] CacheFiles: Export things for CacheFiles
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/27] CacheFiles: Add a hook to write a single page of data to an inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/27] NFS: Configuration and mount option changes to enable local caching on NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/27] FS-Cache: Release page->private after failed readahead
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/27] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/27] CacheFiles: Add missing copy_page export for ia64
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/27] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/27] Security: Pre-add additional non-caching classes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [POLICYREP] [patch 7/7] remove unused copy/init functions
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 7/7] remove unused copy/init functions
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 3/7] remove duplicated optional.hpp data
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 0/7] various cleanups and base symbol class
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 2/7] remove policy_package
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 5/7] fix operator= calls to return pointer
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 4/7] symbol base class
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 6/7] add negset to idset
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [POLICYREP] [patch 1/7] remove makefile targets that dont build
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: 2.6.24-rc8-mm1 and SELinux MLS - not playing nice....
- From: Paul Moore <paul.moore@xxxxxx>
- mcs
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- segatex-4.40 released
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- New audit plugin for prelude
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: mcs mls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- mcs mls
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: SystemHigh
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: 2.6.24-rc8-mm1 and SELinux MLS - not playing nice....
- From: James Morris <jmorris@xxxxxxxxx>
- Re: 2.6.24-rc8-mm1 and SELinux MLS - not playing nice....
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Paul Moore <paul.moore@xxxxxx>
- SystemHigh
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: selinux_inode_setsecurity and fsetxattr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux_inode_setsecurity and fsetxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: selinux_inode_setsecurity and fsetxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: selinux_inode_setsecurity and fsetxattr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- selinux_inode_setsecurity and fsetxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: 2.6.24-rc8-mm1 and SELinux MLS - not playing nice....
- From: James Morris <jmorris@xxxxxxxxx>
- 2.6.24-rc8-mm1 and SELinux MLS - not playing nice....
- From: Valdis.Kletnieks@xxxxxx
- [RFC Patch v1 7/10] PAM Namespace: different pam users
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 06b/26] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 06b/26] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- [RFC PATCH v12 07/18] SELinux: Convert the netif code to use ifindex values
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 16/18] NetLabel: Add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 14/18] SELinux: Allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 13/18] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 08/18] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 11/18] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 15/18] NetLabel: Introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 09/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 18/18] SELinux: Add warning messages on network denial due to error
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 06/18] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 01/18] NetLabel: Remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 10/18] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 12/18] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 00/18] Labeled networking changes for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 17/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 03/18] NetLabel: Consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 04/18] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 02/18] NetLabel: Cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v12 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 06b/26] Security: Make NFSD work with detached security
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06a/26] Extra task_struct -> task_security separation
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: newrole -l error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole -l error
- From: Matt Anderson <mra@xxxxxx>
- newrole -l error
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/26] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/26] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 04/26] KEYS: Add keyctl function to get a security label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: MCS/MLS
- From: Paul Moore <paul.moore@xxxxxx>
- MCS/MLS
- From: Bill Chimiak <wch1m1@xxxxxxxxx>
- Re: [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 00/26] Permit filesystem local caching
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 00/26] Permit filesystem local caching
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 07/26] Security: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/26] Security: Allow kernel services to override LSM settings for task actions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/26] NFS: Separate caching by superblock, explicitly if necessary
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/26] CacheFiles: Add a hook to write a single page of data to an inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/26] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/26] Security: Add a kernel_service object class to SELinux
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/26] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/26] KEYS: Increase the payload size when instantiating a key
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/26] NFS: Display local caching state
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/26] FS-Cache: Release page->private after failed readahead
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/26] FS-Cache: Provide an add_wait_queue_tail() function
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/26] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 16/26] CacheFiles: Add missing copy_page export for ia64
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/26] NFS: Fix memory leak
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/26] NFS: Use local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/26] FS-Cache: Recruit a couple of page flags for cache management
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/26] Add a secctx_to_secid() LSM hook to go along with the existing
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/26] CacheFiles: Export things for CacheFiles
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/26] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/26] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/26] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/26] CacheFiles: Permit the page lock state to be monitored
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/26] Security: Pre-add additional non-caching classes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/26] NFS: Configuration and mount option changes to enable local caching on NFS
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] refpolicy: su needs ability to run unix_update
- From: "Brandon Whalen" <bwhalen@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- sysadm_devpts_t
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: newrole -l s3
- From: Joe Nall <joe@xxxxxxxx>
- newrole -l s3
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: X avcs
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Translation patch for polciycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to improve sepopolgen error reporting
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to use new audit2why interface in via audit2allow
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Fixes for policycoreutils scripts
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Swig patch for libselinux to stop warning messages and update to latest swig
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: Swig patch for libselinux to stop warning messages and update to latest swig
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to add python audit2why bindings.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sudo Changes for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Swig patch for libselinux to stop warning messages and update to latest swig
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Sudo Changes for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: X avcs
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy patch] add setfcap to list of capabilities
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Sudo Changes for SELinux
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- RE: Q: SECMARK controls on forwarded packets
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- RE: UNCLASSIFIED - Developing Policies for SELinux on EmbeddedSystems
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [refpolicy patch] add setfcap to list of capabilities
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- RE: Q: SECMARK controls on forwarded packets
- From: "Chad Hanson" <chanson@xxxxxxxxxxxxx>
- Re: [RFC] Obtaining PATH entry without audit userland
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC] Obtaining PATH entry without audit userland
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Policyrep to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [patch 0/7] quiet gcc warnings
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- RE: Policyrep to policydb
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Policyrep to policydb
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: Sudo Changes for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: In the midst of doing a conversion of audit2why to python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Sudo Changes for SELinux
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: In the midst of doing a conversion of audit2why to python
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: UNCLASSIFIED - Developing Policies for SELinux on Embedded Systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Sudo Changes for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- RE: [patch 7/7] Use -Werror
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- UNCLASSIFIED - Developing Policies for SELinux on Embedded Systems
- From: "HAWKER, Dan 2 \(external\)" <Dan.HAWKER@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch 7/7] Use -Werror
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: X avcs
- From: Ted X Toth <txtoth@xxxxxxxxx>
- RE: Re: [patch 7/7] Use -Werror
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: pam.d
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re: [patch 7/7] Use -Werror
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Q: SECMARK controls on forwarded packets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Man pages translation (Russian) policycoreutils and reference policy
- From: Andrey Markelov <andrey@xxxxxxxxxxxx>
- Q: SECMARK controls on forwarded packets
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH v11 18/19] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- pam.d
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: In the midst of doing a conversion of audit2why to python
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: role dominance
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: In the midst of doing a conversion of audit2why to python
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- In the midst of doing a conversion of audit2why to python
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 0/2] policy capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Re: [patch 7/7] Use -Werror
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Man pages translation (Russian) policycoreutils and reference policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: TypeError: in method 'getpidcon', argument 1 of type 'pid_t'
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch to install selinux python with correct permissions.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Man pages translation (Russian) policycoreutils and reference policy
- From: Andrey Markelov <andrey@xxxxxxxxxxxx>
- Re: Re: [patch 7/7] Use -Werror
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Rawhide kernel is reporting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: TypeError: in method 'getpidcon', argument 1 of type 'pid_t'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Man pages translation (Russian) policycoreutils and reference policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 13/19] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 16/19] NetLabel: Introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 04/19] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 17/19] NetLabel: Add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 7/7] Use -Werror
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 15/19] SELinux: Allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 14/19] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 06/19] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 01/19] NetLabel: Remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 05/19] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 7/7] Use -Werror
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- [RFC PATCH v11 12/19] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 19/19] SELinux: Add warning messages on network denial due to error
- From: Paul Moore <paul.moore@xxxxxx>
- Re: role dominance
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: role dominance
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC PATCH v11 03/19] NetLabel: Consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: dhcpc_exec_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 00/19] Labeled networking changes for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 07/19] NET: Clone the sk_buff 'iif' field in __skb_clone()
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 7/7] Use -Werror
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 10/19] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 08/19] SELinux: Convert the netif code to use ifindex values
- From: Paul Moore <paul.moore@xxxxxx>
- Re: role dominance
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v11 11/19] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 02/19] NetLabel: Cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 09/19] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v11 18/19] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- TypeError: in method 'getpidcon', argument 1 of type 'pid_t'
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- role dominance
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: cant SSH/Console Login and no deny/error messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH] SELinux: Add network ingress and egress control permission checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Fwd: Re: [PATCH 1/2] LSM: Add inet_sys_snd_skb() LSM hook
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH] New take on the ingress/egress patch
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Fwd: Re: [PATCH 1/2] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- Fwd: Re: [PATCH 1/2] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- dhcpc_exec_t
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: mls policy dbus patch
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: run_init patch for Fedora 8
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [patch 0/7] quiet gcc warnings
- [patch 5/7] quiet libsepol uninitialized variable warnings
- [RFC PATCH v10 18/20] NetLabel: Add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- [patch 7/7] Use -Werror
- [patch 3/7] quiet getdefaultcon warning
- [patch 4/7] quiet libsemanage scanner warnings
- [patch 6/7] quiet policycoreutils warnings
- [patch 1/7] quiet checkpolicy warnings
- [patch 2/7] quiet libsepol qualifier warnings
- Re: locallogin patch for Fedora 8
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [RFC PATCH v10 05/20] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 17/20] NetLabel: Introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 06/20] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 12/20] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 16/20] SELinux: Allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 20/20] SELinux: Add warning messages on network denial due to error
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 15/20] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 07/20] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 14/20] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 13/20] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 09/20] SELinux: Convert the netif code to use ifindex values
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 08/20] NET: Clone the sk_buff 'iif' field in __skb_clone()
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 03/20] NetLabel: Consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 19/20] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 01/20] NetLabel: Remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 11/20] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 10/20] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 02/20] NetLabel: Cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 04/20] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v10 00/20] Labeled networking changes for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Xorg modprobe denials
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH] REFPOL: Add new object classes and permissions for labeled networking
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: cant SSH/Console Login and no deny/error messages
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: cant SSH/Console Login and no deny/error messages
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: startx
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Xorg modprobe denials
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: PATCH: peersid capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [LTP] compilation error @ selinux tests
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: X avcs
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: newrole in the background
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [LTP] compilation error @ selinux tests
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: Is SELinux support as a kernel module possible ??
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Is SELinux support as a kernel module possible ??
- From: "Leo Prasath" <leo.prasath@xxxxxxxxx>
- [ANNOUNCE] [LTP] The Linux Test Project has been Released for DECEMBER 2007
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: Rawhide kernel is reporting
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: Rawhide kernel is reporting
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Kernel panic when using refpolicy
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Rawhide kernel is reporting
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- RE: Kernel panic when using refpolicy
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- Man pages translation (Russian) policycoreutils and reference policy
- From: Andrey Markelov <andrey@xxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- mls policy dbus patch
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: What happened to source for targeted?
- From: James Antill <jantill@xxxxxxxxxx>
- Re: What happened to source for targeted?
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]