SELinux - Date Index
[Prev Page][Next Page]
- Re: X avcs
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: What happened to source for targeted?
- From: Lance Spitzner <lance@xxxxxxxxxxxx>
- Re: What happened to source for targeted?
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- Re: What happened to source for targeted?
- From: Lance Spitzner <lance@xxxxxxxxxxxx>
- Re: X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: What happened to source for targeted?
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- What happened to source for targeted?
- From: Lance Spitzner <lance@xxxxxxxxxxxx>
- Re: MLS sensitivity sensitivity
- From: "Peter A. Bigot" <pab@xxxxxxxxxxxxx>
- run_init patch for Fedora 8
- From: "Peter A. Bigot" <pab@xxxxxxxxxxxxx>
- Re: MLS sensitivity sensitivity
- From: Ted X Toth <txtoth@xxxxxxxxx>
- MLS sensitivity sensitivity
- From: "Peter A. Bigot" <pab@xxxxxxxxxxxxx>
- Re: cant SSH/Console Login and no deny/error messages
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- locallogin patch for Fedora 8
- From: "Peter A. Bigot" <pab@xxxxxxxxxxxxx>
- cant SSH/Console Login and no deny/error messages
- From: Jeremiah Jahn <jeremiah@xxxxxxxxxxxxxxxxxxxx>
- X avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [PATCH] REFPOL: Add new object classes and permissions for labeled networking
- From: Paul Moore <paul.moore@xxxxxx>
- Re: newrole in the background
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v9 04/18] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 06/18] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 03/18] NetLabel: Consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 00/18] Labeled networking patches for 2.6.25 (against 2.6.24-rc6)
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 02/18] NetLabel: Cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: PATCH: libsepol should not write policy.18 with mls enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v9 13/18] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 11/18] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 15/18] SELinux: Allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 14/18] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 16/18] NetLabel: Introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 01/18] NetLabel: Remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 08/18] SELinux: Convert the netif code to use ifindex values
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 2/2] checkpolicy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v9 17/18] NetLabel: Add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 09/18] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v9 07/18] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- Re: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS and dbus-daemon related avcs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: MLS and dbus-daemon related avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [DSE-Dev] refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: Erich Schubert <erich@xxxxxxxxxx>
- I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: avc: granted null messages
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: avc: granted null messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS and dbus-daemon related avcs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc: granted null messages
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- startx
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- MLS and dbus-daemon related avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Getting started with SELinux and Slackware
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Getting started with SELinux and Slackware
- From: "Martin J. Green" <mail@xxxxxxxxxxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- RE: RFC: Per-object manager controls in /selinux/config
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: RFC: Per-object manager controls in /selinux/config
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- RFC: Per-object manager controls in /selinux/config
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: Xorg modprobe denials
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: MLS newrole avcs and polyinstantiation avcs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fixes for sepolgen to parse Fedora 9 Policy
- From: Karl MacMillan <kmacmill@xxxxxxxxxx>
- MLS newrole avcs and polyinstantiation avcs
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: Fixes for sepolgen to parse Fedora 9 Policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: avc: granted null messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fixes for sepolgen to parse Fedora 9 Policy
- From: Karl MacMillan <kmacmill@xxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: acpid.socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: avc: granted null messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fixes for sepolgen to parse Fedora 9 Policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: avc: granted null messages
- From: James Morris <jmorris@xxxxxxxxx>
- acpid.socket
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- Re: avc: granted null messages
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- avc: granted null messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Propper labeling of files under /var/www
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Propper labeling of files under /var/www
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- MLS and default file contexts
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: MLS and default file contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Xorg modprobe denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Xorg modprobe denials
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Xorg modprobe denials
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Xorg modprobe denials
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [Fwd: f8 X policy]
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 09/28] FS-Cache: Release page->private after failed readahead [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [Fwd: Re: [Fwd: f8 X policy]]
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: load_policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- load_policy
- From: "Justin Mattock" <justinmattock@xxxxxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- OLS CfP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
- From: Paul Moore <paul.moore@xxxxxx>
- RE: help with an avc denial
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- [RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 08/18] SELinux: Convert the netif code to use ifindex values
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 15/18] SELinux: Allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 16/18] NetLabel: Introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 14/18] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 11/18] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 01/18] NetLabel: Remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 03/18] NetLabel: Consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 07/18] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 04/18] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 13/18] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 02/18] NetLabel: Cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 00/18] Update to the labeled networking patches for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 17/18] NetLabel: Add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v8 12/18] SELinux: Add new peer permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: help with an avc denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: help with an avc denial
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Paul Moore <paul.moore@xxxxxx>
- help with an avc denial
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- This patch adds the xgues and guest users
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Addition of policykit polcy along with changes to hal
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Here is a snapshot of changes to file contexts in my pool
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: newrole in the background
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Patches to files in the kernel policy directory
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: Ted X Toth <txtoth@xxxxxxxxx>
- How to set other process quota by setrlimit
- From: "Ian jonhson" <jonhson.ian@xxxxxxxxx>
- ANN: SELinux Policy IDE (SLIDE) version 1.3
- From: Dave Sugar <dsugar@xxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: newrole in the background
- From: Ted X Toth <txtoth@xxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Paul Moore <paul.moore@xxxxxx>
- RE: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: libsepol should not write policy.18 with mls enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Joy Latten <latten@xxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: PATCH: libsepol should not write policy.18 with mls enabled
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: PATCH: libsepol should not write policy.18 with mls enabled
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- RE: PATCH: libsepol should not write policy.18 with mls enabled
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: PATCH: libsepol should not write policy.18 with mls enabled
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy HEAD, patch for Debian logs of syslog rotation
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Some file context for kernel and systems directory.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Karl MacMillan <kmacmill@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Karl MacMillan <kmacmill@xxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: libsepol should not write policy.18 with mls enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- PATCH: libsepol should not write policy.18 with mls enabled
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Debian refpolicy-trunk xen
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH] [STABLE] Makefile change to disable restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Network flow controls and subj/obj ordering
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: newrole in the background
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- refpolicy HEAD, patch for Debian logs of syslog rotation
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- [PATCH v2] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH v2] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v2] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Network flow controls and subj/obj ordering
- From: Paul Moore <paul.moore@xxxxxx>
- Re: newrole in the background
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- newrole in the background
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [POLICYREP] Add tunable support
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [LTP] Se-Linux Updates for LTP
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Se-Linux Updates for LTP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: MLS Security Levels
- From: Ted X Toth <txtoth@xxxxxxxxx>
- system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
- From: Ted X Toth <txtoth@xxxxxxxxx>
- [PATCH] Debian refpolicy-trunk xen
- From: linio@xxxxxxxxx (Litwiniec Robert)
- Re: [patch 0/2] policy capability support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] XFRM: assorted IPsec fixups
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: policycoreutils patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Man page fix for matchpatchcon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [RFC Patch v2 1/10] PAM Namespace: make polyinstantiated directories module
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to update boolean descriptions to match what I had in policycoreutils.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] XFRM: assorted IPsec fixups
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Se-Linux Updates for LTP
- From: Subrata Modak <subrata@xxxxxxxxxxxxxxxxxx>
- Re: Patch to update boolean descriptions to match what I had inpolicycoreutils.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [patch 1/2] library policy capability support
- [patch 0/2] policy capability support
- [patch 2/2] checkpolicy capability support
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Man page fix for matchpatchcon
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Some file context for kernel and systems directory.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- kismet policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Patch to update boolean descriptions to match what I had in policycoreutils.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Man page fix for matchpatchcon
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: More nsswitch changes.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- policycoreutils patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: More nsswitch changes.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: More nsswitch changes.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, syslogd & setrlimit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Boolean/RPM data in policy
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy HEAD, Debian, syslogd & setrlimit
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- [PATCH 7/7] SECURITY: De-embed task security record from task and use refcounting
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/28] Security: Change current->fs[ug]id to current_fs[ug]id() [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/7] KEYS: Allow the callout data to be passed as a blob rather than a string
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 15/28] CacheFiles: Add a hook to write a single page of data to an inode [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/7] KEYS: Check starting keyring as part of search
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/28] NFS: Configuration and mount option changes to enable local caching on NFS [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/28] Permit filesystem local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/7] Permit filesystem local caching
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/7] KEYS: Increase the payload size when instantiating a key
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 16/28] CacheFiles: Permit the page lock state to be monitored [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/28] FS-Cache: Provide an add_wait_queue_tail() function [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH 17/28] CacheFiles: Export things for CacheFiles [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 28/28] FS-Cache: Make kAFS use FS-Cache [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 26/28] AF_RXRPC: Save the operation ID for debugging [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 25/28] AFS: Improve handling of a rejected writeback [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/28] fcrypt endianness misannotations [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/28] CacheFiles: Add missing copy_page export for ia64 [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/28] AFS: Add TestSetPageError() [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/28] NFS: Use local caching [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 27/28] AFS: Implement shared-writable mmap [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/28] NFS: Display local caching state [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/28] SECURITY: De-embed task security record from task and use refcounting [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/28] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/28] KEYS: Check starting keyring as part of search [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/28] KEYS: Increase the payload size when instantiating a key [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/28] FS-Cache: Release page->private after failed readahead [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/28] KEYS: Allow the callout data to be passed as a blob rather than a string [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/28] KEYS: Add keyctl function to get a security label [try #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/7] KEYS: Add keyctl function to get a security label
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [patch 0/2] policy capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [patch 0/2] policy capability support
- From: Paul Moore <paul.moore@xxxxxx>
- [patch 1/2] library policy capability support
- [patch 0/2] policy capability support
- [patch 2/2] checkpolicy capability support
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: PATCH: peersid capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: [PATCH 1/1] semanage_select_store fun
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Effect of changing SELinux package versions...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: Effect of changing SELinux package versions...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- refpolicy HEAD, Debian, syslogd & setrlimit
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: PATCH: audit format mismatch for inode number
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Interface for DOI mapping
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- PATCH: audit format mismatch for inode number
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- Re: Interface for DOI mapping
- From: Paul Moore <paul.moore@xxxxxx>
- More nsswitch changes.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Interface for DOI mapping
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Many confined domains are calling getpw calls.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- refpolicy HEAD, Debian, ioctl on xconsole by syslogd
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: Interface for DOI mapping
- From: Paul Moore <paul.moore@xxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Interface for DOI mapping
- From: Dave Quigley <dpquigl@xxxxxxxxxxxxx>
- RE: [patch] libsepol: clarify and reduce neverallow error reporting
- From: "Brian M. Williams" <bwilliams@xxxxxxxxxx>
- RE: [patch] libsepol: clarify and reduce neverallow error reporting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [patch] libsepol: clarify and reduce neverallow error reporting
- From: "Brian M. Williams" <bwilliams@xxxxxxxxxx>
- Re: libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: libsemanage patch
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- RE: libsemanage patch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: libsemanage patch
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Many confined domains are calling getpw calls.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: PATCH: peersid capability support
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: missing rules in newrole domain (RHEL5.1)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: Recurring SELinux events for similar violations...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: missing rules in newrole domain (RHEL5.1)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: print module magic in hex, not decimal on mismatch
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [ANN] segatex-4.00 RPM,SRPM released !!
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: libsepol.expand_terule_helper: duplicate TE rule
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- libsepol.expand_terule_helper: duplicate TE rule
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <jbrindle@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: PATCH: peersid capability support
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- RE: missing rules in newrole domain (RHEL5.1)
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- RE: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: PATCH: peersid capability support
- From: "Todd Miller" <Tmiller@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch] libsemanage: clear errno ENOMEM from libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Paul Moore <paul.moore@xxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- missing rules in newrole domain (RHEL5.1)
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- PATCH: print module magic in hex, not decimal on mismatch
- From: "Todd C. Miller" <tmiller@xxxxxxxxxx>
- RE: Recurring SELinux events for similar violations...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libsemanage: clear errno ENOMEM from libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Recurring SELinux events for similar violations...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC] SELinux policies for source installation
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- RE: Recurring SELinux events for similar violations...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: PATCH: peersid capability support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- PATCH: peersid capability support
- RE: Recurring SELinux events for similar violations...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Initial policy load from load_policy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [patch] libsepol: clarify and reduce neverallow error reporting
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [patch] libsepol: clarify and reduce neverallow error reporting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- RE: newrole polyinstantiation
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- newrole polyinstantiation
- From: "Reed, Tim \(US SSA\)" <tim.reed@xxxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: Add get, set, and cloning of superblock security information
- From: "Eric Paris" <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: refpolicy HEAD, Debian, patch for udev.te
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- file_contexts question
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hijack: update task_alloc_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] mmap: protect from stack expantion into low vm addresses
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3 -v2] mmap: round mmap hint address above mmap_min_addr
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3-v2] security: allow capable check to permit mmap or low vm space
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/3] mmap: protect from stack expantion into low vm addresses
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3-v2] security: allow capable check to permit mmap or low vm space
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3 -v2] mmap: round mmap hint address above mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [patch 1/1] selinux: detect dead booleans
- From: James Morris <jmorris@xxxxxxxxx>
- Re: refpolicy HEAD, Debian, restorecon from udev startup script
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [patch 1/1] selinux: detect dead booleans
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC Patch 9/10] PAM Namespace: no access, no polyinstantiation attempt
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 3/10] PAM Namespace: options when setexeccon not called
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 10/10] PAM Namespace: spec file
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 1/10] PAM Namespace: make polyinstantiated directories module
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 7/10] PAM Namespace: different pam users
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 2/10] PAM Namespace: expand $HOME
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 5/10] PAM Namespace: enable polyinstantiation of directories with spaces in name
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 4/10] PAM Namespace: shared polyinstantiated directories
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 8/10] PAM Namespace: configurable running on init script
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- [RFC Patch 6/10] PAM Namespace: ignore directory if user excluded
- From: "Xavier Toth" <txtoth@xxxxxxxxx>
- refpolicy HEAD, Debian, patch for udev.te
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: semodule -i postgresql.pp fails on F8
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: semodule -i postgresql.pp fails on F8
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [ANN]segatex-4.00 released !
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- semodule -i postgresql.pp fails on F8
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- refpolicy HEAD, Debian, restorecon from udev startup script
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- reference policy: init_system_domain(setfiles_t,setfiles_exec_t) duplicity
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [PATCH 1/1] semanage_select_store fun
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] semanage_select_store fun
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] semanage_select_store fun
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: plz Help! SELinux Re-enabled from disabled mode, CentOS 5 won't startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] semanage_select_store fun
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- plz Help! SELinux Re-enabled from disabled mode, CentOS 5 won't startup
- From: "joe shoemaker" <joemystery123@xxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Problems with Labeled IPsec, IKE and ECN
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/1] semanage_select_store fun
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Problems with Labeled IPsec, IKE and ECN
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: Eric Paris <eparis@xxxxxxxxxx>
- [patch] libselinux: dlopen libsepol.so.1 rather than libsepol.so
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: files contexts override via policy module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 13/13] NFSD: Label change notification for NFSv4 Server
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 08/13] NFS: Introduce lifecycle managment for label attribute.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 13/13] NFSD: Label change notification for NFSv4 Server
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Problems with Labeled IPsec, IKE and ECN
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: selinux problem or not???
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trouble with mounted /home
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 08/13] NFS: Introduce lifecycle managment for label attribute.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/13] Security: Add hook to get full security xattr name
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [DSE-Dev] [martin@xxxxxxxxxxxxxx: /selinux getattr messages]
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: [DSE-Dev] [martin@xxxxxxxxxxxxxx: /selinux getattr messages]
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 09/13] NFS: Client implementation of SELINUX Labeling
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Labeled-nfs] [PATCH 08/13] NFS: Introduce lifecycle managment for label attribute.
- From: James Morris <jmorris@xxxxxxxxx>
- ANN: SELinux Policy Editor 2.2.0
- From: Yuichi Nakamura <ynakam@xxxxxxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: "semanage login -l" is working on F8?
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Re: "semanage login -l" is working on F8?
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- "semanage login -l" is working on F8?
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- selinux problem or not???
- From: "Clarkson, Mike R \(US SSA\)" <mike.clarkson@xxxxxxxxxxxxxx>
- Re: [PATCH 03/13] Security: Add hook to get full security xattr name
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: return EOPNOTSUPP not ENOTSUPP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Trouble with mounted /home
- From: Hal <hal_bg@xxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] mmap: round mmap hint address above mmap_min_addr
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/3] mmap: round mmap hint address above mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] mmap: round mmap hint address above mmap_min_addr
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] SELinux: return EOPNOTSUPP not ENOTSUPP
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC Labeled NFS] Labeling support for NFSv4
- From: Peter Staubach <staubach@xxxxxxxxxx>
- [PATCH 3/3] security: allow capable check to permit mmap or low vm space
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 1/3] mmap: protect from stack expantion into low vm addresses
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] mmap: round mmap hint address above mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 13/13] NFSD: Label change notification for NFSv4 Server
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 12/13] NFS: Label change notification for NFSv4 Clients
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 11/13] NFSD: Server implementation of MAC Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 10/13] NFS: Extend nfs xattr handlers to accept the security namespace
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 09/13] NFS: Client implementation of SELINUX Labeling
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 08/13] NFS: Introduce lifecycle managment for label attribute.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 07/13] NFSv4: Add label recommended attribute and NFSv4 flags
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 06/13] KConfig: Add KConfig entries for SELinux labeled NFS
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 05/13] Security: Add hook to calculate context based on a negative dentry.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 04/13] VFS: Add label field to the iattr structure
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 03/13] Security: Add hook to get full security xattr name
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 02/13] VFS: Reorder vfs_getxattr to avoid unnecessary calls to the LSM
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [RFC Labeled NFS] Labeling support for NFSv4
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH 01/13] VFS/Security: Rework inode_getsecurity and callers to return resulting buffer
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: Trouble with mounted /home
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fix fixfiles handling of arguments
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Fix fixfiles handling of arguments
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [DSE-Dev] [martin@xxxxxxxxxxxxxx: /selinux getattr messages]
- From: Erich Schubert <erich@xxxxxxxxxx>
- Re: [DSE-Dev] [martin@xxxxxxxxxxxxxx: /selinux getattr messages]
- From: linio@xxxxxxxxx (Litwiniec Robert)
- Re: [DSE-Dev] [martin@xxxxxxxxxxxxxx: /selinux getattr messages]
- From: Erich Schubert <erich@xxxxxxxxxx>
- [martin@xxxxxxxxxxxxxx: [DSE-Dev] /selinux getattr messages]
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Trouble with mounted /home
- From: Hal <hal_bg@xxxxxxxxx>
- Re: [Fwd: type class key]
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libselinux: lazily compile regexes to reduce overhead of matchpathcon / selabel_lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libselinux: lazily compile regexes to reduce overhead of matchpathcon / selabel_lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v7 02/13] NetLabel: cleanup the LSM domain hash functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH v7 09/13] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 13/13] NetLabel: add auditing to the static labeling mechanism
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 00/13] Labeled networking patches for 2.6.25
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 04/13] NetLabel: Add secid token support to the NetLabel secattr struct
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 05/13] SELinux: add secctx_to_secid() LSM hook
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 07/13] SELinux: Add a capabilities bitmap to SELinux policy version 22
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 10/13] SELinux: Enable dynamic enable/disable of the network access checks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 01/13] NetLabel: remove unneeded RCU read locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 12/13] NetLabel: introduce static network labels for unlabeled connections
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 06/13] NetLabel: add IP address family information to the netlbl_skbuff_getattr() function
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 08/13] SELinux: Add new peer permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 03/13] NetLabel: consolidate the LSM domain mapping/hashing locks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v7 11/13] SELinux: allow NetLabel to directly cache SIDs
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: Kernel oops on fc6 with non-mls policy
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Kernel oops on fc6 with non-mls policy
- From: "Brian M. Williams" <bwilliams@xxxxxxxxxx>
- Re: Apache problem with Selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: duplicit fc on Debian for /lib/usb/devices
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [Fwd: type class key]
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: allow statement OK?
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to allow semanage to set boolean values and translate booleans via policy.xml
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- duplicit fc on Debian for /lib/usb/devices
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- Re: Patch to allow semanage to set boolean values and translate booleans via policy.xml
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- segatex_suite-2.3-forF7 released!!
- From: "Shintaro Fujiwara" <shintaro.fujiwara@xxxxxxxxx>
- Apache problem with Selinux
- Re: Boot Errors
- From: Lisa Raykowski <lisaraykow@xxxxxxx>
- Re: pcscd and serial readers
- From: Steven Harp <steven.harp@xxxxxxxxxxxxxxxxx>
- [PATCH v2] Initial policy load from load_policy
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: pcscd and serial readers
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Boot Errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Initial policy load from load_policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Initial policy load from load_policy
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- pcscd and serial readers
- From: Steven Harp <steven.harp@xxxxxxxxxxxxxxxxx>
- Re: is the string "<<none>>" in a header anywhere?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: is the string "<<none>>" in a header anywhere?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: should GNU install call matchpathcon by default?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Re: [RFC PATCH v6 09/13] SELinux: Better integration between peer labeling subsystems
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v6 08/13] SELinux: Add new peer permissions to the Flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Patch to allow semanage to set boolean values and translate booleans via policy.xml
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Debian Etch Documentation
- From: Václav Ovsík <vaclav.ovsik@xxxx>
- is the string "<<none>>" in a header anywhere?
- From: Jim Meyering <jim@xxxxxxxxxxxx>
- Debian Etch Documentation
- From: Lisa Raykowski <lisaraykow@xxxxxxx>
- Re: [RFC PATCH v6 09/13] SELinux: Better integration between peer labeling subsystems
- From: James Morris <jmorris@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]