Top NSA Banner
Skip All Menus
Skip Top Menu
Top Navigation Menus
Skip Research Menus
Research Menu
Research
Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
Skip Search Box
Searchbox
SELinux Mailing List
442 messages
:
Starting
Sat 1 Dec 2007 - 03:15:25 EST,
Ending
Mon 31 Dec 2007 - 12:02:59 EST
sort by
: [
thread
] [
author
] [ date ] [
subject
]
Other periods
:[
Previous, Date view
] [
Next, Date view
] [
List of Folders
]
Nearby
: [
About this archive
]
Monday, 31 December
Re: Rawhide kernel is reporting
Eric Paris
Re: Kernel panic when using refpolicy
Eric Paris
Re: Rawhide kernel is reporting
Eric Paris
Rawhide kernel is reporting
Daniel J Walsh
RE: newrole in the background
Reed, Tim \(US SSA\)
Saturday, 29 December
RE: Kernel panic when using refpolicy
Jeremiah Jahn
Man pages translation (Russian) policycoreutils and reference policy
Andrey Markelov
Friday, 28 December
mls policy dbus patch
Xavier Toth
Re: X avcs
Xavier Toth
Re: What happened to source for targeted?
James Antill
Re: X avcs
Eamon Walsh
Re: What happened to source for targeted?
Dave Quigley
Re: What happened to source for targeted?
Lance Spitzner
Re: What happened to source for targeted?
Dave Quigley
Re: X avcs
Xavier Toth
Re: What happened to source for targeted?
Lance Spitzner
Re: What happened to source for targeted?
Dave Quigley
What happened to source for targeted?
Lance Spitzner
Thursday, 27 December
Re: MLS sensitivity sensitivity
Peter A. Bigot
Re: MLS sensitivity sensitivity
Ted X Toth
run_init patch for Fedora 8
Peter A. Bigot
MLS sensitivity sensitivity
Peter A. Bigot
Wednesday, 26 December
Re: cant SSH/Console Login and no deny/error messages
Jeremiah Jahn
locallogin patch for Fedora 8
Peter A. Bigot
cant SSH/Console Login and no deny/error messages
Jeremiah Jahn
X avcs
Xavier Toth
Friday, 21 December
[PATCH] REFPOL: Add new object classes and permissions for labeled networking
Paul Moore
Re: [RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
Paul Moore
Re: [RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
Stephen Smalley
Re: [patch 2/2] checkpolicy capability support
Stephen Smalley
[RFC PATCH v9 08/18] SELinux: Convert the netif code to use ifindex values
Paul Moore
[RFC PATCH v9 09/18] SELinux: Only store the network interface's ifindex
Paul Moore
[RFC PATCH v9 11/18] SELinux: Add a capabilities bitmap to SELinux policy version 22
Paul Moore
[RFC PATCH v9 14/18] SELinux: Enable dynamic enable/disable of the network access checks
Paul Moore
[RFC PATCH v9 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
[RFC PATCH v9 13/18] SELinux: Better integration between peer labeling subsystems
Paul Moore
[RFC PATCH v9 15/18] SELinux: Allow NetLabel to directly cache SIDs
Paul Moore
[RFC PATCH v9 12/18] SELinux: Add a new peer class and permissions to the Flask definitions
Paul Moore
[RFC PATCH v9 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Paul Moore
[RFC PATCH v9 16/18] NetLabel: Introduce static network labels for unlabeled connections
Paul Moore
[RFC PATCH v9 17/18] NetLabel: Add auditing to the static labeling mechanism
Paul Moore
Re: PATCH: libsepol should not write policy.18 with mls enabled
Stephen Smalley
[RFC PATCH v9 07/18] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
Paul Moore
[RFC PATCH v9 01/18] NetLabel: Remove unneeded RCU read locks
Paul Moore
[RFC PATCH v9 04/18] NetLabel: Add secid token support to the NetLabel secattr struct
Paul Moore
[RFC PATCH v9 05/18] LSM: Add secctx_to_secid() LSM hook
Paul Moore
[RFC PATCH v9 02/18] NetLabel: Cleanup the LSM domain hash functions
Paul Moore
[RFC PATCH v9 06/18] LSM: Add inet_sys_snd_skb() LSM hook
Paul Moore
[RFC PATCH v9 00/18] Labeled networking patches for 2.6.25 (against 2.6.24-rc6)
Paul Moore
[RFC PATCH v9 03/18] NetLabel: Consolidate the LSM domain mapping/hashing locks
Paul Moore
Re: newrole in the background
Stephen Smalley
Re: newrole in the background
Xavier Toth
Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
Stephen Smalley
Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
Daniel J Walsh
RE: newrole in the background
Stephen Smalley
Re: MLS and dbus-daemon related avcs
Stephen Smalley
Re: MLS and dbus-daemon related avcs
Xavier Toth
Re: I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
Stephen Smalley
Re: [DSE-Dev] refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Erich Schubert
I have been working on a example policy/rpm package to demontrate how to ship SELinux policy in an RPM
Daniel J Walsh
Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Václav Ovsík
Thursday, 20 December
Re: avc: granted null messages
Eamon Walsh
Re: avc: granted null messages
Stephen Smalley
Re: avc: granted null messages
Eamon Walsh
startx
Justin Mattock
Re: MLS and dbus-daemon related avcs
Stephen Smalley
MLS and dbus-daemon related avcs
Xavier Toth
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
David Howells
Re: Getting started with SELinux and Slackware
Stephen Smalley
Re: Getting started with SELinux and Slackware
Martin J. Green
Re: Propper labeling of files under /var/www
Stefan Schulze Frielinghaus
RE: RFC: Per-object manager controls in /selinux/config
Joshua Brindle
Re: RFC: Per-object manager controls in /selinux/config
KaiGai Kohei
Wednesday, 19 December
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
RFC: Per-object manager controls in /selinux/config
Eamon Walsh
Re: Xorg modprobe denials
Martin Orr
Re: MLS newrole avcs and polyinstantiation avcs
Stephen Smalley
Re: Fixes for sepolgen to parse Fedora 9 Policy
Karl MacMillan
MLS newrole avcs and polyinstantiation avcs
Xavier Toth
Re: Fixes for sepolgen to parse Fedora 9 Policy
Daniel J Walsh
Re: avc: granted null messages
Stephen Smalley
Re: avc: granted null messages
Stephen Smalley
Re: acpid.socket
Stephen Smalley
Re: Propper labeling of files under /var/www
Stephen Smalley
Re: Fixes for sepolgen to parse Fedora 9 Policy
Karl MacMillan
Re: Propper labeling of files under /var/www
Daniel J Walsh
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: Propper labeling of files under /var/www
Stephen Smalley
Fixes for sepolgen to parse Fedora 9 Policy
Daniel J Walsh
Re: Propper labeling of files under /var/www
Stefan Schulze Frielinghaus
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Tuesday, 18 December
Re: avc: granted null messages
James Morris
acpid.socket
Justin Mattock
Re: avc: granted null messages
Eamon Walsh
avc: granted null messages
Stephen Smalley
Re: Propper labeling of files under /var/www
Stephen Smalley
Propper labeling of files under /var/www
Stefan Schulze Frielinghaus
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
Re: MLS and default file contexts
Stephen Smalley
MLS and default file contexts
Ted X Toth
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Stephen Smalley
Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Paul Moore
Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
Paul Moore
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
Re: Xorg modprobe denials
Stephen Smalley
Re: Xorg modprobe denials
Stephen Smalley
Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Stephen Smalley
Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
James Morris
Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
James Morris
Monday, 17 December
Re: Xorg modprobe denials
Chris PeBenito
Xorg modprobe denials
Eamon Walsh
Re: [Fwd: f8 X policy]
Xavier Toth
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
Re: [PATCH 09/28] FS-Cache: Release page->private after failed readahead [try #2]
David Howells
Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
David Howells
[Fwd: Re: [Fwd: f8 X policy]]
Ted X Toth
Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Paul Moore
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
Re: [RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
Paul Moore
Re: [RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
Paul Moore
Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
Casey Schaufler
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: [RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Stephen Smalley
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Stephen Smalley
Re: [RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
Stephen Smalley
Re: [RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
Stephen Smalley
Re: [RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
Re: load_policy
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
load_policy
Justin Mattock
RE: newrole in the background
Stephen Smalley
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Christopher J. PeBenito
OLS CfP
James Morris
Sunday, 16 December
Re: [RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
Saturday, 15 December
Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
Xavier Toth
Friday, 14 December
RE: help with an avc denial
Clarkson, Mike R \(US SSA\)
[RFC PATCH v8 18/18] SELinux: Add network ingress and egress control permission checks
Paul Moore
[RFC PATCH v8 11/18] SELinux: Add a capabilities bitmap to SELinux policy version 22
Paul Moore
[RFC PATCH v8 16/18] NetLabel: Introduce static network labels for unlabeled connections
Paul Moore
[RFC PATCH v8 10/18] SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions
Paul Moore
[RFC PATCH v8 13/18] SELinux: Better integration between peer labeling subsystems
Paul Moore
[RFC PATCH v8 04/18] NetLabel: Add secid token support to the NetLabel secattr struct
Paul Moore
[RFC PATCH v8 08/18] SELinux: Convert the netif code to use ifindex values
Paul Moore
[RFC PATCH v8 17/18] NetLabel: Add auditing to the static labeling mechanism
Paul Moore
[RFC PATCH v8 06/18] LSM: Add inet_sys_snd_skb() LSM hook
Paul Moore
[RFC PATCH v8 15/18] SELinux: Allow NetLabel to directly cache SIDs
Paul Moore
[RFC PATCH v8 07/18] NetLabel: Add IP address family information to the netlbl_skbuff_getattr() function
Paul Moore
[RFC PATCH v8 14/18] SELinux: Enable dynamic enable/disable of the network access checks
Paul Moore
[RFC PATCH v8 05/18] LSM: Add secctx_to_secid() LSM hook
Paul Moore
[RFC PATCH v8 03/18] NetLabel: Consolidate the LSM domain mapping/hashing locks
Paul Moore
[RFC PATCH v8 00/18] Update to the labeled networking patches for 2.6.25
Paul Moore
[RFC PATCH v8 01/18] NetLabel: Remove unneeded RCU read locks
Paul Moore
[RFC PATCH v8 09/18] SELinux: Only store the network interface's ifindex
Paul Moore
[RFC PATCH v8 12/18] SELinux: Add new peer permissions to the Flask definitions
Paul Moore
[RFC PATCH v8 02/18] NetLabel: Cleanup the LSM domain hash functions
Paul Moore
Re: help with an avc denial
Stephen Smalley
Re: help with an avc denial
Stephen Smalley
Re: Network flow controls and subj/obj ordering
Stephen Smalley
help with an avc denial
Clarkson, Mike R \(US SSA\)
Re: Network flow controls and subj/obj ordering
Christopher J. PeBenito
Re: Network flow controls and subj/obj ordering
Paul Moore
Re: Network flow controls and subj/obj ordering
Stephen Smalley
Re: Network flow controls and subj/obj ordering
Christopher J. PeBenito
Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
Christopher J. PeBenito
ANN: Reference Policy Release
Christopher J. PeBenito
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Václav Ovsík
Thursday, 13 December
This patch adds the xgues and guest users
Daniel J Walsh
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
RE: newrole in the background
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: Network flow controls and subj/obj ordering
Paul Moore
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: newrole in the background
Stephen Smalley
Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
Xavier Toth
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Addition of policykit polcy along with changes to hal
Daniel J Walsh
Here is a snapshot of changes to file contexts in my pool
Daniel J Walsh
Re: newrole in the background
Xavier Toth
Patches to files in the kernel policy directory
Daniel J Walsh
RE: newrole in the background
Stephen Smalley
Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
Christopher J. PeBenito
Re: Network flow controls and subj/obj ordering
Christopher J. PeBenito
Re: [PATCH] IPsec SPD default security context (Re: security context for SPD entries of labeled IPsec)
Ted X Toth
ANN: SELinux Policy IDE (SLIDE) version 1.3
Dave Sugar
How to set other process quota by setrlimit
Ian jonhson
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Wednesday, 12 December
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
RE: newrole in the background
Stephen Smalley
Re: newrole in the background
Ted X Toth
Re: Network flow controls and subj/obj ordering
Paul Moore
Re: PATCH: libsepol should not write policy.18 with mls enabled
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: Network flow controls and subj/obj ordering
Paul Moore
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Joy Latten
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
RE: PATCH: libsepol should not write policy.18 with mls enabled
Todd Miller
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
RE: PATCH: libsepol should not write policy.18 with mls enabled
Todd Miller
RE: PATCH: libsepol should not write policy.18 with mls enabled
Todd Miller
Re: PATCH: libsepol should not write policy.18 with mls enabled
Joshua Brindle
RE: newrole in the background
Reed, Tim \(US SSA\)
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: [LTP] Se-Linux Updates for LTP
Stephen Smalley
Re: refpolicy HEAD, patch for Debian logs of syslog rotation
Christopher J. PeBenito
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: Some file context for kernel and systems directory.
Christopher J. PeBenito
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Serge E. Hallyn
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: PATCH: libsepol should not write policy.18 with mls enabled
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Karl MacMillan
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Karl MacMillan
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Tuesday, 11 December
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
PATCH: libsepol should not write policy.18 with mls enabled
Todd C. Miller
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH] Debian refpolicy-trunk xen
Christopher J. PeBenito
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: Network flow controls and subj/obj ordering
Christopher J. PeBenito
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Stephen Smalley
Re: [PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
[PATCH] [STABLE] Makefile change to disable restorecond
Joshua Brindle
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: newrole in the background
Stephen Smalley
Re: Network flow controls and subj/obj ordering
Casey Schaufler
Re: [PATCH v2] XFRM: assorted IPsec fixups
Paul Moore
Re: [PATCH v2] XFRM: assorted IPsec fixups
Paul Moore
Network flow controls and subj/obj ordering
Paul Moore
[PATCH v2] XFRM: assorted IPsec fixups
Paul Moore
Re: newrole in the background
Xavier Toth
Re: [LTP] Se-Linux Updates for LTP
Serge E. Hallyn
newrole in the background
Reed, Tim \(US SSA\)
refpolicy HEAD, patch for Debian logs of syslog rotation
Václav Ovsík
Re: [LTP] Se-Linux Updates for LTP
Subrata Modak
Re: [PATCH] XFRM: assorted IPsec fixups
Paul Moore
Monday, 10 December
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Casey Schaufler
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
[POLICYREP] Add tunable support
Todd C. Miller
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: [LTP] Se-Linux Updates for LTP
Serge E. Hallyn
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
Stephen Smalley
Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
Daniel J Walsh
Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
Xavier Toth
Re: system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
Stephen Smalley
Re: Se-Linux Updates for LTP
Stephen Smalley
Re: Se-Linux Updates for LTP
Subrata Modak
Sunday, 9 December
Re: MLS Security Levels
Ted X Toth
Saturday, 8 December
system_u:system_r:system_chkpwd_t:UNCLASSIFIED, how did I get here?
Ted X Toth
[PATCH] Debian refpolicy-trunk xen
Litwiniec Robert
Re: [patch 0/2] policy capability support
Daniel J Walsh
Friday, 7 December
Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
David Howells
Re: [patch 0/2] policy capability support
Stephen Smalley
Re: [patch 0/2] policy capability support
Joshua Brindle
Re: [patch 0/2] policy capability support
Daniel J Walsh
Re: [PATCH] XFRM: assorted IPsec fixups
Paul Moore
Re: [PATCH] XFRM: assorted IPsec fixups
Eric Paris
Re: policycoreutils patch
Stephen Smalley
RE: Man page fix for matchpatchcon
Stephen Smalley
Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
Serge E. Hallyn
[PATCH] XFRM: assorted IPsec fixups
Paul Moore
Re: [patch 0/2] policy capability support
Stephen Smalley
Se-Linux Updates for LTP
Subrata Modak
Re: Patch to update boolean descriptions to match what I had in policycoreutils.
Daniel J Walsh
Re: Patch to update boolean descriptions to match what I had inpolicycoreutils.
Christopher J. PeBenito
[RFC Patch v2 1/10] PAM Namespace: make polyinstantiated directories module
Xavier Toth
Re: [patch 0/2] policy capability support
Joshua Brindle
Thursday, 6 December
[patch 0/2] policy capability support
tmiller_at_tresys.com
[patch 2/2] checkpolicy capability support
tmiller_at_tresys.com
[patch 1/2] library policy capability support
tmiller_at_tresys.com
Re: [patch 0/2] policy capability support
Stephen Smalley
RE: [patch 0/2] policy capability support
Stephen Smalley
Re: [patch 0/2] policy capability support
Joshua Brindle
RE: Man page fix for matchpatchcon
Todd Miller
Some file context for kernel and systems directory.
Daniel J Walsh
RE: [patch 0/2] policy capability support
Todd Miller
kismet policy
Daniel J Walsh
RE: [patch 0/2] policy capability support
Stephen Smalley
RE: [patch 0/2] policy capability support
Stephen Smalley
Patch to update boolean descriptions to match what I had in policycoreutils.
Daniel J Walsh
Re: [patch 0/2] policy capability support
Paul Moore
Re: More nsswitch changes.
Christopher J. PeBenito
policycoreutils patch
Daniel J Walsh
RE: [patch 0/2] policy capability support
Christopher J. PeBenito
Man page fix for matchpatchcon
Daniel J Walsh
Re: More nsswitch changes.
Daniel J Walsh
Re: [patch 0/2] policy capability support
Stephen Smalley
RE: [patch 0/2] policy capability support
Stephen Smalley
Re: [patch 0/2] policy capability support
Joshua Brindle
Re: More nsswitch changes.
Christopher J. PeBenito
RE: [patch 0/2] policy capability support
Christopher J. PeBenito
Re: [patch 0/2] policy capability support
Stephen Smalley
Re: refpolicy HEAD, Debian, syslogd & setrlimit
Daniel J Walsh
Boolean/RPM data in policy
Daniel J Walsh
Re: refpolicy HEAD, Debian, syslogd & setrlimit
Christopher J. PeBenito
Wednesday, 5 December
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Casey Schaufler
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
David Howells
RE: [patch 0/2] policy capability support
Todd Miller
Re: [patch 0/2] policy capability support
Joshua Brindle
Re: [patch 0/2] policy capability support
Stephen Smalley
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Stephen Smalley
Re: [patch 0/2] policy capability support
Joshua Brindle
Re: [patch 0/2] policy capability support
Stephen Smalley
Re: [patch 0/2] policy capability support
Joshua Brindle
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Casey Schaufler
RE: [patch 0/2] policy capability support
Stephen Smalley
[PATCH 28/28] FS-Cache: Make kAFS use FS-Cache [try #2]
David Howells
[PATCH 25/28] AFS: Improve handling of a rejected writeback [try #2]
David Howells
[PATCH 27/28] AFS: Implement shared-writable mmap [try #2]
David Howells
[PATCH 26/28] AF_RXRPC: Save the operation ID for debugging [try #2]
David Howells
[PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
[PATCH 23/28] AFS: Add TestSetPageError() [try #2]
David Howells
[PATCH 22/28] fcrypt endianness misannotations [try #2]
David Howells
[PATCH 13/28] CacheFiles: Add missing copy_page export for ia64 [try #2]
David Howells
[PATCH 21/28] NFS: Display local caching state [try #2]
David Howells
[PATCH 20/28] NFS: Configuration and mount option changes to enable local caching on NFS [try #2]
David Howells
[PATCH 19/28] NFS: Use local caching [try #2]
David Howells
[PATCH 15/28] CacheFiles: Add a hook to write a single page of data to an inode [try #2]
David Howells
[PATCH 17/28] CacheFiles: Export things for CacheFiles [try #2]
David Howells
[PATCH 14/28] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [try #2]
David Howells
[PATCH 16/28] CacheFiles: Permit the page lock state to be monitored [try #2]
David Howells
[PATCH 11/28] FS-Cache: Provide an add_wait_queue_tail() function [try #2]
David Howells
[PATCH 07/28] SECURITY: De-embed task security record from task and use refcounting [try #2]
David Howells
[PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]
David Howells
[PATCH 09/28] FS-Cache: Release page->private after failed readahead [try #2]
David Howells
[PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
David Howells
[PATCH 05/28] Security: Change current->fs[ug]id to current_fs[ug]id() [try #2]
David Howells
[PATCH 03/28] KEYS: Allow the callout data to be passed as a blob rather than a string [try #2]
David Howells
[PATCH 04/28] KEYS: Add keyctl function to get a security label [try #2]
David Howells
[PATCH 01/28] KEYS: Increase the payload size when instantiating a key [try #2]
David Howells
[PATCH 02/28] KEYS: Check starting keyring as part of search [try #2]
David Howells
[PATCH 00/28] Permit filesystem local caching [try #2]
David Howells
[PATCH 1/7] KEYS: Increase the payload size when instantiating a key
David Howells
[PATCH 7/7] SECURITY: De-embed task security record from task and use refcounting
David Howells
[PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
David Howells
[PATCH 4/7] KEYS: Add keyctl function to get a security label
David Howells
[PATCH 3/7] KEYS: Allow the callout data to be passed as a blob rather than a string
David Howells
[PATCH 2/7] KEYS: Check starting keyring as part of search
David Howells
[PATCH 0/7] Permit filesystem local caching
David Howells
RE: [patch 0/2] policy capability support
Todd Miller
Re: [patch 0/2] policy capability support
Paul Moore
[patch 0/2] policy capability support
tmiller_at_tresys.com
[patch 2/2] checkpolicy capability support
tmiller_at_tresys.com
[patch 1/2] library policy capability support
tmiller_at_tresys.com
RE: PATCH: peersid capability support
Todd Miller
Re: PATCH: peersid capability support
Stephen Smalley
RE: Effect of changing SELinux package versions...
Stephen Smalley
RE: Effect of changing SELinux package versions...
Hasan Rezaul-CHR010
Re: [PATCH 1/1] semanage_select_store fun
Stephen Smalley
Re: libsemanage patch
Stephen Smalley
refpolicy HEAD, Debian, syslogd & setrlimit
Václav Ovsík
Re: libsepol.expand_terule_helper: duplicate TE rule
Shintaro Fujiwara
Tuesday, 4 December
Re: libsepol.expand_terule_helper: duplicate TE rule
Daniel J Walsh
Re: libsepol.expand_terule_helper: duplicate TE rule
Shintaro Fujiwara
Re: PATCH: peersid capability support
Stephen Smalley
Re: PATCH: audit format mismatch for inode number
Stephen Smalley
Re: PATCH: peersid capability support
Paul Moore
Re: Interface for DOI mapping
Casey Schaufler
PATCH: audit format mismatch for inode number
Todd C. Miller
Re: Interface for DOI mapping
Paul Moore
More nsswitch changes.
Daniel J Walsh
Re: Interface for DOI mapping
Casey Schaufler
Re: refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Christopher J. PeBenito
Re: Many confined domains are calling getpw calls.
Christopher J. PeBenito
Re: libsepol.expand_terule_helper: duplicate TE rule
Daniel J Walsh
Re: refpolicy HEAD, Debian, patch for udev.te
Daniel J Walsh
refpolicy HEAD, Debian, ioctl on xconsole by syslogd
Václav Ovsík
Re: refpolicy HEAD, Debian, patch for udev.te
Martin Orr
Monday, 3 December
Re: Interface for DOI mapping
Paul Moore
Re: libsepol.expand_terule_helper: duplicate TE rule
Shintaro Fujiwara
Re: libsemanage patch
Daniel J Walsh
Interface for DOI mapping
Dave Quigley
RE: [patch] libsepol: clarify and reduce neverallow error reporting
Brian M. Williams
RE: [patch] libsepol: clarify and reduce neverallow error reporting
Stephen Smalley
RE: [patch] libsepol: clarify and reduce neverallow error reporting
Brian M. Williams
Re: libsemanage patch
Daniel J Walsh
RE: libsemanage patch
Todd Miller
RE: libsemanage patch
Stephen Smalley
RE: libsemanage patch
Todd Miller
Re: PATCH: peersid capability support
Todd C. Miller
Many confined domains are calling getpw calls.
Daniel J Walsh
libsemanage patch
Daniel J Walsh
Re: PATCH: peersid capability support
Stephen Smalley
Re: PATCH: peersid capability support
Paul Moore
Re: PATCH: peersid capability support
Christopher J. PeBenito
RE: missing rules in newrole domain (RHEL5.1)
Christopher J. PeBenito
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: libsepol.expand_terule_helper: duplicate TE rule
Christopher J. PeBenito
Sunday, 2 December
[ANN] segatex-4.00 RPM,SRPM released !!
Shintaro Fujiwara
Saturday, 1 December
Re: refpolicy HEAD, Debian, patch for udev.te
Chris PeBenito
Re: libsepol.expand_terule_helper: duplicate TE rule
Shintaro Fujiwara
Re: libsepol.expand_terule_helper: duplicate TE rule
Chris PeBenito
libsepol.expand_terule_helper: duplicate TE rule
Shintaro Fujiwara
Last message date
:
Mon 31 Dec 2007 - 12:02:59 EST
Archived on
: Wed 3 Dec 2008 - 08:23:32 EST
442 messages
sort by
: [
thread
] [
author
] [ date ] [
subject
]
Other periods
:[
Previous, Date view
] [
Next, Date view
] [
List of Folders
]
Nearby
: [
About this archive
]
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009