Top NSA Banner
Skip All Menus
Skip Top Menu
Top Navigation Menus
Skip Research Menus
Research Menu
Research
Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
Skip Search Box
Searchbox
SELinux Mailing List
519 messages
:
Starting
Sat 1 Mar 2008 - 09:54:57 EST,
Ending
Mon 31 Mar 2008 - 20:42:40 EDT
sort by
: [
thread
] [
author
] [ date ] [
subject
]
Other periods
:[
Previous, Date view
] [
Next, Date view
] [
List of Folders
]
Nearby
: [
About this archive
]
Monday, 31 March
Re: copy&paste security_compute_av from python
Eamon Walsh
SSH + file_contexts + kerberos
Karrels, Jeffrey J \(US SSA\)
Re: [RFC] SELinux: display mount options in /proc/mounts
Eric Paris
Re: [RFC] SELinux: display mount options in /proc/mounts
Stephen Smalley
[RFC] SELinux: display mount options in /proc/mounts
Eric Paris
Re: RBAC in RHEL5
Takesi satoh
Re: doc typo fix: s/behaviors/behavior/
Stephen Smalley
Re: Things were going great until...
Stephen Smalley
Re: file(1)
Stephen Smalley
Re: RBAC in RHEL5
Christopher J. PeBenito
Re: file(1)
Stephen Smalley
Re: Bug#472590: ls in Debian/Unstable
Jim Meyering
Re: Bug#472590: ls in Debian/Unstable
Russell Coker
Re: Bug#472590: ls in Debian/Unstable
Jim Meyering
Sunday, 30 March
Re: [PATCH-v4] SELinux: introduce permissive types
James Morris
RBAC in RHEL5
Takesi satoh
Re: Login Identities not applied when logging in...
Martin Orr
Re: Login Identities not applied when logging in...
Daniel J Walsh
Saturday, 29 March
Login Identities not applied when logging in...
Lisa R.
doc typo fix: s/behaviors/behavior/
Jim Meyering
RE: file(1)
Joshua Brindle
Things were going great until...
Lisa R.
Friday, 28 March
Re: file(1)
Russell Coker
RE: file(1)
Joshua Brindle
Re: file(1)
Russell Coker
Re: Debian SE Linux status
Russell Coker
RE: file(1)
Joshua Brindle
Re: file(1)
Russell Coker
Re: Debian SE Linux status
Joshua Brindle
Re: Debian SE Linux status
Russell Coker
[PATCH 09/45] Security: Change current->fs[ug]id to current_fs[ug]id() [ver #35]
David Howells
Re: policy package names for Debian
Russell Coker
RE: file(1)
Joshua Brindle
Re: policy package names for Debian
Stephen Smalley
Re: Debian SE Linux status
Stephen Smalley
[PATCH 11/45] Security: De-embed task security record from task and use refcounting [ver #35]
David Howells
[PATCH 05/45] KEYS: Don't generate user and user session keyrings unless they're accessed [ver #35]
David Howells
[PATCH 00/45] Permit filesystem local caching [ver #35]
David Howells
[PATCH 08/45] KEYS: Add keyctl function to get a security label [ver #35]
David Howells
[PATCH 06/45] KEYS: Make the keyring quotas controllable through /proc/sys [ver #35]
David Howells
[PATCH 28/45] FS-Cache: Make kAFS use FS-Cache [ver #35]
David Howells
[PATCH 04/45] KEYS: Allow clients to set key perms in key_create_or_update() [ver #35]
David Howells
[PATCH 19/45] Add missing consts to xattr function arguments [ver #35]
David Howells
[PATCH 13/45] Security: Allow kernel services to override LSM settings for task actions [ver #35]
David Howells
[PATCH 36/45] NFS: Use local disk inode cache [ver #35]
David Howells
[PATCH 16/45] FS-Cache: Recruit a couple of page flags for cache management [ver #35]
David Howells
[PATCH 34/45] NFS: Define and create superblock-level objects [ver #35]
David Howells
[PATCH 14/45] Security: Make NFSD work with detached security [ver #35]
David Howells
[PATCH 42/45] NFS: Read pages from FS-Cache into an NFS inode [ver #35]
David Howells
[PATCH 39/45] NFS: FS-Cache page management [ver #35]
David Howells
[PATCH 22/45] CacheFiles: Add a hook to write a single page of data to an inode [ver #35]
David Howells
[PATCH 35/45] NFS: Define and create inode-level cache objects [ver #35]
David Howells
[PATCH 32/45] NFS: Register NFS for caching and retrieve the top-level index [ver #35]
David Howells
[PATCH 12/45] Security: Add a kernel_service object class to SELinux [ver #35]
David Howells
[PATCH 29/45] NFS: Add comment banners to some NFS functions [ver #35]
David Howells
[PATCH 37/45] NFS: Invalidate FsCache page flags when cache removed [ver #35]
David Howells
[PATCH 23/45] CacheFiles: Permit the page lock state to be monitored [ver #35]
David Howells
[PATCH 27/45] AFS: prevent double cell registration [ver #35]
David Howells
[PATCH 24/45] CacheFiles: Export things for CacheFiles [ver #35]
David Howells
[PATCH 30/45] NFS: Add FS-Cache option bit and debug bit [ver #35]
David Howells
[PATCH 20/45] CacheFiles: Add missing copy_page export for ia64 [ver #35]
David Howells
[PATCH 31/45] NFS: Permit local filesystem caching to be enabled for NFS [ver #35]
David Howells
[PATCH 26/45] AFS: Add a MAINTAINERS record for AFS [ver #35]
David Howells
Re: policy package names for Debian
Christopher J. PeBenito
[PATCH 41/45] NFS: nfs_readpage_async() needs to be accessible as a fallback for local caching [ver #35]
David Howells
Re: Debian SE Linux status
James Carter
[PATCH 45/45] NFS: Add mount options to enable local caching on NFS [ver #35]
David Howells
[PATCH 33/45] NFS: Define and create server-level objects [ver #35]
David Howells
[PATCH 44/45] NFS: Display local caching state [ver #35]
David Howells
[PATCH 40/45] NFS: Add read context retention for FS-Cache to call back with [ver #35]
David Howells
[PATCH 43/45] NFS: Store pages from an NFS inode into a local cache [ver #35]
David Howells
[PATCH 02/45] KEYS: Check starting keyring as part of search [ver #35]
David Howells
[PATCH 07/45] KEYS: Make key_serial() a function if CONFIG_KEYS=y [ver #35]
David Howells
[PATCH 38/45] NFS: Add some new I/O counters for FS-Cache doing things for NFS [ver #35]
David Howells
[PATCH 03/45] KEYS: Allow the callout data to be passed as a blob rather than a string [ver #35]
David Howells
[PATCH 15/45] FS-Cache: Release page->private after failed readahead [ver #35]
David Howells
[PATCH 21/45] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [ver #35]
David Howells
[PATCH 17/45] FS-Cache: Provide an add_wait_queue_tail() function [ver #35]
David Howells
[PATCH 01/45] KEYS: Increase the payload size when instantiating a key [ver #35]
David Howells
Re: policy package names for Debian
Stephen Smalley
Re: Debian SE Linux status
Stephen Smalley
Re: policy package names for Debian
Christopher J. PeBenito
Re: [PATCH-v4] SELinux: introduce permissive types
Stephen Smalley
Re: Debian SE Linux status
James Carter
Re: file(1)
Stephen Smalley
Re: Debian SE Linux status
Stephen Smalley
Re: Debian SE Linux status
Joshua Brindle
Re: Debian SE Linux status
Stephen Smalley
Re: policy package names for Debian
Stephen Smalley
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
KaiGai Kohei
Thursday, 27 March
policy package names for Debian
Russell Coker
Debian SE Linux status
Russell Coker
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Daniel J Walsh
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Daniel J Walsh
Re: Permissive mode for xace is broken.
Eamon Walsh
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
KaiGai Kohei
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
Christopher J. PeBenito
file(1)
Russell Coker
[refpolicy] lvm runs shell scripts
Martin Orr
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Russell Coker
Wednesday, 26 March
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Martin Orr
Re: SELinux policy for Fedora Directory Server 1.1.0
Pär Aronsson
Testing SELinux in Ubuntu (Hardy Heron)
Caleb Case
Re: refpolicy: patch for gpg-agent
Christopher J. PeBenito
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Christopher J. PeBenito
Re: USER_AVC vs USER_MAC_POLICY_LOAD ?
Steve Grubb
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: USER_AVC vs USER_MAC_POLICY_LOAD ?
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
USER_AVC vs USER_MAC_POLICY_LOAD ?
Steve Grubb
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Daniel J Walsh
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Daniel J Walsh
Re: Bug#472590: ls in Debian/Unstable
Russell Coker
Tuesday, 25 March
Re: Bug#472590: ls in Debian/Unstable
Russell Coker
Re: ls in Debian/Unstable
Russell Coker
Re: Bug#472590: ls in Debian/Unstable
Jim Meyering
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Add missing consts to xattr function arguments
David Howells
avc's
Justin Mattock
Re: ls in Debian/Unstable
Jim Meyering
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: avc's
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
avc's
Justin Mattock
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
Christopher J. PeBenito
Re: ls in Debian/Unstable
Casey Schaufler
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Christopher J. PeBenito
ls in Debian/Unstable
Russell Coker
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
KaiGai Kohei
Re: Removing DAC.
Russell Coker
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Russell Coker
Monday, 24 March
Re: [Fwd: Re: Removing DAC.]
Casey Schaufler
Re: Removing DAC.
Russell Coker
Re: Permissive mode for xace is broken.
Steve Grubb
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [RFC][PATCH] user_transition support for libsepol/checkpolicy
Stephen Smalley
Re: [PATCH] libsepol: add permissive domain support
Stephen Smalley
Re: [PATCH] checkpolicy: support for permissive types
Stephen Smalley
Re: Permissive mode for xace is broken.
Stephen Smalley
[RFC][PATCH] user_transition support for libsepol/checkpolicy
Joshua Brindle
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
Christopher J. PeBenito
Re: Removing DAC.
Casey Schaufler
Re: Removing DAC.
Casey Schaufler
Re: Removing DAC.
cinthya aranguren
Re: Removing DAC.
Stephen Smalley
Re: Permissive mode for xace is broken.
Steve G
Re: Removing DAC.
cinthya aranguren
Re: Removing DAC.
cinthya aranguren
[PATCH] checkpolicy: support for permissive types
Eric Paris
[PATCH] libsepol: add permissive domain support
Eric Paris
Re: Removing DAC.
Stephen Smalley
Re: Removing DAC.
Joshua Brindle
Re: problem when running checkmodule
Stephen Smalley
Re: /bin/passwd and a basic MLS install of Fedora 8
Stephen Smalley
Re: /bin/passwd and a basic MLS install of Fedora 8
Russell Coker
Sunday, 23 March
Re: Removing DAC.
Russell Coker
Re: Removing DAC.
Casey Schaufler
Re: Removing DAC.
Casey Schaufler
Removing DAC.
cinthya aranguren
/bin/passwd and a basic MLS install of Fedora 8
Russell Coker
Re: Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
David Howells
Re: Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
Valdis.Kletnieks_at_vt.edu
Friday, 21 March
problem when running checkmodule
kihamba nengo
Re: refpolicy: patch for gpg-agent
Václav Ovsík
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Václav Ovsík
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
KaiGai Kohei
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
KaiGai Kohei
Thursday, 20 March
Re: [PATCH-v4] SELinux: introduce permissive types
Eric Paris
Re: [PATCH-v4] SELinux: introduce permissive types
Stephen Smalley
Re: [PATCH-v4] SELinux: introduce permissive types
Eric Paris
Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
Paul Moore
Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
Christopher J. PeBenito
Wednesday, 19 March
Re: Permissive mode for xace is broken.
Eamon Walsh
Re: selection labeling
Eamon Walsh
Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
Paul Moore
Performance degradation measurement [was Re: [PATCH 06/37] Security: Separate task security context from task_struct [ver #34]]
David Howells
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
James Morris
Re: unix_domain_sockets in mls
Stephen Smalley
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
Stephen Smalley
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
Casey Schaufler
Re: unix_domain_sockets in mls
B Topscher
Re: [PATCH] SE-PostgreSQL Security Policy (try #3)
Christopher J. PeBenito
Re: unix_domain_sockets in mls
Stephen Smalley
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
Stephen Smalley
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
James Morris
Re: [RFC]Introduce generalized hooks for getting and setting inode secctx v3
Casey Schaufler
unix_domain_sockets in mls
B Topscher
Re: [PATCH 1/5] REFPOL: Add new labeled networking permissions
Christopher J. PeBenito
[patch] libselinux: don't warn about failed selinuxfs mount if selinux disabled
Stephen Smalley
Re: selection labeling
Christopher J. PeBenito
Tuesday, 18 March
Re: Audit2allow/audit2why patch for policycoreutils.
Stephen Smalley
Re: policycoreutils semanage --proto --protocol inconsistent flags
Stephen Smalley
Re: selection labeling
James Carter
[RFC]Introduce generalized hooks for getting and setting inode secctx v3
David P. Quigley
[PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
David P. Quigley
[PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
David P. Quigley
Re: selection labeling
Eamon Walsh
Re: unconfined_t Domain with MLS Policy
Stephen Smalley
Re: unconfined_t Domain with MLS Policy
Daniel J Walsh
unconfined_t Domain with MLS Policy
Henley, Tim-P64420
Audit2allow/audit2why patch for policycoreutils.
Daniel J Walsh
semanage patch from Caleb with man page fix
Daniel J Walsh
policycoreutils semanage --proto --protocol inconsistent flags
Caleb Case
Re: SELinux policy for Fedora Directory Server 1.1.0
Daniel J Walsh
Re: myjboss and jbossjava selinux-modules
Daniel J Walsh
RE: First Attempt at root login on console always FAILS ??
Stephen Smalley
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Stephen Smalley
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Stephen Smalley
Re: First Attempt at root login on console always FAILS ??
Daniel J Walsh
Monday, 17 March
Re: pam.d
Justin Mattock
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
James Morris
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Eric Paris
RE: First Attempt at root login on console always FAILS ??
Hasan Rezaul-CHR010
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
James Morris
Re: Permissive mode for xace is broken.
Steve Grubb
2.6.25
Justin Mattock
Re: prelink, cron-job and SELinux compliance
Daniel J Walsh
Re: 2.6.25-rc5
Stephen Smalley
Re: policy module for httpd
Stephen Smalley
Re: First Attempt at root login on console always FAILS ??
Daniel J Walsh
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Eric Paris
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Stephen Smalley
Re: [patch] selinux: handle files opened with flags 3 by checking ioctl permission
Eric Paris
[patch] selinux: handle files opened with flags 3 by checking ioctl permission
Stephen Smalley
Re: First Attempt at root login on console always FAILS ??
Stephen Smalley
[PATCH] SE-PostgreSQL Security Policy (try #3)
Kohei KaiGai
Sunday, 16 March
Re: How to handle security_dentry_open when the open flags are 'special'
James Morris
Re: policy module for httpd
Joe Nall
policy module for httpd
kihamba nengo
Re: prelink, cron-job and SELinux compliance
Stefan Schulze Frielinghaus
Friday, 14 March
pam.d
Justin Mattock
First Attempt at root login on console always FAILS ??
Hasan Rezaul-CHR010
Re: libselinux/matchpathcon has a memory leak
Stephen Smalley
Re: libselinux/matchpathcon has a memory leak
Eamon Walsh
Re: libselinux/matchpathcon has a memory leak
Daniel J Walsh
2.6.25-rc5
Justin Mattock
Re: How to handle security_dentry_open when the open flags are 'special'
Stephen Smalley
Re: libselinux/matchpathcon has a memory leak
Stephen Smalley
Re: libselinux/matchpathcon has a memory leak
Stephen Smalley
Re: 2.6.25-rc5
Stephen Smalley
Re: Installing and building policy modules
Stephen Smalley
Thursday, 13 March
Re: libselinux/matchpathcon has a memory leak
Joshua Brindle
Re: libselinux/matchpathcon has a memory leak
Daniel J Walsh
Re: libselinux/matchpathcon has a memory leak
Daniel J Walsh
Re: libselinux/matchpathcon has a memory leak
Daniel J Walsh
Re: libselinux/matchpathcon has a memory leak
Eamon Walsh
libselinux/matchpathcon has a memory leak
Daniel J Walsh
Re: How to handle security_dentry_open when the open flags are 'special'
Stephen Smalley
2.6.25-rc5
Justin Mattock
Installing and building policy modules
kihamba nengo
Wednesday, 12 March
How to handle security_dentry_open when the open flags are 'special'
Eric Paris
Re: How to handle security_dentry_open when the open flags are 'special'
Eric Paris
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Eric Paris
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Eric Paris
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Stephen Smalley
Re: [PATCH] libsepol: support for permissive types
Stephen Smalley
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Eric Paris
Re: [PATCH] libsepol: support for permissive types
Eric Paris
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Stephen Smalley
Re: [PATCH] libsepol: support for permissive types
Stephen Smalley
RE: Getting started with SELinux and Slackware
Stephen Smalley
Re: [PATCH] SE-PostgreSQL Security Policy
Kohei KaiGai
Tuesday, 11 March
Re: [PATCH-v3] SELinux: introduce permissive types
Daniel J Walsh
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Eric Paris
Re: Getting started with SELinux and Slackware
Russell Coker
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
James Morris
2.6.25-rc5
Justin Mattock
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
James Morris
Re: 2.6.25-rc5
James Morris
Re: [PATCH] SELinux: printk normalization
James Morris
Re: [PATCH] libsepol: support for permissive types
Eric Paris
2.6.25-rc5
Justin Mattock
RE: Getting started with SELinux and Slackware
Martin J. Green
[PATCH] SELinux: printk normalization
Eric Paris
Re: 2.6.25-rc5
Stephen Smalley
Re: [PATCH] libsepol: support for permissive types
Stephen Smalley
Re: [PATCH-v4] SELinux: introduce permissive types
Stephen Smalley
Re: [PATCH] libsepol: support for permissive types
Eric Paris
Re: [PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Stephen Smalley
Re: [PATCH] checkpolicy: support for permissive types
Stephen Smalley
Re: [PATCH] libsepol: support for permissive types
Stephen Smalley
[PATCH-v4] SELinux: introduce permissive types
Eric Paris
[PATCH] SELinux: requesting no permissions in avc_has_perm_noaudit is a BUG()
Eric Paris
Re: Semanage return codes...
Stephen Smalley
Semanage return codes...
Hasan Rezaul-CHR010
Re: [PATCH] SE-PostgreSQL Security Policy
KaiGai Kohei
SELinux policy for Fedora Directory Server 1.1.0
Pär Aronsson
RE: Re: Getting started with SELinux and Slackware
Stephen Smalley
Re: Getting started with SELinux and Slackware
Stephen Smalley
RE: [PATCH-v2] checkpolicy: support for permissive types
Joshua Brindle
Re: [PATCH-v3] SELinux: introduce permissive types
Stephen Smalley
[PATCH-v2] checkpolicy: support for permissive types
Eric Paris
RE: [PATCH] checkpolicy: support for permissive types
Eric Paris
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
2.6.25-rc5
Justin Mattock
RE: [PATCH] checkpolicy: support for permissive types
Joshua Brindle
[PATCH] checkpolicy: support for permissive types
Eric Paris
[PATCH] libsepol: support for permissive types
Eric Paris
Re: [PATCH] SE-PostgreSQL Security Policy
KaiGai Kohei
[ANN] Now v8.3 based SE-PostgreSQL is available
KaiGai Kohei
Re: [PATCH] SE-PostgreSQL Security Policy
Christopher J. PeBenito
Re: [PATCH] SE-PostgreSQL Security Policy
Christopher J. PeBenito
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Christopher J. PeBenito
Re: Getting started with SELinux and Slackware
Martin J. Green
Re: 2.6.25-rc5
James Morris
2.6.25-rc5
Justin Mattock
Monday, 10 March
RE: Re: Getting started with SELinux and Slackware
Martin J. Green
[PATCH-v3] SELinux: introduce permissive types
Eric Paris
Re: x fails to start on fc9
Joe Nall
Re: [PATCH] SELinux: introduce permissive types
Eric Paris
Re: x fails to start on fc9
Daniel J Walsh
Re: x fails to start on fc9
Joe Nall
Refpolicy quilt series for Debian
Martin Orr
Re: [DSE-Dev] Refpolicy quilt series for Debian
Erich Schubert
Re: refpolicy: domains need access to the apt's pty and fifos
Christopher J. PeBenito
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
Re: [PATCH] SELinux: introduce permissive types
Eric Paris
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
[PATCH] SELinux: introduce permissive types
Eric Paris
Re: prelink, cron-job and SELinux compliance
Daniel J Walsh
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Stephen Smalley
Re: Problem compiling policy on Fedora 5.
Stephen Smalley
Problem compiling policy on Fedora 5.
kihamba nengo
Re: [PATCH] SE-PostgreSQL Security Policy
Kohei KaiGai
Sunday, 9 March
x fails to start on fc9
Xavier Toth
Re: [PATCH] SE-PostgreSQL Security Policy
KaiGai Kohei
Saturday, 8 March
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Joe Nall
prelink, cron-job and SELinux compliance
Stefan Schulze Frielinghaus
Friday, 7 March
Re: [PATCH] SE-PostgreSQL Security Policy
KaiGai Kohei
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Eamon Walsh
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Dave Quigley
Re: refpolicy: domains need access to the apt's pty and fifos
Stefan Schulze Frielinghaus
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Casey Schaufler
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Daniel J Walsh
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Dave Quigley
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
PATCH: add downgrade test to libsepol test harness
Todd C. Miller
Re: [PATCH] SE-PostgreSQL Security Policy
Christopher J. PeBenito
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
James Carter
Re: [PATCH] SELinux: introduce permissive types
Eric Paris
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Casey Schaufler
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Chris Wright
Re: [PATCH] SELinux: introduce permissive types
Paul Moore
Re: [PATCH] SELinux: introduce permissive types
Stephen Smalley
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Stephen Smalley
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Casey Schaufler
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Casey Schaufler
[PATCH] SELinux: introduce permissive types
Eric Paris
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Joe Nall
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Stephen Smalley
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Christopher J. PeBenito
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Christopher J. PeBenito
Re: [PATCH] audit tty selinux permission
Stephen Smalley
Re: [PATCH] audit tty selinux permission
Stephen Smalley
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Stephen Smalley
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Daniel J Walsh
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Casey Schaufler
[PATCH] audit tty selinux permission
Steve Grubb
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Dave Quigley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Dave Quigley
Re: [PATCH] SE-PostgreSQL Security Policy
Joshua Brindle
Re: Unreserved portnumbers in corenetwork
Christopher J. PeBenito
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Dave Quigley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Joe Nall
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Joe Nall
Re: Unreserved portnumbers in corenetwork
Ronald van den Blink
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
James Carter
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Daniel J Walsh
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Stephen Smalley
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Joe Nall
Re: Unreserved portnumbers in corenetwork
Daniel J Walsh
Re: PATCH: fix libsepol tests build error
Stephen Smalley
Re: [PATCH] SE-PostgreSQL Security Policy
Kohei KaiGai
Thursday, 6 March
Re: [PATCH] SE-PostgreSQL Security Policy
Kohei KaiGai
Re: [PATCH] SE-PostgreSQL Security Policy
Kohei KaiGai
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Daniel J Walsh
PATCH: fix libsepol tests build error
Todd C. Miller
Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
Stephen Smalley
[PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell
James Carter
Dropping selinux-doc
Stephen Smalley
Re: [PATCH] SE-PostgreSQL Security Policy
Joshua Brindle
Re: nfs_t mount label
Stephen Smalley
nfs_t mount label
Clarkson, Mike R \(US SSA\)
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
Dave Quigley
Re: [PATCH] SE-PostgreSQL Security Policy
Christopher J. PeBenito
Re: Unreserved portnumbers in corenetwork
Joe Nall
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Stephen Smalley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
James Morris
Re: Unreserved portnumbers in corenetwork
Daniel J Walsh
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Stephen Smalley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Stephen Smalley
Re: Unreserved portnumbers in corenetwork
Christopher J. PeBenito
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Russell Coker
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Erich Schubert
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Russell Coker
Wednesday, 5 March
Re: Unreserved portnumbers in corenetwork
Joe Nall
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Casey Schaufler
Re: [PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount options
James Morris
Re: [PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
James Morris
Re: Unreserved portnumbers in corenetwork
Daniel J Walsh
Re: Unreserved portnumbers in corenetwork
Daniel J Walsh
Re: Unreserved portnumbers in corenetwork
Ronald van den Blink
ANN: Updated SELinux core userland release
Stephen Smalley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Stephen Smalley
Re: [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
Paul Moore
Re: Unreserved portnumbers in corenetwork
Stephen Smalley
Re: Unreserved portnumbers in corenetwork
Daniel J Walsh
Re: Unreserved portnumbers in corenetwork
Ronald van den Blink
[PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
David P. Quigley
[RFC]Introduce generalized hooks for getting and setting inode secctx
David P. Quigley
[PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information.
David P. Quigley
[PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount options
Eric Paris
Re: [PATCH 2/2] NFS: use new LSM interfaces to explicitly set mount options
Eric Paris
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Casey Schaufler
Re: [PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
Casey Schaufler
Re: How to handle NFS and conflicting mount options
Casey Schaufler
Re: Unreserved portnumbers in corenetwork
Christopher J. PeBenito
Re: [DSE-Dev] refpolicy: domains need access to the apt's pty and fifos
Erich Schubert
Re: Unreserved portnumbers in corenetwork
Ronald van den Blink
Re: Unreserved portnumbers in corenetwork
Christopher J. PeBenito
refpolicy: domains need access to the apt's pty and fifos
Václav Ovsík
Re: Unreserved portnumbers in corenetwork
Stephen Smalley
Re: Unreserved portnumbers in corenetwork
selinux_at_a61.nl
[PATCH 1/2] LSM/SELinux: Interfaces to allow FS to control mount options
Eric Paris
[PATCH 2/2] NFS: use new LSM interfaces to explicitly set mount options
Eric Paris
Re: Unreserved portnumbers in corenetwork
Christopher J. PeBenito
Re: How to handle NFS and conflicting mount options
Eric Paris
Re: How to handle NFS and conflicting mount options
Stephen Smalley
How to handle NFS and conflicting mount options
Eric Paris
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Eric Paris
Re: PATCH: avoid -Werror for parser-generated sources
Stephen Smalley
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Eric Paris
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Stephen Smalley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Unreserved portnumbers in corenetwork
selinux_at_a61.nl
Re: [patch] refpolicy: exim policy fixes
Devin Carraway
Re: Problem compiling SELinux poilcy
kihamba nengo
Tuesday, 4 March
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Chris Wright
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Casey Schaufler
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
James Morris
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Chris Wright
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Chris Wright
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
James Morris
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Chris Wright
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Chris Wright
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
James Morris
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Casey Schaufler
Re: [PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
Dave Quigley
[PATCH 1/1] LSM/SELinux: {get,set}context hooks to access LSM security context information.
David P. Quigley
Re: Ok I am trying to build interfaces using X Controls.
Eamon Walsh
Re: [PATCH] Refpolicy: Add new permissions for open perms
Christopher J. PeBenito
Re: refpolicy: patch for gpg-agent
Christopher J. PeBenito
Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc2.7, new patch
Christopher J. PeBenito
PATCH: avoid -Werror for parser-generated sources
Todd C. Miller
Re: refpolicy: patch rpc
Christopher J. PeBenito
Re: ANN: Flexible Mandatory Access Control (FMAC) for Solaris
Casey Schaufler
Re: [refpolicy] loadkeys and init fds
Christopher J. PeBenito
RE: PATCH: fix uninitialized use of handle in struct policy_file
Todd Miller
Re: PATCH: fix uninitialized use of handle in struct policy_file
Stephen Smalley
Re: [patch] refpolicy: exim policy fixes
Christopher J. PeBenito
ANN: Flexible Mandatory Access Control (FMAC) for Solaris
Stephen Smalley
Re: [patch] libsepol: drop unused buffer field from policy_file
Todd Miller
Re: PATCH: fix uninitialized use of handle in struct policy_file
Stephen Smalley
Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
Václav Ovsík
Re: xguest_u, LDAP and /tmp
Daniel J Walsh
Re: refpolicy: patch for ldconfig from glibc 2.7, new patch
Václav Ovsík
Re: [PATCH] SE-PostgreSQL Security Policy
KaiGai Kohei
[patch] libsepol: drop unused buffer field from policy_file
Stephen Smalley
Re: PATCH: fix uninitialized use of handle in struct policy_file
Stephen Smalley
Re: PATCH: fix uninitialized use of handle in struct policy_file
Todd C. Miller
Re: Problem with corenet_* statements.
Daniel J Walsh
Re: Problem with corenet_* statements.
Christopher J. PeBenito
xguest_u, LDAP and /tmp
Hal
Re: Ok I am trying to build interfaces using X Controls.
Daniel J Walsh
Monday, 3 March
Re: Ok I am trying to build interfaces using X Controls.
Eamon Walsh
RE: PATCH: fix uninitialized use of handle in struct policy_file
Joshua Brindle
RE: PATCH: fix uninitialized use of handle in struct policy_file
Todd Miller
Re: PATCH: fix uninitialized use of handle in struct policy_file
Joshua Brindle
PATCH: fix uninitialized use of handle in struct policy_file
Todd C. Miller
Re: Tonights rawhide contains a fix to stop xspy.
Eamon Walsh
Problem with corenet_* statements.
Gienek Nowacki
Re: Ok I am trying to build interfaces using X Controls.
Daniel J Walsh
Re: PATH: minor checkpolicy cleanup
Stephen Smalley
Ok I am trying to build interfaces using X Controls.
Daniel J Walsh
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Dave Quigley
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Eric Paris
Re: [PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Dave Quigley
[PATCH -v2] NFS/LSM: allow NFS to control all of its own mount options
Eric Paris
Re: mcs translation daemon
Stephen Smalley
Re: mcs translation daemon
Joe Nall
PATH: minor checkpolicy cleanup
Todd C. Miller
sudo
Clarkson, Mike R \(US SSA\)
mcs translation daemon
Clarkson, Mike R \(US SSA\)
regarding the last message
selinux_at_a61.nl
myjboss and jbossjava selinux-modules
selinux_at_a61.nl
Sunday, 2 March
segatex-5.30 released
Shintaro Fujiwara
Saturday, 1 March
Re: [DSE-Dev] refpolicy: patch for ldconfig from glibc 2.7, new patch
Martin Orr
Last message date
:
Mon 31 Mar 2008 - 20:42:40 EDT
Archived on
: Wed 3 Dec 2008 - 08:23:33 EST
519 messages
sort by
: [
thread
] [
author
] [ date ] [
subject
]
Other periods
:[
Previous, Date view
] [
Next, Date view
] [
List of Folders
]
Nearby
: [
About this archive
]
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009