SELinux - Date Index
[Prev Page][Next Page]
- Re: [SELinux-notebook RFC v2] mypolicy is a simple CIL policy with Makefile to get started with
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook RFC v2] mypolicy is a simple CIL policy with Makefile to get started with
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook RFC v2] mypolicy is a simple CIL policy with Makefile to get started with
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v2] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v2] objects.md: some clarifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook RFC v2] mypolicy is a simple CIL policy with Makefile to get started with
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Remove unused sctp code
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] Update the cil docs to match the current behaviour.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [SELinux-notebook RFC v2] mypolicy is a simple CIL policy with Makefile to get started with
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: genhomedircon and passwd
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- genhomedircon and passwd
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [SELinux-notebook RFC] mypolicy is a simple CIL policy with Makefile to get started with
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [SELinux-notebook PATCH v2] objects.md: some clarifications
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- ANN: SELinux userspace release 2020-07-10 / 3.1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] Update the cil docs to match the current behaviour.
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] Update the cil docs to match the current behaviour.
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Update the cil docs to match the current behaviour.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Ravi Bangoria <ravi.bangoria@xxxxxxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [SELinux-notebook PATCH v2] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH] onjects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: How to off RBAC in SELinux?
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: complete the inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v18 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: prepare for inlining of hashtab functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v18 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 1/2] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 2/2] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] avc_rules.md: mention secilc with the neverallow statement
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] avc_rules.md: mention secilc with the neverallow statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: travis: any reason we have keep going on make commands
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v18 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v18 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: 3.1 release notes draft
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: 3.1 release notes draft
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- travis: any reason we have keep going on make commands
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: 3.1 release notes draft
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
- From: Ethan Edwards <ethancarteredwards@xxxxxxxxx>
- [SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- 3.1 release notes draft
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Update VERSIONs and Python bindings version to 3.1 for release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v2] Update the cil docs to match the current behaviour.
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v18 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 20/23] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] selinux: specialize symtab insert and search functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: Fix spelling mistakes in the comments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ANN: The SELinux Notebook in markdown on GitHub
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: complete the inlining of hashtab functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 1/3] selinux: specialize symtab insert and search functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 3/3] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 1/3] selinux: specialize symtab insert and search functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/3] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- ANN: The SELinux Notebook in markdown on GitHub
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Remove unused sctp code
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] security/selinux: Fix spelling mistakes in the comments
- From: lihao <fly.lihao@xxxxxxxxxx>
- Re: [RFC PATCH] fixfiles: correctly restore context of mountpoints
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] fixfiles: correctly restore context of mountpoints
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] fixfiles: correctly restore context of mountpoints
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Nicolas Viennot <Nicolas.Viennot@xxxxxxxxxxxx>
- Re: [RFC] userspace: netlink/sestatus feature parity
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [RFC] userspace: netlink/sestatus feature parity
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon's child getting weird denial
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Strange AVC denials without effect
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Strange AVC denials without effect
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] Update the cil docs to match the current behaviour.
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] Update the cil docs to match the current behaviour.
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Strange AVC denials without effect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Strange AVC denials without effect
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Rebased selinux/working-selinuxns
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Update the cil docs to match the current behaviour.
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux-testsuite: Remove unused sctp code
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] policycoreutils: setfiles: do not restrict checks against a binary policy
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v4 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [RFC PATCH] fixfiles: correctly restore context of mountpoints
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: fix `make conf` invocation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: fix `make conf` invocation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: fix `make conf` invocation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC] userspace: netlink/sestatus feature parity
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- [PATCH] Update the cil docs to match the current behaviour.
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Daemon's child getting weird denial
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH testsuite] travis: fix `make conf` invocation
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] travis: fix `make conf` invocation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 0/4] Various CI-related testsuite fixes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] setfiles: clarify documented path resolution behaviour
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] semanage: handle getprotobyname() failure case
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
- From: Ethan Edwards <ethancarteredwards@xxxxxxxxx>
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] selinux: log error messages on required process class / permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux/mdp: fix initial SID handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: allow reading labels before policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/4] travis: add missing node to fake selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite 2/4] travis: add missing node to fake selinuxfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/4] Makefiles: remove bashisms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 4/4] tests: stop using deprecated security_context_t
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite 3/4] travis: fix git/cache handling
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite 2/4] travis: add missing node to fake selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite 1/4] Makefiles: remove bashisms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite 3/4] travis: fix git/cache handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 4/4] tests: stop using deprecated security_context_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/4] Various CI-related testsuite fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/4] travis: add missing node to fake selinuxfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/4] Makefiles: remove bashisms
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: CIL classmap with set named all resulting in segfault
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] setfiles: clarify documented path resolution behaviour
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] semanage: handle getprotobyname() failure case
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.8 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.8 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- CIL classmap with set named all resulting in segfault
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- ANN: SELinux userspace 3.1-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Use xml.etree.ElementTree.Element.iter()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] Add restorecon -x option to not cross FS boundaries
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: fix selinux_restorecon() statfs bug
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix NULL pointer use in selinux_restorecon_set_sehandle
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v6 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: CIL blockinherit and entering a macro namespace using in
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] setfiles: clarify documented path resolution behaviour
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- [PATCH v2] setfiles: clarify documented path resolution behaviour
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- CIL blockinherit and entering a macro namespace using in
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ci: dont use hardcoded project name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: log error messages on required process class / permissions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] prctl: Allow ptrace capable processes to change exe_fd
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] selinux: log error messages on required process class / permissions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 3/3] prctl: Allow ptrace capable processes to change exe_fd
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v3 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v3 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v3 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH] selinux: fix undefined return of cond_evaluate_expr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix undefined return of cond_evaluate_expr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: log error messages on required process class / permissions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] scripts/selinux/mdp: fix initial SID handling
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] ci: dont use hardcoded project name
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v2 1/1] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Minimal CIL policy requires process class with transition permission
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Minimal CIL policy requires process class with transition permission
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: Minimal CIL policy requires process class with transition permission
- From: Dac Override <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: fix undefined return of cond_evaluate_expr
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Minimal CIL policy requires process class with transition permission
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Minimal CIL policy requires process class with transition permission
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: fix undefined return of cond_evaluate_expr
- Minimal CIL policy requires process class with transition permission
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3] selinux: fix another double free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] defconfig: add NETFILTER_XT_MATCH_STATE and NFS_V4_1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH V2] selinux-testsuite: Add check for key changes on watch_queue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: fix another double free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v3] selinux: fix another double free
- Re: Better management of dynamic networks?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v6 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v6 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v5 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V2] selinux-testsuite: Add check for key changes on watch_queue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix NULL pointer use in selinux_restorecon_set_sehandle
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux: Fix NULL pointer use in selinux_restorecon_set_sehandle
- From: Ji Qin <jiqin.ji@xxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: How to off RBAC in SELinux?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: How to off RBAC in SELinux?
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: How to off RBAC in SELinux?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- How to off RBAC in SELinux?
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] ci: dont use hardcoded project name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Matt Helsley <mhelsley@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix another double free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/1] selinux: fix another double free
- [PATCH v2 0/1] selinux: fix another double free
- [PATCH v2] ci: dont use hardcoded project name
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] selinux: fix another double free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] ci: dont use hardcoded project name
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: fix another double free
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ci: dont use hardcoded project name
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: fix another double free
- Re: [PATCH] ci: dont use hardcoded project name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] ci: dont use hardcoded project name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] ci: dont use hardcoded project name
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v4 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 2/3] refparser: add missing newline after error message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 1/3] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix double free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux: fix double free
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/1] selinux: fix double free
- [PATCH v2 0/1] selinux: fix double free
- Re: [PATCH 1/1] selinux: fix double free
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: fix double free
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: fix double free
- [PATCH 0/1] selinux: fix double free
- Re: [PATCH] libselinux: fix selinux_restorecon() statfs bug
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: fix selinux_restorecon() statfs bug
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] defconfig: add NETFILTER_XT_MATCH_STATE and NFS_V4_1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Nicolas Viennot <Nicolas.Viennot@xxxxxxxxxxxx>
- Re: [PATCH] semanage-node.8: describe netmask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] semanage bash completion: handle semanage module
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Cristian Ariza <cariza@xxxxxxxxxxxxxxxx>
- RE: No window opening when running sandbox -S
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Cristian Ariza <cariza@xxxxxxxxxxxxxxxx>
- [PATCH testsuite] defconfig: add NETFILTER_XT_MATCH_STATE and NFS_V4_1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2] Add restorecon -x option to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Cristian Ariza <cariza@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ci: run SELinux kernel test suite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: No window opening when running sandbox -S
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] README: start a section for documenting CFLAGS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] Add restorecon -x option to not cross FS boundaries
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- No window opening when running sandbox -S
- From: Cristian Ariza <cariza@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- [PATCH AUTOSEL 5.7 153/274] selinux: fix error return code in policydb_read()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 093/175] selinux: fix error return code in policydb_read()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] README: start a section for documenting CFLAGS
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v2] README: start a section for documenting CFLAGS
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Better management of dynamic networks?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Use xml.etree.ElementTree.Element.iter()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] README: start a section for documenting CFLAGS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] Add restorecon -x option to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH v2] semanage: handle getprotobyname() failure case
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] README: start a section for documenting CFLAGS
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v3 2/3] refparser: add missing newline after error message
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 1/3] sepolgen: parse gen_tunable as bool
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] semanage-node.8: describe netmask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] setfiles: clarify documented path resolution behaviour
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] python/sepolicy: Use xml.etree.ElementTree.Element.iter()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Better management of dynamic networks?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v3 2/3] refparser: add missing newline after error message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] semanage: handle getprotobyname() failure case
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- Re: [PATCH] Avoid using getprotobyname()
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] libselinux: fix selinux_restorecon() statfs bug
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] Avoid using getprotobyname()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Avoid using getprotobyname()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/3] sepolgen: parse gen_tunable as bool
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Minor tweaks to the names of the contributors to the manpages
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux: fix selinux_restorecon() statfs bug
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH] setfiles: clarify documented path resolution behaviour
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] README: start a section for documenting CFLAGS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] semanage bash completion: handle semanage module
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- sepolicy test fails with Python-3.9
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- [PATCH v2 3/3] prctl: Allow ptrace capable processes to change exe_fd
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v2 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v2 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v2 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and rework sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and rework sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux-testsuite: Review and rework sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] semanage-node.8: describe netmask
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux patches for v5.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- [PATCH v3] ci: run SELinux kernel test suite
- From: bill.c.roberts@xxxxxxxxx
- [v3] Travis CI: Run selinux-testsuite
- From: bill.c.roberts@xxxxxxxxx
- [PATCH] README: start a section for documenting CFLAGS
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] RFC: fuse: virtiofs: Call security hooks on new inodes
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] libselpol: Sort portcon rules consistently
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] Avoid using getprotobyname()
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ❌ FAIL: Test report for kernel 5.7.0-f359287.cki (mainline.kernel.org)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Fwd: ❌ FAIL: Test report for kernel 5.7.0-f359287.cki (mainline.kernel.org)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.8
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: allow reading labels before policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] selinux: Allow file owner to set "security.sehash"
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- [PATCH v2] semanage bash completion: handle semanage module
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselpol: Sort portcon rules consistently
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselpol: Sort portcon rules consistently
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/3] refparser: add missing newline after error message
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] Add restorecon -x opt to not cross FS boundaries (cf github #208)
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH] Add restorecon -x opt to not cross FS boundaries (cf github #208)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] semanage bash completion: handle semanage module #246
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: krb5 policy bug
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Issue with fixfiles excludes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Minor tweaks to the names of the contributors to the manpages
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] chcat: don't crash if access to binary policy is prohibited
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Interests in usability enhancements to .../scripts.py?
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- [PATCH] libselpol: Sort portcon rules consistently
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH v2 1/3] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH v2 1/3] sepolgen: parse gen_tunable as bool
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: CIL typealiases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: CIL typealiases
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: CIL typealiases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] sepolgen-ifgen: refactor default policy path retrieval
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] refparser: add missing newline after error message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- CIL typealiases
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: allow reading labels before policy is loaded
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- RE: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Nicolas Viennot <Nicolas.Viennot@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: allow reading labels before policy is loaded
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Nicolas Viennot <Nicolas.Viennot@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] sepolgen: parse gen_tunable as bool
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V5] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: Add kernel-modules for SCTP
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 1/2] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] README: Add kernel-modules for SCTP
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Add restorecon -x opt to not cross FS boundaries (cf github #208)
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V5] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: Add kernel-modules for SCTP
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Radostin Stoyanov <rstoyanov1@xxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] semanage bash completion: handle semanage module #246
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- krb5 policy bug
- From: Corey Penford <coreypenford@xxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow reading labels before policy is loaded
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Issue with fixfiles excludes
- From: Chris Adams <linux@xxxxxxxxxxx>
- [PATCH] checkpolicy: Minor tweaks to the names of the contributors to the manpages
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: general protection fault in selinux_socket_recvmsg
- From: syzbot <syzbot+c6bfc3db991edc918432@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: general protection fault in selinux_socket_recvmsg
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- CFLAGS overridden by distribution build system
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- general protection fault in selinux_socket_recvmsg
- From: syzbot <syzbot+c6bfc3db991edc918432@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH] libselinux: utils: link with shared libfts
- From: Đoàn Trần Công Danh <congdanhqx@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: utils: link with shared libfts
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] libsepol: Write CIL default MLS rules on separate lines
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Question about SELinux and hard resource limits
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Question about SELinux and hard resource limits
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] libselinux: utils: link with shared libfts
- From: Đoàn Trần Công Danh <congdanhqx@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] capabilities: Introduce CAP_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Improve writing CIL category rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol: Write CIL default MLS rules on separate lines
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V5] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [v2] Travis CI: Run selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Documentation on Enabling NetLabel
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- [PATCH v2] ci: run SELinux kernel test suite
- From: bill.c.roberts@xxxxxxxxx
- [v2] Travis CI: Run selinux-testsuite
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] README: Add kernel-modules for SCTP
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] README: update kernel-devel package in dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] README: update kernel-devel package in dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V3] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Travis CI: Run selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] ci: run SE Linux kernel test suite
- From: bill.c.roberts@xxxxxxxxx
- Travis CI: Run selinux-testsuite
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- [PATCH v2 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 1/2] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v17 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: ANN: SELinux userspace 3.1-rc1 release candidate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.1-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Semodule accepts bad modules every other time
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v3] README: update kernel-devel package in dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2] README: update kernel-devel package in dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH v2] README: update kernel-devel package in dnf command
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] README: update kernel-devel package in dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Bad context in PostgreSQL page on SELinux Project wiki?
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] README: add pkg kernel-devel to dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V3] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix policy optimization test
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: fsync final files before rename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH V2] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Wrong processes in AVC denials
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]