SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selinux: allow reading labels before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: CFLAGS overridden by distribution build system
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: general protection fault in selinux_socket_recvmsg
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- CFLAGS overridden by distribution build system
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- general protection fault in selinux_socket_recvmsg
- From: syzbot <syzbot+c6bfc3db991edc918432@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH] libselinux: utils: link with shared libfts
- From: Đoàn Trần Công Danh <congdanhqx@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: utils: link with shared libfts
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] libsepol: Write CIL default MLS rules on separate lines
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 3/3] libsepol: Improve writing CIL category rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Question about SELinux and hard resource limits
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Question about SELinux and hard resource limits
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] capabilities: Introduce CAP_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] libselinux: utils: link with shared libfts
- From: Đoàn Trần Công Danh <congdanhqx@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] capabilities: Introduce CAP_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Improve writing CIL category rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol: Improve writing CIL sensitivity rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol: Write CIL default MLS rules on separate lines
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V5] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ci: run SELinux kernel test suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Documentation on Enabling NetLabel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [v2] Travis CI: Run selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Documentation on Enabling NetLabel
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- [PATCH v2] ci: run SELinux kernel test suite
- From: bill.c.roberts@xxxxxxxxx
- [v2] Travis CI: Run selinux-testsuite
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 2/2] libsepol: Fix type alias handling in kernel_to_conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol: Fix type alias handling in kernel_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] README: Add kernel-modules for SCTP
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] README: update kernel-devel package in dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] README: update kernel-devel package in dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V3] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] ci: run SE Linux kernel test suite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Travis CI: Run selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] ci: run SE Linux kernel test suite
- From: bill.c.roberts@xxxxxxxxx
- Travis CI: Run selinux-testsuite
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- [PATCH v2 2/2] libsepol/cil: Return error when identifier declared as both type and attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 1/2] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Initialize the multiple_decls field of the cil db
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v17 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Add restorecon -x to not cross FS boundaries
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Semodule accepts bad modules every other time
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: ANN: SELinux userspace 3.1-rc1 release candidate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.1-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Semodule accepts bad modules every other time
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v3] README: update kernel-devel package in dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2] README: update kernel-devel package in dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH v2] README: update kernel-devel package in dnf command
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] README: update kernel-devel package in dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Bad context in PostgreSQL page on SELinux Project wiki?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] Add restorecon -x to not cross FS boundaries
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Bad context in PostgreSQL page on SELinux Project wiki?
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] README: add pkg kernel-devel to dnf command
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] README: add pkg kernel-devel to dnf command
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V3] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix policy optimization test
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: fsync final files before rename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH V2] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Wrong processes in AVC denials
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Wrong processes in AVC denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Wrong processes in AVC denials
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v2] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Wrong processes in AVC denials
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v17 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v17 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v17 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v17 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: fsync final files before rename
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] libsemanage: fsync final files before rename
- From: Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsemanage: fsync before rename
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsemanage: fsync before rename
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsemanage: fsync before rename
- From: Smalley <stephen.smalley.work@xxxxxxxxx>
- The selinux/working-selinuxns branch has been rebased on top of selinux/next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix policy optimization test
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] mcstransd: fix memory leak in new_context_str
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 1/3] fs: unexport kernel_read_file()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: silence new flake8 warnings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] mcstransd: fix memory leak in new_context_str
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] secilc: Fix policy optimization test
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: netlabel: Remove unused inline function selinux_netlbl_conn_setsid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolicy: silence new flake8 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] python/sepolicy: silence new flake8 warnings
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] python/sepolicy: silence new flake8 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] mcstransd: fix memory leak in new_context_str
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] mcstransd: fix memory leak in new_context_str
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5 testsuite 07/15] test_policy.if: use term_use_all_ptys() instead of unconfined_devpts_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 testsuite 07/15] test_policy.if: use term_use_all_ptys() instead of unconfined_devpts_t
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 07/15] test_policy.if: use ptynode instead of unconfined_devpts_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] run-flake8: Filter out ./.git/ directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] chcat: don't crash if access to binary policy is prohibited
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] chcat: don't crash if access to binary policy is prohibited
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: netlabel: Remove unused inline function selinux_netlbl_conn_setsid
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 10/15] policy: Add defaultrange rules for overlay tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 05/15] test_inet_socket.te: switch from generic_port to _all_unreserved_ports()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 03/15] test_ibendport.te: use dev_rw_infiniband_mgmt_dev()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 04/15] test_global.te: allow test domains to statfs selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 06/15] test_sctp.te: make netlabel_peer_t a MCS-constrained type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 12/15] policy/Makefile: conditionalize setting of allow_domain_fd_use
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 15/15] README.md: Add instructions for Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 13/15] tests/cap_userns: set /proc/sys/kernel/unprivileged_userns_clone if needed
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 14/15] tests/mmap: skip /dev/zero tests if /dev is noexec
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 11/15] test_filesystem.te,tests/{fs_}filesystem: do not force user identity to system_u
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 09/15] policy: Add MCS constraint on peer recv
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 07/15] test_policy.if: use ptynode instead of unconfined_devpts_t
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 08/15] test_overlayfs.te: allow test_overlay_mounter_t to read user tmp files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 02/15] test_execute_no_trans.te: stop using mmap_file_perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 01/15] test_capable_net.te: remove corenet_tcp/udp_sendrecv_all_ports()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2020
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Fwd: [PATCH] selinux-testsuite: update to work on Debian
- From: Dac Override <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add missing errno setup
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Intent to release 3.1-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 3/3] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/3] selinux: specialize symtab insert and search functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/3] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add missing errno setup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] libselinux: Add missing errno setup
- From: Richard Filo <rfilo@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add missing errno setup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/tests: drop ncurses dependency
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libselinux: Add missing errno setup
- From: Richard Filo <rfilo@xxxxxxxxxx>
- Re: [PATCH v2] sepolicy: fix some typos and port definitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix return value on error in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: fix return value on error in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/4] selinux: simplify range_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: drop ncurses dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] scripts/env_use_destdir: fix Fedora support
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] README: add much useful information
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/tests: drop ncurses dependency
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] sepolicy: fix some typos and port definitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: properly handle multiple messages in selinux_netlink_send()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: properly handle multiple messages in selinux_netlink_send()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] sepolicy: fix some typos and port definitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: fix some typos and port definitions #230
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] sepolicy-gui: fix columns in transitions view #232
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] restorecond: Rename restorecond-user.service to restorecond_user.service
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 0/2] SELinux: Improve hashing
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH] sepolicy-gui: fix columns in transitions view #232
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] sepolicy: fix some typos and port definitions #230
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH -next] selinux: fix error return code in policydb_read()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [v4] Annotate Deprecated Functions in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 4/4] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/4] selinux: simplify range_write()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/4] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setsebool: report errors from commit phase
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] restorecond/user: handle SIGTERM properly
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4 18/18] Makefile: swig build allow deprecated functions
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 17/18] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 12/18] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 16/18] matchpathcon: allow use of deprecated routines
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 15/18] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 14/18] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 13/18] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 11/18] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 10/18] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 09/18] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 08/18] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 07/18] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 06/18] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 05/18] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 04/18] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 03/18] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 02/18] security_load_booleans: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 01/18] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- [v4] Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setsebool: report errors from commit phase
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 13/19] avc: create internal avc_init interface
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] setsebool: report errors from commit phase
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 13/19] avc: create internal avc_init interface
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] Convert README to README.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Convert README to README.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: ebitmap_node ate over 40GB of memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH 1/1] python/semanage: check rc after getting it
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: don't produce incorrect filename_trans_count
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2 4/4] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 0/4] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [tip: perf/core] drivers/oprofile: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] drivers/perf: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] drm/i915/perf: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] parisc/perf: open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf tools: Support CAP_PERFMON capability
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] trace/bpf_trace: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf/core: Open access to the core for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf/core: open access to probes for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] capabilities: Introduce CAP_PERFMON to kernel and user space
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] powerpc/perf: open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3 19/19] Makefile: swig build allow deprecated functions
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 18/19] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 15/19] matchpathcon: create internal matchpathcon interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 17/19] matchpathcon: allow use of deprecated routines
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 16/19] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 14/19] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 13/19] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 12/19] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 11/19] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 10/19] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 09/19] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 08/19] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 07/19] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 06/19] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 05/19] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 04/19] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 03/19] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 02/19] security_load_booleans: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 01/19] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- [v3] Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- RE: Annotate Deprecated Functions in libselinux
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: Deprecated Annotations in libselinux
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] python/semanage: check rc after getting it
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] selinux: don't produce incorrect filename_trans_count
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Run tests using remote server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 16/60] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 14/60] drivers/oprofile: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 13/60] drivers/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 12/60] parisc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 11/60] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 10/60] trace/bpf_trace: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 08/60] perf tools: Support CAP_PERFMON capability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 07/60] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 2/2] semodule: mention ignoredirs setting in genhomedircon man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/1] python/semanage: check rc after getting it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] selinux: implement new format of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] selinux: move context hashing under sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: hash context structure directly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: store role transitions in a hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: hash context structure directly
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v3 2/2] selinux: move context hashing under sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/2] Hash context structures directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.7 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: implement new format of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: use python module importlib instead of the deprecated imp
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: implement new format of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 17/18] utils: matchpathcon to use interal interfaces
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 18/18] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 16/18] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 15/18] matchpathcon: create internal matchpathcon interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 14/18] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 13/18] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 09/18] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 12/18] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 11/18] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 10/18] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 07/18] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 08/18] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 06/18] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 05/18] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]