SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v6] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH testsuite v6] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v3] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v2] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: improve selinuxfs mocking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] travis: improve selinuxfs mocking
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.5
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v4] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite v4] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: general protection fault in selinux_socket_sendmsg (2)
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- general protection fault in selinux_socket_sendmsg (2)
- From: syzbot <syzbot+314db21f0d5c1f53856c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy: check for module_request support for key_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC 3/3] cil: qualify roles from symtable when resolving userprefix
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 2/3] semanage: do not default prefix to "user"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 1/3] libsemanage: fall back to valid "object_r" role instead of "user" prefix string
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: fall back to ref-walk if audit is required
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 3.0-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 25/25] AppArmor: Remove the exclusive flag
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 05/25] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 01/25] LSM: Infrastructure management of the sock security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] Fix: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix: check variable type of port before trying to split
- From: Joshua Schmidlkofer <joshua@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Travis-CI: Drop Python 2 from matrix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v4 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v8] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v8] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] Travis-CI: Drop Python 2 from matrix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 0/2] Avoid blocking in selinux inode callbacks on RCU walk
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] Travis-CI: Drop Python 2 from matrix
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V3] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v4 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3] selinux-testsuite: Add key_socket tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite v4 3/3] travis: test building the test policy package
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v4 1/3] policy: drop the unneeded userdom_search_generic_user_home_dirs()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v4 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v4 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v3 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3 2/3] policy: add fallbacks for Fedora-specific macros
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite v3 3/3] travis: test building the test policy package
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3 1/3] policy: drop the unneeded userdom_search_generic_user_home_dirs()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 3/3] travis: test building the test policy package
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 1/3] policy: consolidate macros for home dirs access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] restorecond: Fix redundant console log output error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3] selinux-testsuite: Add key_socket tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add key_socket tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecond: Fix redundant console log output error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add key_socket tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: initialize addrlen for accept(2) properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- 答复: [PATCH] restorecond: Fix redundant console log output error
- From: kongbaichuan <kongbaichuan@xxxxxxxxxx>
- [PATCH] restorecond: Fix redundant console log output error
- From: Baichuan Kong <kongbaichuan@xxxxxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] y2038 cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux, libsemanage: fix python_exception.i dependencies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux, libsemanage: fix python_exception.i dependencies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: cache the SID -> context string translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH] restorecond: Fix redundant console log output error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux, libsemanage: fix python_exception.i dependencies
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- 答复: [PATCH] restorecond: Fix redundant console log output error
- From: kongbaichuan <kongbaichuan@xxxxxxxxxx>
- 答复: [PATCH] restorecond: Fix redundant console log output error
- From: kongbaichuan <kongbaichuan@xxxxxxxxxx>
- [PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: How to see SELinux denials late at shutdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Add key_socket tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How to see SELinux denials late at shutdown
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: How to see SELinux denials late at shutdown
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: initialize addrlen for accept(2) properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecond: Fix redundant console log output error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite] tests/sctp: initialize addrlen for accept(2) properly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] restorecond: Fix redundant console log output error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux, libsemanage: check in python_exception.i files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux, libsemanage: fix python_exception.i dependencies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux, libsemanage: never create -.o in exception.sh
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Replace www.nsa.gov references by github.com/SELinuxProject
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- How to see SELinux denials late at shutdown
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] restorecond: Fix redundant console log output error
- From: Baichuan Kong <kongbaichuan@xxxxxxxxxx>
- [PATCH v4] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/3] libselinux,libsemanage: check in python_exception.i files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libselinux,libsemanage: fix python_exception.i dependencies
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux,libsemanage: never create -.o in exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/3] Makefile: fix cleaning files that starts with "-"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: cache the SID -> context string translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Add key_socket tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/4] libselinux: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 20/23] y2038: move itimer reset into itimer.c
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/23] y2038 cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Replace www.nsa.gov references by github.com/SELinuxProject
- From: Olesya Gerasimenko <gammaray@xxxxxxxxxx>
- Re: [PATCH] Replace www.nsa.gov references by github.com/SELinuxProject
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v6] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] Replace www.nsa.gov references by github.com/SELinuxProject
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Welcome Ondrej as a maintainer to the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Odd systemd source context for non pid 1 process
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux-testsuite: add tests for fsnotify
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v2] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions"
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v5] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v2] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] libsepol/cil: Report disabling an optional block only at high verbose levels
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Odd systemd source context for non pid 1 process
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Odd systemd source context for non pid 1 process
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Replace www.nsa.gov references by github.com/SELinuxProject
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions"
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Odd systemd source context for non pid 1 process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Odd systemd source context for non pid 1 process
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux-testsuite: add tests for fsnotify
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v3] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v14 1/5] Add flags option to get xattr method paired to __vfs_getxattr
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: generate Python glue code using "sed"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Makefile: fix cleaning files that starts with "-"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] libselinux: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/4] libselinux: compile Python bytecode when installing Python files
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 4/4] gui: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/4] python: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] libsemanage: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] libselinux: compile Python bytecode when installing Python files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH libselinux] libselinux/src/Makefile: don't pass bogus -I and -L to python setup.py build_ext
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Report disabling an optional block only at high verbose levels
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/cil: Report disabling an optional block only at high verbose levels
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: ANN: SELinux userspace 3.0-rc1 release candidate
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 3.0-rc1 release candidate
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libselinux: generate Python glue code using "sed"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsemanage: generate Python glue code using "sed"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] Makefile: fix cleaning files that starts with "-"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH libselinux] libselinux/src/Makefile: don't pass bogus -I and -L to python setup.py build_ext
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH libselinux 2/2] libselinux/src/Makefile: do not use PYCEXT, and rely on the installed file name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.0-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: add SELinux hooks for lockdown integrity and confidentiality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v10 13/25] LSM: Specify which LSM to display
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH libselinux 1/2] libselinux/src/Makefile: don't use ln --relative option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v10 13/25] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Add portcon rule to existing policy module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Add portcon rule to existing policy module
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH 1/2] docs: sysctl: update description for inode-state
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH 1/2] docs: sysctl: update description for inode-state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] docs: sysctl: delete the description about inode-max
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/2] docs: sysctl: update description for inode-state
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: Add portcon rule to existing policy module
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Add portcon rule to existing policy module
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH libselinux 2/2] libselinux/src/Makefile: do not use PYCEXT, and rely on the installed file name
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxx>
- [PATCH libselinux 1/2] libselinux/src/Makefile: don't use ln --relative option
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxx>
- [PATCH libselinux] libselinux/src/Makefile: don't pass bogus -I and -L to python setup.py build_ext
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxx>
- [PATCH v10 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 1/5] Add flags option to get xattr method paired to __vfs_getxattr
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] python/semanage: Document DCCP and SCTP support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: semodule: Enable CIL logging
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] checkpolicy: allow to write policy to stdout
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] sepolicy: generate man pages in parallel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semanage: Document DCCP and SCTP support
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] policycoreutils: semodule: Enable CIL logging
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 3/3] checkpolicy: allow to write policy to stdout
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH v2 2/3] checkpolicy: update the description for -o option in the man page
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH v2 1/3] checkpolicy: remove a redundant if-condition
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH userspace] sepolicy: generate man pages in parallel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2] sepolicy: generate man pages in parallel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] sepolicy: generate man pages in parallel
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH userspace] sepolicy: generate man pages in parallel
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH userspace] sepolicy: generate man pages in parallel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 00/10] SELinux namespace series, re-based
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- src:shadow: dropping passwd shortcut
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: mark all exported function "extern"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace] sepolicy: generate man pages in parallel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] checkpolicy: allow to write policy to stdout
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: mark all exported function "extern"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 11/10] selinux: fix support multiple selinuxfs instances
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] dispol: add batch execution mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 3/3] checkpolicy: allow to write policy to stdout
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 2/3] checkpolicy: update the description for -o option in the man page
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/3] checkpolicy: remove a redundant if-condition
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [RFC PATCH 11/10] selinux: fix support multiple selinuxfs instances
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- shadow: migrate to new SELinux api
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Update binder for kernel 5.4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: call segenxml.py with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 10/10] selinuxfs: restrict write operations to the same selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 08/10] selinux: introduce cred_selinux_ns() and use it
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 07/10] selinux: support per-task/cred selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 06/10] netns,selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 05/10] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 04/10] selinuxns: mark init_selinux_ns as __ro_after_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 03/10] selinux: dynamically allocate selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 02/10] selinux: support multiple selinuxfs instances
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 00/10] SELinux namespace series, re-based
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: mark all exported function "extern"
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH userspace] sepolicy: generate man pages in parallel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] libselinux: mark all exported function "extern"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage: mark all exported function "extern"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] non-gcc-specific exception.sh
- From: Michael Shigorin <mike@xxxxxxxxxxxx>
- Re: [PATCH] non-gcc-specific exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] perf_event: Add support for LSM and SELinux checks
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] perf_event: Add support for LSM and SELinux checks
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] python/semanage: Add support for DCCP and SCTP protocols
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: call segenxml.py with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add libelf to builds using libbpf
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add libelf to builds using libbpf
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add libelf to builds using libbpf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Update binder for kernel 5.4 support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 2/5] dispol: add an option for printing the command usage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] python/semanage: Add support for DCCP and SCTP protocols
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] python/sepolicy: call segenxml.py with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.4 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 0/5] dispol: add batch execution mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] dispol: extend usage() to take exit status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] dispol: add batch execution mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] python/semanage: Add support for DCCP and SCTP protocols
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] libsemanage: Add support for DCCP and SCTP protocols
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH net] sctp: add chunks to sk_backlog when the newsk sk_socket is not set
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/5] dispol: introduce a local variable representing the input file
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 4/5] dispol: introduce -b option to run commands in batch
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 0/5] dispol: add batch execution mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/5] dispol: extend usage() to take exit status
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 2/5] dispol: add an option for printing the command usage
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/5] dispol: extend usage() to take error code as an argument
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 5/5] dispol: add the list of commands for batch mode to help message
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH v4] Add default_range glblub support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.4 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] non-gcc-specific exception.sh
- From: Michael Shigorin <mike@xxxxxxxxxxxx>
- Re: [systemd SELinux] system status permission
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [systemd SELinux] system status permission
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [systemd SELinux] system status permission
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] non-gcc-specific exception.sh
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [systemd SELinux] system status permission
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] non-gcc-specific exception.sh
- From: Michael Shigorin <mike@xxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Update binder for kernel 5.4 support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v4] Add default_range glblub support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] Add default_range glblub support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix context string corruption in convert_context()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix context string corruption in convert_context()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: fix context string corruption in convert_context()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Failed to resolve typeattributeset statement
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Failed to resolve typeattributeset statement
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: execve silently blocked
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: execve silently blocked
- From: Dominick Grift <dac.override@xxxxxxxxx>
- execve silently blocked
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH 2/2] libsemanage/tests: check that string pointers are not NULL before comparing them
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: fix moduleRecords.customized()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add keys tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow labeling before policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove load size limit
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V4] selinux-testsuite: Add keys tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] libsepol: Further improve binary policy optimization
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH V3] selinux-testsuite: Add keys tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage/tests: check that string pointers are not NULL before comparing them
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsemanage/tests: return when str is NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH V3] selinux-testsuite: Add keys tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 3/3] travis: test building the test policy package
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: Add submount test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: consolidate macros for home dirs access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: add fallbacks for Fedora-specific macros
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: consolidate macros for home dirs access
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite] selinux-testsuite: Add submount test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libsepol, libsemanage: add a macro to silence static analyzer warnings in tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite 3/3] travis: test building the test policy package
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/3] policy: add fallbacks for Fedora-specific macros
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/3] policy: consolidate macros for home dirs access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/3] Fix refpolicy build & build test_policy.pp in Travis
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] python/semanage: fix moduleRecords.customized()
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 24/49] selinux: fix residual uses of current_security() for the SELinux blob
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 21/42] selinux: fix residual uses of current_security() for the SELinux blob
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: WARNING: locking bug in selinux_netlbl_socket_connect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semaange: fix moduleRecords.customized()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: WARNING: locking bug in selinux_netlbl_socket_connect
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semaange: fix moduleRecords.customized()
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semanage: Improve handling of "permissive" statements
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Further improve binary policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- question about selinux_restore_tty() in sudo's selinux.c
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2] libsepol, libsemanage: add a macro to silence static analyzer warnings in tests
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] python/sepolicy: call segenxml.py with python3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol: Further improve binary policy optimization
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] CircleCI: run scan-build and publish its results automatically
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Switch last 2 files using /usr/bin/env to /usr/bin/python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not use default s0 range in "semanage login -a"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] gui: Fix remove module in system-config-selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils/fixfiles: Force full relabel when SELinux is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/sepolicy: call segenxml.py with python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/fixfiles: Fix "verify" option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add keys tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]