SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v2] selinux: simplify mls_context_to_sid()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: simplify mls_context_to_sid()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] python: replace aliases with corresponding type names
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux MLS for Apache Process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux MLS for Apache Process
- From: Ishara Fernando <roshane.ishara@xxxxxxxxx>
- Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol: mark permissive types when loading a binary policy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux MLS for Apache Process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux MLS for Apache Process
- From: Ishara Fernando <roshane.ishara@xxxxxxxxx>
- Re: SELinux MLS for Apache Process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux MLS for Apache Process
- From: Ishara Fernando <roshane.ishara@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6] selinux: policydb - fix byte order and alignment issues
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] sidechannel: Linux Security Module for sidechannel
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v6 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v6 0/5] LSM: Support ptrace sidechannel access checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v6 5/5] sidechannel: Linux Security Module for sidechannel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v6 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v6 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v6 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: use separate table for initial SID lookup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libsepol: add missing ibendport port validity check
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libsepol: add missing ibendport port validity check
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: cil mlsconstrain
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: cil mlsconstrain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] selinux: policydb - fix byte order and alignment issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cil mlsconstrain
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: cil mlsconstrain
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- cil mlsconstrain
- From: Ted Toth <txtoth@xxxxxxxxx>
- [PATCH v6] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] libsepol: add missing ibendport port validity check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: add missing ibendport port validity check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: add missing ibendport port validity check
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v5] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: add missing ibendport port validity check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: fix endianity in ibpkey range checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Fix alias handling in sepolicy and semaange
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] libsepol: fix endianity in ibpkey range checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: policydb - fix byte order and alignment issues
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: policydb - fix byte order and alignment issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix endianity in ibpkey range checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: fix endianity in ibpkey range checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3] selinux: policydb - fix byte order and alignment issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Fix alias handling in sepolicy and semaange
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v4.19 (#1)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Blocking exec on processes based on arguments
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] python/semanage: Stop rejecting aliases in semanage commands
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] python/sepolicy: Fix "info" to search aliases as well
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] python/sepolicy: Stop rejecting aliases in sepolicy commands
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Fix alias handling in sepolicy and semaange
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for v4.19 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [RFC] proposal for resolving the cred_guard_mutex deadlock
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v2 1/1] libsemanage: improve semanage_migrate_store import failure
- From: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
- [PATCH v2 0/1] Modify exception handling in semanage_migrate_store
- From: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
- [PATCH 4/4] libsepol: Add two new Xen initial SIDs
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/4] libsepol: Check that initial sid indexes are within the valid range
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/4] libsepol: Eliminate initial sid string definitions in module_to_cil.c
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: Rename kernel_to_common.c stack functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/4] libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Create policydb_sort_ocontexts()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: Add option to sort ocontexts when creating a binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2] libsepol: Add ability to sort ocontexts in libsepol and add option to use it in checkpolicy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH] README: Update the SELinux mailing list location
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Blocking exec on processes based on arguments
- From: Ville Baillie <VilleB@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the SELinux mailing list location
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update the SELinux mailing list location
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v1 21/22] LSM: Multiple concurrent major security modules
- From: Piotr Sawicki <p.sawicki2@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- selinux list is moving
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: improve semanage_migrate_store import failure
- From: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] restorecond: Do not ignore the -f option
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] restorecond: Do not ignore the -f option
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/19] LSM: Correct file blob free empty blob check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: SETools 4.2.0-rc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/5] capability: Repair sidechannel test in ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 6/5] capability: Repair sidechannel test in ptrace
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 20/19] LSM: Correct file blob free empty blob check
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] libselinux: fix selinux_restorecon() on non-SELinux hosts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: fix selinux_restorecon() on non-SELinux hosts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfiles rootfs labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfiles rootfs labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setfiles rootfs labeling
- From: sajjad ahmed via Selinux <selinux@xxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] whitespace and spelling cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [PATCH 2/2] secilc: better error handling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] whitespace and spelling cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: file context not being set on el7
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] whitespace and spelling cleanup
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] secilc: better error handling
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 15/19] LSM: Infrastructure management of the task security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/19] LSM: Infrastructure management of the file security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 10/19] Smack: Abstract use of file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/19] Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/19] Smack: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 19/19] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 15/19] LSM: Infrastructure management of the task security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 13/19] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 11/19] LSM: Infrastructure management of the file security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 12/19] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 10/19] Smack: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 08/19] Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 02/19] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 03/19] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 01/19] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] python/sepolicy: Update to work with setools-4.2.0
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] secilc: better error handling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] secilc: better error handling
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 10/34] selinux: Implement the new mount API LSM hooks [ver #12]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Bug in selinux on ubuntu 16.04 with kernel 4.15.0-34
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: file context not being set on el7
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Bug in selinux on ubuntu 16.04 with kernel 4.15.0-34
- From: Benjamin Schüle <bschuele@xxxxxxxxx>
- file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 13/16] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- RE: [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v3 12/16] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 11/16] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 08/16] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 06/16] AppArmor: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 05/16] SELinux: Remove unused selinux_is_enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 04/16] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 03/16] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 02/16] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 00/16] LSM: Module stacking in support of SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 01/16] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bug report
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] checkpolicy: remove extraneous policy build noise
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- FYI: email change
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] python/sepolicy: search() for dontaudit rules as well
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 09/10] LSM: Infrastructure management of the inode security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 08/10] Smack: Abstract use of inode security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/10] SELinux: Abstract use of inode security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/10] LSM: Infrastructure management of the file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 05/10] SELinux: Abstract use of file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 03/10] SELinux: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/10] Smack: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/6] selinux: convert to kvmalloc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: "Ahmed S. Darwish" <darwish.07@xxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joe Nall <joe@xxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH 07/10] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/10] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/10] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/10] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/10] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/10] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/10] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/10] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Bug report
- From: 李 武刚 <liwugang@xxxxxxxxxxx>
- Re: WARNING: kmalloc bug in str_read
- From: syzbot <syzbot+ac488b9811036cea7ea0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- systemd unit improvements
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- WARNING: kmalloc bug in str_read
- From: syzbot <syzbot+ac488b9811036cea7ea0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] semanage: add a missing space in ibendport help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] semanage: "semanage user" does not use -s, fix documentation
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] semanage: "semanage user" does not use -s, fix documentation
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] semanage: add a missing space in ibendport help
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: "semanage user" and -s option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "semanage user" and -s option
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/1] libsemanage: use previous seuser when getting the previous name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- "semanage user" and -s option
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Micah Morton <mortonm@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v4 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 5/5] SELinux: Support SELinux determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 4/5] Smack: Support determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 2/5] X86: Support LSM determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH] libsemanage: reset umask before creating directories
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] python: remove semicolon from end of lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- [PATCH] libsemanage: reset umask before creating directories
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 2/5] X86: Support LSM determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 4/5] Smack: Support determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 5/5] SELinux: Support SELinux determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: [PATCH 3/3] python: remove semicolon from end of lines
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: reindent pywrap-test.py with spaces
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH RFC v2 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH 3/3] python: remove semicolon from end of lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] Travis-CI: upgrade to Ubuntu 16.04 LTS Xenial Xerus
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: add a const to suppress a build warning with Python 3.7
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsemanage: reindent pywrap-test.py with spaces
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] Travis-CI: run flake8 on Python code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 4/5] Smack: Support determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 1/1] Travis-CI: run flake8 on Python code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: add missing % in network tab help text
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Kees Cook via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [GIT PULL] SELinux patches for v4.19
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] libsemanage: reset umask before creating directories
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 02/13] python/sepolgen: do not import twice the modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 06/13] python/sepolgen: fix refpolicy parsing of "permissive"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 13/13] python/sepolicy: do not import types
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 09/13] python/sepolgen: use self when accessing members in FilesystemUse
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 01/13] libselinux: fix flake8 warnings in SWIG-generated code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 04/13] python/sepolicy: drop unused CheckPolicyType
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 07/13] python/sepolgen: silence linter warning about has_key
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 10/13] python/sepolicy: fix "procotol" misspelling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 03/13] python/sepolgen: return NotImplemented instead of raising it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 05/13] python/sepolicy: use lowercase variable name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 08/13] python/sepolgen: remove buggy code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 11/13] python/sepolicy: use variables which exist in the gui.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: reset umask before creating directories
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/1] python/sepolicy: add missing % in network tab help text
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 04/13] python/sepolicy: drop unused CheckPolicyType
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 13/13] python/sepolicy: do not import types
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 06/13] python/sepolgen: fix refpolicy parsing of "permissive"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 11/13] python/sepolicy: use variables which exists in the gui.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 09/13] python/sepolgen: use self when accessing members in FilesystemUse
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 08/13] python/sepolgen: comment buggy code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 05/13] python/sepolicy: use lowercase variable name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 01/13] libselinux: fix flake8 warnings in SWIG-generated code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 02/13] python/sepolgen: do not import twice the modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 03/13] python/sepolgen: return NotImplemented instead of raising it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 10/13] python/sepolicy: fix "procotol" misspelling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 07/13] python/sepolgen: silence linter warning about has_key
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: maybe resource leak in security/selinux/selinuxfs.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Piotr Sawicki <p.sawicki2@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/33] VFS: Introduce filesystem context [ver #11]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/33] selinux: Implement the new mount API LSM hooks [ver #11]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/38] VFS: Introduce filesystem context [ver #10]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/38] selinux: Implement the new mount API LSM hooks [ver #10]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] selinux: constify write_op[]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: constify write_op[]
- From: Eric Biggers via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 19/22] LSM: Use multiple secids in LSM interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 22/22] Netfilter: Add a selection for Smack
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 17/22] LSM: Allow mount options from multiple security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 15/22] LSM: Mark security blob allocation failures as unlikely
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 14/22] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 21/22] LSM: Multiple concurrent major security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 16/22] LSM: Sharing of security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 18/22] LSM: Use multiple secids in security module interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 13/22] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 06/22] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 12/22] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 11/22] LSM: Infrastructure management of the superblock security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 10/22] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 04/22] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]