SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: gcc 9.0.0 build issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: gcc 9.0.0 build issues
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] checkpolicy: Update manpage
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH v2] dbus: Fix name of polkit function
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] dbus: Fix name of polkit function
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH rdma-rc v1 4/4] IB/core: Don't register each MAD agent for LSM notifier
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] python/semanage/seobject: Fix listing boolean values
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] libsepol/cil: silence static analyser's use-after-free warning
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] checkpolicy: Add -S option to manpage
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] dbus: Fix name of polkit function
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v2] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: genhomedircon - improve handling large groups
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/2] python/semanage: Use standard argparse.error() method in handlePermissive
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/2] python/semanage module: Fix handling of -a/-e/-d/-r options
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] gui: Make all polgen button labels translatable
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libselinux/selinux_restorecon: Skip customized files also without -v
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: Fix classmap for BPF
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] selinux: Fix classmap for BPF
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [Non-DoD Source] [PATCH 1/1] libsepol: do not use uninitialized value for low_value
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] scripts/release: Update links to use release assets instead of wiki links
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] selinux: Fix classmap for BPF
From
: "William A. Kennington III" <william@xxxxxxxxxxxxxxx>
Re: [PATCH] selinux: fix avc audit messages
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: fix avc audit messages
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [bug report] selinux: kill selinux_sb_get_mnt_opts()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 5/5] kernfs: initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 3/5] LSM: add new hook for kernfs node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 4/5] selinux: implement the kernfs_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 2/5] kernfs: use simple_xattrs for security attributes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
From
: kbuild test robot <lkp@xxxxxxxxx>
[bug report] selinux: kill selinux_sb_get_mnt_opts()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v4 5/5] kernfs: initialize security of newly created nodes
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH v4 2/5] kernfs: use simple_xattrs for security attributes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v4 5/5] kernfs: initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v4 1/5] selinux: try security xattr after genfs for kernfs filesystems
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v4 3/5] LSM: add new hook for kernfs node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v4 4/5] selinux: implement the kernfs_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v4 0/5] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] checkpolicy: Add -S option to manpage
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: [PATCH] python/semanage: Examples are no longer in the main semanage man page
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] libselinux: Change matchpathcon usage to match with matchpathcon manpage
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] libselinux: set an appropriate errno in booleans.c
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/restorecon: add force option
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
ANN: SETools 4.2.1
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [PATCH 0/3] Support flake8 version 3.7
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [Non-DoD Source] [PATCH 1/1] libsepol: do not use uninitialized value for low_value
From
: jwcart2 <jwcart2@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Support flake8 version 3.7
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] scripts/release: Update links to use release assets instead of wiki links
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] libsepol: do not use uninitialized value for low_value
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/restorecon: add force option
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH rdma-rc v1 4/4] IB/core: Don't register each MAD agent for LSM notifier
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH rdma-rc v1 3/4] IB/core: Eliminate a hole in MAD agent struct
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH rdma-rc v1 2/4] IB/core: Fix potential memory leak while creating MAD agents
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH rdma-rc v1 1/4] IB/core: Unregister notifier before freeing MAD security
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH rdma-rc v1 0/4] IB selinux related fixes
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: gcc 9.0.0 build issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
ANN: Reference Policy release
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [Non-DoD Source] [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: jwcart2 <jwcart2@xxxxxxxxxxxxx>
Re: [Non-DoD Source] Re: [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: jwcart2 <jwcart2@xxxxxxxxxxxxx>
gcc 9.0.0 build issues
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [Non-DoD Source] Re: [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: jwcart2 <jwcart2@xxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: Cong Wang <xiyou.wangcong@xxxxxxxxx>
[PATCH] python/semanage/seobject: Fix listing boolean values
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Don Dutile <ddutile@xxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] LSM: Allow syzbot to ignore security= parameter.
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH 3/3] libsemanage: Fix USE_AFTER_FREE defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] python/semanage: Examples are no longer in the main semanage man page
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] libselinux: Change matchpathcon usage to match with matchpathcon manpage
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] libselinux: set an appropriate errno in booleans.c
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 3/3] libsemanage: Fix USE_AFTER_FREE defects reported by coverity scan
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/3] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/3] python: use == or != when comparing a variable with a string or a integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/3] python: reindent lines that were over-indented
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/3] python/sepolicy: fix variable name
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 0/3] Support flake8 version 3.7
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] libselinux: Change matchpathcon usage to match with matchpathcon manpage
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/2] libselinux: set an appropriate errno in booleans.c
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] dbus: Fix name of polkit function
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] python/semanage: Examples are no longer in the main semanage man page
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Tejun Heo <tj@xxxxxxxxxx>
[PATCH] scripts/release: Update links to use release assets instead of wiki links
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/3] libsemanage: Fix USE_AFTER_FREE defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/3] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: Why is bash calling ioctl?
From
: "Kevin W. Wall" <kevin.w.wall@xxxxxxxxx>
Re: [PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: runcon in enforcing mode
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
runcon in enforcing mode
From
: Ian Pilcher <arequipeno@xxxxxxxxx>
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
From
: syzbot <syzbot+1bfc00ca3aabe5bcd4cb@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: Why is bash calling ioctl?
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Why is bash calling ioctl?
From
: Ian Pilcher <arequipeno@xxxxxxxxx>
Re: [PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Micah Morton <mortonm@xxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
[PATCH] python/restorecon: add force option
From
: Viktor Ashirov <vashirov@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
[PATCH v3 5/5] kernfs: initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 4/5] selinux: implement the kernfs_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 3/5] LSM: add new hook for kernfs node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 2/5] kernfs: use simple_xattrs for security attributes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 1/5] selinux: try security xattr after genfs for kernfs filesystems
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 0/5] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: WARNING in apparmor_secid_to_secctx
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Don Dutile <ddutile@xxxxxxxxxx>
Re: [PATCH v2] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v2] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [GitHub PR #118] Add russian translations for man pages
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
From
: Leon Romanovsky <leon@xxxxxxxxxx>
[PATCH] selinux: replace BUG_ONs with WARN_ONs in avc.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3 3/4] selinux: remove some useless BUG_ONs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3 4/4] selinux: log invalid contexts in AVCs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3 2/4] selinux: replace some BUG_ON()s with a WARN_ON()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3 1/4] selinux: inline some AVC functions used only once
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3 3/4] selinux: remove some useless BUG_ONs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3 4/4] selinux: log invalid contexts in AVCs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v3 2/4] selinux: replace some BUG_ON()s with a WARN_ON()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v3 1/4] selinux: inline some AVC functions used only once
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] restorecond: Install DBUS service file with 644 permissions
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v3 3/4] selinux: remove some useless BUG_ONs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
ANN: SELinux userspace 2.9-rc1 release candidate
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v3 4/4] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 3/4] selinux: remove some useless BUG_ONs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 2/4] selinux: replace some BUG_ON()s with a WARN_ON()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 1/4] selinux: inline some AVC functions used only once
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 0/4] Report raw context in AVCs + refactoring
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: avc: mark avc node as not a leak
From
: Prateek Patel <prpatel@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[GitHub PR #118] Add russian translations for man pages
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] restorecond: Install DBUS service file with 644 permissions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] restorecond: Install DBUS service file with 644 permissions
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
[PATCH v2] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Steve Grubb <sgrubb@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Steve Grubb <sgrubb@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[PATCH 3/3] scripts: introduce env_use_destdir.sh helper
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/3] Travis-CI: add Ruby 2.6 to the test matrix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Richard Guy Briggs <rgb@xxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH -next] selinux: Fix error return code in policydb_read()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v5.0 (#1)
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] SELinux fixes for v5.0 (#1)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 3/3] kernfs: Initialize security of newly created nodes
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] selinux: Implement the object_init_security hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: general protection fault in ebitmap_destroy
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RFC: introduce new library versions for added symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] security/selinux/hooks: remove unneeded semicolon
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
last call for selinux 2.9-rc1 release
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: general protection fault in ebitmap_destroy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v2 3/3] kernfs: Initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 2/3] selinux: Implement the object_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
general protection fault in ebitmap_destroy
From
: syzbot <syzbot+6664500f0f18f07a5c0e@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] selinux: Implement the object_init_security hook
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: avc: mark avc node as not a leak
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/3] selinux: Implement the object_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: avc: mark avc node as not a leak
From
: Prateek Patel <prpatel@xxxxxxxxxx>
[PATCH AUTOSEL 4.20 032/117] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 25/97] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 12/53] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 09/36] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 5/5] python: run all the tests with "make test"
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 4/4] python/audit2allow: allow using audit2why as non-root user
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 5/5] python: run all the tests with "make test"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/5] python/sepolgen: refpolicy installs its Makefile in include/Makefile
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/5] python/audit2allow: make the tests useful again
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/5] python/audit2allow: use local sepolgen-ifgen-attr-helper for tests
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/5] Travis-CI: download refpolicy and install headers
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 0/5] Run tests in python/ with "make test"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] python/semanage: explain why sepolicy is imported in a function
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 5/5] python/sepolicy: Make policy files sorting more robust
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
selinux list move final notice
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 3/3] semanage_migrate_store: switch to space indentation
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 5/5] python/sepolicy: Make policy files sorting more robust
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 4/5] python/semanage: Load a store policy and set the store SELinux policy root
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 3/5] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 2/5] python/semanage: import sepolicy only when it's needed
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 1/5] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [GIT PULL] SELinux patches v4.21
From
: pr-tracker-bot@xxxxxxxxxx
Re: [V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Jason Zaman <jason@xxxxxxxxxxxxx>
[V2 PATCH 3/3] Makefile: add -Wstrict-overflow=5 to CFLAGS
From
: bill.c.roberts@xxxxxxxxx
[V2 PATCH 2/3] build: set _FORTIFY_SOURCE=2 in libselinux
From
: bill.c.roberts@xxxxxxxxx
[V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: bill.c.roberts@xxxxxxxxx
[GIT PULL] SELinux patches v4.21
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 4/4] python/audit2allow: allow using audit2why as non-root user
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/4] python/audit2allow/sepolgen-ifgen: show errors on stderr
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/4] python/audit2allow/sepolgen-ifgen: add missing \n to error message
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/4] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 1/2] selinux: never allow relabeling on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v2 2/2] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 1/2] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 0/2] Fix SELinux context mount with the cgroup filesystem
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/4] python/semanage: Load a store policy and set the store SELinux policy root
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/4] python/semanage: import sepolicy only when it's needed
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Fix semanage in envinronment without default policy or when -S <store> is used
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/3] semanage_migrate_store: switch to space indentation
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/3] semanage_migrate_store: remove unused loading of libsepol.so
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/3] semanage_migrate_store: fix many Python linter warnings
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] mcstrans: Fix check in raw_color()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] python/sepolgen: always indent with 4 spaces
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] mcstrans: Fix check in raw_color()
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 2/2] mcstrans: fix Python linter warnings on test scripts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Patrick Steinhardt <ps@xxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Jason Zaman <jason@xxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] python/sepolicy: search() also for dontaudit rules
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Fwd: [PATCH 3/7] selinux: convert to kvmalloc
From
: peter enderborg <peter.enderborg@xxxxxxxx>
Fwd: [PATCH 3/7] selinux: convert to kvmalloc
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/1] python/sepolgen: always indent with 4 spaces
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] mcstrans: fix Python linter warnings on test scripts
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] mcstrans: convert test scripts to Python 3
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/sepolicy: search() also for dontaudit rules
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 2/2] Makefile: add -Wstrict-overflow=5 to CFLAGS
From
: bill.c.roberts@xxxxxxxxx
[PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: bill.c.roberts@xxxxxxxxx
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 0/3] Fix SELinux context mount with the cgroup filesystem
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] python/sepolicy: search() also for dontaudit rules
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/2] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 02/38] LSM: Provide separate ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 06/38] LSM: Introduce CONFIG_LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 15/38] LSM: Split LSM preparation from initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 17/38] Yama: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 18/38] LSM: Introduce enum lsm_order
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 16/38] LoadPin: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 23/38] SELinux: Remove cred security blob poisoning
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 22/38] SELinux: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 25/38] AppArmor: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 26/38] TOMOYO: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 27/38] Infrastructure management of the cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 28/38] SELinux: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 31/38] SELinux: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 32/38] Smack: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 30/38] LSM: Infrastructure management of the file security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 34/38] LSM: Infrastructure management of the task security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 36/38] Smack: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 33/38] LSM: Infrastructure management of the inode security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 29/38] Smack: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 20/38] procfs: add smack subdir to attrs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 21/38] Smack: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: James Morris <jmorris@xxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/2] python/chcat: improve the code readability
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: Include MCS/MLS range when exporting local customizations
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] python/chcat: improve the code readability
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/chcat: use check_call instead of getstatusoutput
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[RFC PATCH v2 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC PATCH v2 1/2] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: BMK <bmktuwien@xxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH] python/semanage: Include MCS/MLS range when exporting local customizations
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[PATCH] python/chcat: use check_call instead of getstatusoutput
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [apparmor] Security modules and sending signals within the same process
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: Kernel Ueventd KConfig
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel Ueventd KConfig
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v4 0/2] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Kernel Ueventd KConfig
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: David Howells <dhowells@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v4.20 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[GIT PULL] SELinux fixes for v4.20 (#2)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
[RFC PATCH v3 9/9] [squash] add back reverse lookup cache to sidtab
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 8/9] [fixup] fix SIDTAB_LEAF_ENTRIES to use the correct size macro
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 5/9] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 7/9] [fixup] remove the now unneeded 'out' label
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 6/9] [fixup] fix handling of invalid context in convert_context
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 4/9] [fixup] cosmetic tweak for sidtab_search_core()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 1/9] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 2/9] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 0/9] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v5 21/38] Smack: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 22/38] SELinux: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 23/38] SELinux: Remove cred security blob poisoning
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 06/38] LSM: Introduce CONFIG_LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 02/38] LSM: Provide separate ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
[PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 17/38] Yama: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 29/38] Smack: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 28/38] SELinux: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 36/38] Smack: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 15/38] LSM: Split LSM preparation from initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 33/38] LSM: Infrastructure management of the inode security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 32/38] Smack: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 34/38] LSM: Infrastructure management of the task security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 31/38] SELinux: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 30/38] LSM: Infrastructure management of the file security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 27/38] Infrastructure management of the cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 26/38] TOMOYO: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 25/38] AppArmor: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 20/38] procfs: add smack subdir to attrs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 16/38] LoadPin: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 18/38] LSM: Introduce enum lsm_order
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 4/4] [squash] add back reverse lookup cache to sidtab
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 1/4] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 0/4] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: make "selinux_policycap_names[]" const char *
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: make "selinux_policycap_names[]" const char *
From
: Alexey Dobriyan <adobriyan@xxxxxxxxx>
Re: [PATCH] libsepol: ibpkeys.c: fix printf format string specifiers for subnet_prefix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/1] gui: remove html_util.py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] gui: remove html_util.py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] Documentation: Update SELinux reference policy URL
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/1] Documentation: Update SELinux reference policy URL
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Container SELinux Customization tool - udica
From
: Lukas Vrabec <lvrabec@xxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v4.20 (#1)
From
: pr-tracker-bot@xxxxxxxxxx
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]