SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v3 3/4] selinux: remove some useless BUG_ONs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 2/4] selinux: replace some BUG_ON()s with a WARN_ON()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 1/4] selinux: inline some AVC functions used only once
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3 0/4] Report raw context in AVCs + refactoring
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: avc: mark avc node as not a leak
From
: Prateek Patel <prpatel@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[GitHub PR #118] Add russian translations for man pages
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] restorecond: Install DBUS service file with 644 permissions
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] selinux: log invalid contexts in AVCs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] restorecond: Install DBUS service file with 644 permissions
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
[PATCH v2] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Steve Grubb <sgrubb@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Steve Grubb <sgrubb@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[PATCH 3/3] scripts: introduce env_use_destdir.sh helper
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/3] Travis-CI: add Ruby 2.6 to the test matrix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/3] Travis-CI: upgrade PyPy to 6.0
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Richard Guy Briggs <rgb@xxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Re: [PATCH -next] selinux: Fix error return code in policydb_read()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Nazarov Sergey <s-nazarov@xxxxxxxxx>
Re: [PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH -next] selinux: Fix error return code in policydb_read()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [RFC PATCH] selinux: log invalid contexts in AVCs
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC PATCH] selinux: log invalid contexts in AVCs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v5.0 (#1)
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] SELinux fixes for v5.0 (#1)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] libselinux/audit2why.so: Filter out non-python related symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 3/3] kernfs: Initialize security of newly created nodes
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] selinux: Implement the object_init_security hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: general protection fault in ebitmap_destroy
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: RFC: introduce new library versions for added symbols
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
RFC: introduce new library versions for added symbols
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v2] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] setsebool: support use of -P on SELinux-disabled hosts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] security/selinux/hooks: remove unneeded semicolon
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
last call for selinux 2.9-rc1 release
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: general protection fault in ebitmap_destroy
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v2 3/3] kernfs: Initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 2/3] selinux: Implement the object_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
general protection fault in ebitmap_destroy
From
: syzbot <syzbot+6664500f0f18f07a5c0e@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] selinux: Implement the object_init_security hook
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: avc: mark avc node as not a leak
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH 3/3] kernfs: Initialize security of newly created nodes
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/3] selinux: Implement the object_init_security hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/3] LSM: Add new hook for generic node initialization
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: avc: mark avc node as not a leak
From
: Prateek Patel <prpatel@xxxxxxxxxx>
[PATCH AUTOSEL 4.20 032/117] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 25/97] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 12/53] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 09/36] selinux: always allow mounting submounts
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 5/5] python: run all the tests with "make test"
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: set selinux policy root around calls to selinux_boolean_sub
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 4/4] python/audit2allow: allow using audit2why as non-root user
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 5/5] python: run all the tests with "make test"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/5] python/sepolgen: refpolicy installs its Makefile in include/Makefile
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/5] python/audit2allow: make the tests useful again
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/5] python/audit2allow: use local sepolgen-ifgen-attr-helper for tests
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/5] Travis-CI: download refpolicy and install headers
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 0/5] Run tests in python/ with "make test"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] python/semanage: explain why sepolicy is imported in a function
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 5/5] python/sepolicy: Make policy files sorting more robust
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
selinux list move final notice
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 3/3] semanage_migrate_store: switch to space indentation
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 5/5] python/sepolicy: Make policy files sorting more robust
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 4/5] python/semanage: Load a store policy and set the store SELinux policy root
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 3/5] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 2/5] python/semanage: import sepolicy only when it's needed
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 1/5] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: Always set errno to 0 before calling getpwent()
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [GIT PULL] SELinux patches v4.21
From
: pr-tracker-bot@xxxxxxxxxx
Re: [V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Jason Zaman <jason@xxxxxxxxxxxxx>
[V2 PATCH 3/3] Makefile: add -Wstrict-overflow=5 to CFLAGS
From
: bill.c.roberts@xxxxxxxxx
[V2 PATCH 2/3] build: set _FORTIFY_SOURCE=2 in libselinux
From
: bill.c.roberts@xxxxxxxxx
[V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: bill.c.roberts@xxxxxxxxx
[GIT PULL] SELinux patches v4.21
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 2/2] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 4/4] python/audit2allow: allow using audit2why as non-root user
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/4] python/audit2allow/sepolgen-ifgen: show errors on stderr
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/4] python/audit2allow/sepolgen-ifgen: add missing \n to error message
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/4] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 1/2] selinux: never allow relabeling on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v2 2/2] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 1/2] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2 0/2] Fix SELinux context mount with the cgroup filesystem
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/4] python/semanage: Load a store policy and set the store SELinux policy root
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/4] python/sepolicy: Add sepolicy.load_store_policy(store)
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/4] python/semanage: import sepolicy only when it's needed
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/4] python/semanage: move valid_types initialisations to class constructors
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Fix semanage in envinronment without default policy or when -S <store> is used
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/3] semanage_migrate_store: switch to space indentation
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/3] semanage_migrate_store: remove unused loading of libsepol.so
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/3] semanage_migrate_store: fix many Python linter warnings
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] mcstrans: Fix check in raw_color()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] python/sepolgen: always indent with 4 spaces
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] mcstrans: Fix check in raw_color()
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 2/2] mcstrans: fix Python linter warnings on test scripts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Patrick Steinhardt <ps@xxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Jason Zaman <jason@xxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] python/sepolicy: search() also for dontaudit rules
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Fwd: [PATCH 3/7] selinux: convert to kvmalloc
From
: peter enderborg <peter.enderborg@xxxxxxxx>
Fwd: [PATCH 3/7] selinux: convert to kvmalloc
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/1] python/sepolgen: always indent with 4 spaces
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] mcstrans: fix Python linter warnings on test scripts
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] mcstrans: convert test scripts to Python 3
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/sepolicy: search() also for dontaudit rules
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 2/2] Makefile: add -Wstrict-overflow=5 to CFLAGS
From
: bill.c.roberts@xxxxxxxxx
[PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error
From
: bill.c.roberts@xxxxxxxxx
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[RFC PATCH 3/3] selinux: do not override context on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 2/3] selinux: never allow relabeling on context mounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 1/3] cgroup: fix parsing empty mount option string
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 0/3] Fix SELinux context mount with the cgroup filesystem
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
Re: SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
SELinux testsuite failure in overlayfs with v4.20-rc kernels
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] python/sepolicy: search() also for dontaudit rules
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 1/2] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 02/38] LSM: Provide separate ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 06/38] LSM: Introduce CONFIG_LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 15/38] LSM: Split LSM preparation from initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 17/38] Yama: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 18/38] LSM: Introduce enum lsm_order
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 16/38] LoadPin: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 23/38] SELinux: Remove cred security blob poisoning
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 22/38] SELinux: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 25/38] AppArmor: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 26/38] TOMOYO: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 27/38] Infrastructure management of the cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 28/38] SELinux: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 31/38] SELinux: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 32/38] Smack: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 30/38] LSM: Infrastructure management of the file security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 34/38] LSM: Infrastructure management of the task security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 36/38] Smack: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 33/38] LSM: Infrastructure management of the inode security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 29/38] Smack: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 20/38] procfs: add smack subdir to attrs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 21/38] Smack: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: James Morris <jmorris@xxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/2] python/chcat: improve the code readability
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: Include MCS/MLS range when exporting local customizations
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/2] python/chcat: fix removing categories on users with Fedora default setup
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] python/chcat: improve the code readability
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/chcat: use check_call instead of getstatusoutput
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[RFC PATCH v2 2/2] selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC PATCH v2 1/2] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: BMK <bmktuwien@xxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH] python/semanage: Include MCS/MLS range when exporting local customizations
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: SELinux logging problem
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
SELinux logging problem
From
: BMK <bmktuwien@xxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[PATCH] python/chcat: use check_call instead of getstatusoutput
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [apparmor] Security modules and sending signals within the same process
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: Kernel Ueventd KConfig
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Security modules and sending signals within the same process
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Kernel Ueventd KConfig
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[RFC PATCH v4 2/2] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v4 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v4 0/2] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Kernel Ueventd KConfig
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Security modules and sending signals within the same process
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: David Howells <dhowells@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v4.20 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Daniel Walsh <dwalsh@xxxxxxxxxx>
Re: [RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[GIT PULL] SELinux fixes for v4.20 (#2)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
[RFC PATCH v3 9/9] [squash] add back reverse lookup cache to sidtab
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 8/9] [fixup] fix SIDTAB_LEAF_ENTRIES to use the correct size macro
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 5/9] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 7/9] [fixup] remove the now unneeded 'out' label
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 6/9] [fixup] fix handling of invalid context in convert_context
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 4/9] [fixup] cosmetic tweak for sidtab_search_core()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 3/9] [fixup] fix handling of SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 1/9] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 2/9] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v3 0/9] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH v5 21/38] Smack: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 22/38] SELinux: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 23/38] SELinux: Remove cred security blob poisoning
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 06/38] LSM: Introduce CONFIG_LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 02/38] LSM: Provide separate ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
[PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
overlayfs access checks on underlying layers
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 17/38] Yama: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 29/38] Smack: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 28/38] SELinux: Abstract use of file security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 36/38] Smack: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 15/38] LSM: Split LSM preparation from initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 33/38] LSM: Infrastructure management of the inode security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 32/38] Smack: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 34/38] LSM: Infrastructure management of the task security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 31/38] SELinux: Abstract use of inode security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 30/38] LSM: Infrastructure management of the file security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 27/38] Infrastructure management of the cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 26/38] TOMOYO: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 25/38] AppArmor: Abstract use of cred security blob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 20/38] procfs: add smack subdir to attrs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 16/38] LoadPin: Initialize as ordered LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 18/38] LSM: Introduce enum lsm_order
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[RFC PATCH v2 3/4] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 4/4] [squash] add back reverse lookup cache to sidtab
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 2/4] [squash] do not store entry for SECSID_NULL
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 1/4] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v2 0/4] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: linux-next: manual merge of the selinux tree with the vfs tree
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: make "selinux_policycap_names[]" const char *
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: make "selinux_policycap_names[]" const char *
From
: Alexey Dobriyan <adobriyan@xxxxxxxxx>
Re: [PATCH] libsepol: ibpkeys.c: fix printf format string specifiers for subnet_prefix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/1] gui: remove html_util.py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] gui: remove html_util.py
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] Documentation: Update SELinux reference policy URL
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/1] Documentation: Update SELinux reference policy URL
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH] selinux: always allow mounting submounts
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] dbus: remove deprecated at_console statement
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Container SELinux Customization tool - udica
From
: Lukas Vrabec <lvrabec@xxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v4.20 (#1)
From
: pr-tracker-bot@xxxxxxxxxx
Re: Android kill capability denials
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Android kill capability denials
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re:
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[GIT PULL] SELinux fixes for v4.20 (#1)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: fix non-MLS handling in mls_context_to_sid()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: fix non-MLS handling in mls_context_to_sid()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: use separate table for initial SID lookup
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux MLS for Apache Process
From
: Ishara Fernando <roshane.ishara@xxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] selinux: use separate table for initial SID lookup
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Kernel panic - not syncing: corrupted stack end detected inside scheduler
From
: Qian Cai <cai@xxxxxx>
Re: [RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v3] selinux: simplify mls_context_to_sid()
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] selinux: check length properly in SCTP bind hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: check length properly in SCTP bind hook
From
: Qian Cai <cai@xxxxxx>
Re: [PATCH] selinux: check length properly in SCTP bind hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] selinux: check length properly in SCTP bind hook
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[RFC PATCH 3/3] selinux: overhaul sidtab to fix bug and improve performance
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 2/3] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 1/3] selinux: refactor sidtab conversion
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH 0/3] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: "Qian Cai" <cai@xxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Qian Cai <cai@xxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Qian Cai <cai@xxxxxx>
Re: BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150
From
: Qian Cai <cai@xxxxxx>
[PATCH v3] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re:
From
: Ravi Kumar <nxp.ravi@xxxxxxxxx>
[no subject]
From
: Ravi Kumar <nxp.ravi@xxxxxxxxx>
[PATCH 1/1] gui: remove html_util.py
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] libselinux: selinux_restorecon: fix printf format string specifier for uint64_t
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python: replace aliases with corresponding type names
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
ANN: SETools 4.2.0
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [Non-DoD Source] Re: [PATCH 1/1] libsepol: mark permissive types when loading a binary policy
From
: jwcart2 <jwcart2@xxxxxxxxxxxxx>
[PATCH v2] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: simplify mls_context_to_sid()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] python: replace aliases with corresponding type names
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux MLS for Apache Process
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux MLS for Apache Process
From
: Ishara Fernando <roshane.ishara@xxxxxxxxx>
Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] libsepol: mark permissive types when loading a binary policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: SELinux MLS for Apache Process
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: SELinux MLS for Apache Process
From
: Ishara Fernando <roshane.ishara@xxxxxxxxx>
Re: SELinux MLS for Apache Process
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
SELinux MLS for Apache Process
From
: Ishara Fernando <roshane.ishara@xxxxxxxxx>
Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6] selinux: policydb - fix byte order and alignment issues
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6 5/5] sidechannel: Linux Security Module for sidechannel
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v6 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
[PATCH v6 0/5] LSM: Support ptrace sidechannel access checks
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
[PATCH v6 5/5] sidechannel: Linux Security Module for sidechannel
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
[PATCH v6 4/5] Capability: Complete PTRACE_MODE_SCHED
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
[PATCH v6 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
[PATCH v6 2/5] Smack: Prepare for PTRACE_MODE_SCHED
From
: Casey Schaufler <casey.schaufler@xxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 1/2] selinux: use separate table for initial SID lookup
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/2] selinux: use separate table for initial SID lookup
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 0/2] Fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/2] selinux: fix ENOMEM errors during policy reload
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2] libsepol: add missing ibendport port validity check
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v2] libsepol: add missing ibendport port validity check
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: cil mlsconstrain
From
: Ted Toth <txtoth@xxxxxxxxx>
Re: cil mlsconstrain
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v6] selinux: policydb - fix byte order and alignment issues
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: cil mlsconstrain
From
: Ted Toth <txtoth@xxxxxxxxx>
Re: cil mlsconstrain
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
cil mlsconstrain
From
: Ted Toth <txtoth@xxxxxxxxx>
[PATCH v6] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2] libsepol: add missing ibendport port validity check
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] libsepol: add missing ibendport port validity check
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] libsepol: add missing ibendport port validity check
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[PATCH v5] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] libsepol: add missing ibendport port validity check
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] libsepol: fix endianity in ibpkey range checks
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[PATCH v4] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Fix alias handling in sepolicy and semaange
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH v2] libsepol: fix endianity in ibpkey range checks
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3] selinux: policydb - fix byte order and alignment issues
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v3] selinux: policydb - fix byte order and alignment issues
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH] libsepol: fix endianity in ibpkey range checks
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[PATCH] libsepol: fix endianity in ibpkey range checks
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v3] selinux: policydb - fix byte order and alignment issues
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Fix alias handling in sepolicy and semaange
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v4.19 (#1)
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: Blocking exec on processes based on arguments
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
From
: Jiri Kosina <jikos@xxxxxxxxxx>
Re: [PATCH v2] selinux: fix byte order and alignment issues in policydb.c
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH 3/3] python/semanage: Stop rejecting aliases in semanage commands
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH 1/3] python/sepolicy: Fix "info" to search aliases as well
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH 2/3] python/sepolicy: Stop rejecting aliases in sepolicy commands
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Fix alias handling in sepolicy and semaange
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH v2] selinux: fix byte order and alignment issues in policydb.c
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[GIT PULL] SELinux fixes for v4.19 (#1)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 0/4] libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
[RFC] proposal for resolving the cred_guard_mutex deadlock
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
[PATCH v2 1/1] libsemanage: improve semanage_migrate_store import failure
From
: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
[PATCH v2 0/1] Modify exception handling in semanage_migrate_store
From
: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
[PATCH 4/4] libsepol: Add two new Xen initial SIDs
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 3/4] libsepol: Check that initial sid indexes are within the valid range
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 2/4] libsepol: Eliminate initial sid string definitions in module_to_cil.c
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 1/4] libsepol: Rename kernel_to_common.c stack functions
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 0/4] libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 1/2] libsepol: Create policydb_sort_ocontexts()
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 2/2] checkpolicy: Add option to sort ocontexts when creating a binary policy
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
[PATCH 0/2] libsepol: Add ability to sort ocontexts in libsepol and add option to use it in checkpolicy
From
: James Carter <jwcart2@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
[PATCH] README: Update the SELinux mailing list location
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Tycho Andersen <tycho@xxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Tycho Andersen <tycho@xxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Blocking exec on processes based on arguments
From
: Ville Baillie <VilleB@xxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update the SELinux mailing list location
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] MAINTAINERS: update the SELinux mailing list location
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v1 21/22] LSM: Multiple concurrent major security modules
From
: Piotr Sawicki <p.sawicki2@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Christian Brauner <christian@xxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: MLS dominance check behavior on el7
From
: Chad Hanson <dahchanson@xxxxxxxxx>
Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: MLS dominance check behavior on el7
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
From
: Jason Zaman <jason@xxxxxxxxxxxxx>
Re: [PATCH] libsemanage: improve semanage_migrate_store import failure
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
selinux list is moving
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: MLS dominance check behavior on el7
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
[PATCH] libsemanage: improve semanage_migrate_store import failure
From
: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
Re: [PATCH] selinux-testsuite: update the dependencies in README.md
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
From
: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
From
: Jiri Kosina <jikos@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]