SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] restorecond: Do not ignore the -f option
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] restorecond: Do not ignore the -f option
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race when removing selinuxfs entries
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/19] LSM: Correct file blob free empty blob check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: SETools 4.2.0-rc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/5] capability: Repair sidechannel test in ptrace
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 6/5] capability: Repair sidechannel test in ptrace
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 20/19] LSM: Correct file blob free empty blob check
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] libselinux: fix selinux_restorecon() on non-SELinux hosts
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: fix selinux_restorecon() on non-SELinux hosts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfiles rootfs labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setfiles rootfs labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setfiles rootfs labeling
- From: sajjad ahmed via Selinux <selinux@xxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] whitespace and spelling cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- autorelabel loops in system executed 'semodule -d unconfined'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [PATCH 2/2] secilc: better error handling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] whitespace and spelling cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: file context not being set on el7
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] whitespace and spelling cleanup
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] secilc: better error handling
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 15/19] LSM: Infrastructure management of the task security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/19] LSM: Infrastructure management of the file security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 10/19] Smack: Abstract use of file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/19] Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/19] Smack: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 19/19] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 14/19] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 15/19] LSM: Infrastructure management of the task security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 13/19] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 11/19] LSM: Infrastructure management of the file security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 12/19] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 10/19] Smack: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 08/19] Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 02/19] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 03/19] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 01/19] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] python/sepolicy: Update to work with setools-4.2.0
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] secilc: better error handling
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] secilc: better error handling
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 10/34] selinux: Implement the new mount API LSM hooks [ver #12]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Bug in selinux on ubuntu 16.04 with kernel 4.15.0-34
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: file context not being set on el7
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Bug in selinux on ubuntu 16.04 with kernel 4.15.0-34
- From: Benjamin Schüle <bschuele@xxxxxxxxx>
- file context not being set on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 13/16] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Florian Westphal <fw@xxxxxxxxx>
- RE: [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v3 12/16] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 11/16] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 09/16] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 08/16] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 06/16] AppArmor: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 05/16] SELinux: Remove unused selinux_is_enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 04/16] SELinux: Remove cred security blob poisoning
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 03/16] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 02/16] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 00/16] LSM: Module stacking in support of SARA and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 01/16] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_tables: add SECMARK support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] netfilter: nf_tables: add SECMARK support
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bug report
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: remove extraneous policy build noise
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] checkpolicy: remove extraneous policy build noise
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: add a fallback to defcontext for native labeling
- From: Taras Kondratiuk via Selinux <selinux@xxxxxxxxxxxxx>
- FYI: email change
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] python/sepolicy: search() for dontaudit rules as well
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 09/10] LSM: Infrastructure management of the inode security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 08/10] Smack: Abstract use of inode security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/10] SELinux: Abstract use of inode security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/10] LSM: Infrastructure management of the file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 05/10] SELinux: Abstract use of file security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 03/10] SELinux: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/10] Smack: Abstract use of cred security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/6] selinux: convert to kvmalloc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] procfs: add smack subdir to attrs
- From: "Ahmed S. Darwish" <darwish.07@xxxxxxxxx>
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: James Morris <jmorris@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joe Nall <joe@xxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Yuli Khodorkovskiy <yuli.khodorkovskiy@xxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH 07/10] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/10] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/10] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/10] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/10] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/10] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/10] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/10] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: MLS dominance check behavior on el7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- MLS dominance check behavior on el7
- From: Ted Toth <txtoth@xxxxxxxxx>
- Bug report
- From: 李 武刚 <liwugang@xxxxxxxxxxx>
- Re: WARNING: kmalloc bug in str_read
- From: syzbot <syzbot+ac488b9811036cea7ea0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- systemd unit improvements
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] selinux: Add __GFP_NOWARN to allocation at str_read()
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- WARNING: kmalloc bug in str_read
- From: syzbot <syzbot+ac488b9811036cea7ea0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] semanage: add a missing space in ibendport help
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] semanage: "semanage user" does not use -s, fix documentation
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] semanage: "semanage user" does not use -s, fix documentation
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] semanage: add a missing space in ibendport help
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: "semanage user" and -s option
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "semanage user" and -s option
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/1] libsemanage: use previous seuser when getting the previous name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- "semanage user" and -s option
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix mounting of cgroup2 under older policies
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: WARNING in apparmor_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Micah Morton <mortonm@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v4 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 5/5] SELinux: Support SELinux determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 4/5] Smack: Support determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 2/5] X86: Support LSM determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH] libsemanage: reset umask before creating directories
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] python: remove semicolon from end of lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- [PATCH] libsemanage: reset umask before creating directories
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 2/5] X86: Support LSM determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 4/5] Smack: Support determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH v3 5/5] SELinux: Support SELinux determination of side-channel
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: [PATCH 3/3] python: remove semicolon from end of lines
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- RE: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- RE: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: reindent pywrap-test.py with spaces
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH RFC v2 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH 3/3] python: remove semicolon from end of lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] Travis-CI: upgrade to Ubuntu 16.04 LTS Xenial Xerus
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: add a const to suppress a build warning with Python 3.7
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsemanage: reindent pywrap-test.py with spaces
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage: make pywrap-test.py compatible with Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] Travis-CI: run flake8 on Python code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 1/5] LSM: Introduce a hook for side-channel danger
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- [PATCH RFC 4/5] Smack: Support determination of side-channel vulnerability
- From: Casey Schaufler <casey.schaufler@xxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 1/1] Travis-CI: run flake8 on Python code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/sepolicy: add missing % in network tab help text
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Jordan Glover via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Kees Cook via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [GIT PULL] SELinux patches for v4.19
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] Fix build break around __atomic_*() with GCC<4.7
- From: Hollis Blanchard <hollis_blanchard@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: James Morris <jmorris@xxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry()
- From: Sachin Grover <grover_sachin@xxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] libsemanage: reset umask before creating directories
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 02/13] python/sepolgen: do not import twice the modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 06/13] python/sepolgen: fix refpolicy parsing of "permissive"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 13/13] python/sepolicy: do not import types
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 09/13] python/sepolgen: use self when accessing members in FilesystemUse
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 01/13] libselinux: fix flake8 warnings in SWIG-generated code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 04/13] python/sepolicy: drop unused CheckPolicyType
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 07/13] python/sepolgen: silence linter warning about has_key
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 10/13] python/sepolicy: fix "procotol" misspelling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 03/13] python/sepolgen: return NotImplemented instead of raising it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 05/13] python/sepolicy: use lowercase variable name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 08/13] python/sepolgen: remove buggy code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 11/13] python/sepolicy: use variables which exist in the gui.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BUG: Mount ignores mount options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- BUG: Mount ignores mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: reset umask before creating directories
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/1] python/sepolicy: add missing % in network tab help text
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Fix some issues found by flake8
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 04/13] python/sepolicy: drop unused CheckPolicyType
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 13/13] python/sepolicy: do not import types
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 06/13] python/sepolgen: fix refpolicy parsing of "permissive"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 11/13] python/sepolicy: use variables which exists in the gui.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 09/13] python/sepolgen: use self when accessing members in FilesystemUse
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 08/13] python/sepolgen: comment buggy code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 05/13] python/sepolicy: use lowercase variable name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 01/13] libselinux: fix flake8 warnings in SWIG-generated code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 02/13] python/sepolgen: do not import twice the modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 03/13] python/sepolgen: return NotImplemented instead of raising it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 00/13] Fix some issues found by flake8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 10/13] python/sepolicy: fix "procotol" misspelling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 07/13] python/sepolgen: silence linter warning about has_key
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: maybe resource leak in security/selinux/selinuxfs.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Piotr Sawicki <p.sawicki2@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/33] VFS: Introduce filesystem context [ver #11]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/33] selinux: Implement the new mount API LSM hooks [ver #11]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/38] VFS: Introduce filesystem context [ver #10]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/38] selinux: Implement the new mount API LSM hooks [ver #10]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [refpolicy] map permission in can_exec() but not in domain_transition_pattern()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- map permission in can_exec() but not in domain_transition_pattern()
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] selinux: constify write_op[]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: constify write_op[]
- From: Eric Biggers via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 19/22] LSM: Use multiple secids in LSM interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 22/22] Netfilter: Add a selection for Smack
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 17/22] LSM: Allow mount options from multiple security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 15/22] LSM: Mark security blob allocation failures as unlikely
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 14/22] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 21/22] LSM: Multiple concurrent major security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 16/22] LSM: Sharing of security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 18/22] LSM: Use multiple secids in security module interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 13/22] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 06/22] LSM: Infrastructure management of the file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 12/22] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 11/22] LSM: Infrastructure management of the superblock security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 10/22] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 04/22] LSM: Infrastructure management of the cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 09/22] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- PATCH v1 08/22] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 07/22] LSM: Infrastructure management of the task security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 05/22] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 03/22] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 02/22] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 01/22] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 00/22] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [refpolicy] ANN: SETools 4.2.0-beta
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] python/semanage: Replace bare except with specific one
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: blocking / mount using containers
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 07/32] selinux: Implement the new mount API LSM hooks [ver #9]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SETools 4.2.0-beta
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 07/32] selinux: Implement the new mount API LSM hooks [ver #9]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: blocking / mount using containers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsemanage getpwent and nss-systemd incompability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- blocking / mount using containers
- From: "Mclain, Warren" <warren_mclain@xxxxxxxxx>
- [PATCH] python/semanage: Replace bare except with specific one
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- libsemanage getpwent and nss-systemd incompability
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] python/semanage: Fix logger class definition
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] python/semanage: Fix logger class definition
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix minor typos
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC net-next 01/15] net: Reserve protocol numbers for LoRa
- From: Andreas Färber <afaerber@xxxxxxx>
- Re: [RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: close the PID file if writing to it failed
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] Travis-CI: use new location of refpolicy repository
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- ANN: Reference Policy release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 1/1] restorecond: close the PID file if writing to it failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] Travis-CI: use new location of refpolicy repository
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix minor typos
- From: Yuri Chornoivan <yurchor@xxxxxxx>
- Re: [PATCH] Fix minor typos
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] Fix minor typos
- From: Yuri Chornoivan <yurchor@xxxxxxx>
- [GIT PULL] SELinux fixes for v4.18 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: make dentry_init_security() return security module name
- From: "Yan, Zheng" <zyan@xxxxxxxxxx>
- Re: [PATCH] python/semanage: Stop logging loginRecords changes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: make dentry_init_security() return security module name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: move user accesses in selinuxfs out of locked regions
- From: Jann Horn via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: Reference Policy repo move
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: Use pr_fmt to prefix "SELinux: "
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 13/13] selinux: Cleanup printk logging in netnode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 12/13] selinux: Cleanup printk logging in avc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 11/13] selinux: Cleanup printk logging in netif
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/13] selinux: Cleanup printk logging in netport
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 09/13] selinux: Cleanup printk logging in sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/13] selinux: Cleanup printk logging in netlink
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: 'setsebool -P' works but throws errors; changes not permanent
- From: Jalus Bilieyich <countolaf17@xxxxxxxxx>
- RE: 'setsebool -P' works but throws errors; changes not permanent
- From: Mike Hughes <mike@xxxxxxxxxxxxx>
- Re: [PATCH 06/13] selinux: Cleanup printk logging in services
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 05/13] selinux: Cleanup printk logging in avtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/13] selinux: Cleanup printk logging in policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/13] selinux: Cleanup printk logging in policydb
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 04/13] selinux: Cleanup printk logging in hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/13] selinux: Cleanup printk logging in policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/13] selinux: Cleanup printk logging in ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 01/13] selinux: Cleanup printk logging in conditional
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() after chroot()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: 'setsebool -P' works but throws errors; changes not permanent
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update the LSM and SELinux subsystems
- From: Paul Moore <pmoore@xxxxxxxxxx>
- selinux/next rebased to v4.18-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: 'setsebool -P' works but throws errors; changes not permanent
- From: Mike Hughes <mike@xxxxxxxxxxxxx>
- Re: 'setsebool -P' works but throws errors; changes not permanent
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: is_selinux_enabled() after chroot()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- 'setsebool -P' works but throws errors; changes not permanent
- From: Mike Hughes <mike@xxxxxxxxxxxxx>
- is_selinux_enabled() after chroot()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] python/semanage: Stop logging loginRecords changes
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- sepolgen-ifgen fails with current refpolicy
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- ANN: SETools repo move
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V2 3/3] python: add xperms support to audit2allow
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v4 05/26] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 3/3] libsepol/cil: use a colon instead of a semicolon to report rc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] scripts: add a helper script to run clang's static analyzer
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/27] docs: Fix some broken references
- From: Coly Li <colyli@xxxxxxx>
- [PATCH v3 05/27] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Enhance inet_socket tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 01/13] selinux: Cleanup printk logging in conditional
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Enhance inet_socket tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/13] selinux: Cleanup printk logging in conditional
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]