SELinux - Date Index
[Prev Page][Next Page]
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Enhance inet_socket tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 01/13] selinux: Cleanup printk logging in conditional
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 08/13] selinux: Cleanup printk logging in netlink
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 06/13] selinux: Cleanup printk logging in services
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 13/13] selinux: Cleanup printk logging in netnode
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 10/13] selinux: Cleanup printk logging in netport
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 05/13] selinux: Cleanup printk logging in avtab
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 11/13] selinux: Cleanup printk logging in netif
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 12/13] selinux: Cleanup printk logging in avc
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 03/13] selinux: Cleanup printk logging in policydb
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 00/13 selinux-next] selinux: Cleanup printk logging
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 02/13] selinux: Cleanup printk logging in ebitmap
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 04/13] selinux: Cleanup printk logging in hooks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 09/13] selinux: Cleanup printk logging in sidtab
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V2 3/3] python: add xperms support to audit2allow
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: selinux-testsuite inet_socket test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix the inet_socket tests on older policy releases
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: selinux-testsuite inet_socket test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] scripts: add a helper script to run clang's static analyzer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: use a colon instead of a semicolon to report rc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/tests: fix use of unitialized variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol/tests: read_binary_policy() does not use f.handle
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] python: add xperms support to audit2allow
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux-testsuite inet_socket test failure
- From: Sgeeta Dhundale <sgeeta.in@xxxxxxxxx>
- Re: selinux-testsuite inet_socket test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite inet_socket test failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- selinux-testsuite inet_socket test failure
- From: Sgeeta Dhundale <sgeeta.in@xxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Add SCTP test support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] policycoreutils/hll/pp: remove unused variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: BTRFS losing SE Linux labels on power failure or "reboot -nffd"
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.18
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/3] python/sepolgen: print all AV rules correctly
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- [PATCH 3/3] python: add xperms support to audit2allow
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- [PATCH 2/3] python/sepolgen: fix access vector initialization
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- [PATCH 0/3] xperms support in audit2allow
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: BTRFS losing SE Linux labels on power failure or "reboot -nffd".
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Alexey Lyashkov <alexey.lyashkov@xxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: NeilBrown <neilb@xxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Alexey Lyashkov <alexey.lyashkov@xxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: "Dilger, Andreas" <andreas.dilger@xxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: NeilBrown <neilb@xxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: NeilBrown <neilb@xxxxxxxx>
- [PATCH 3/4] policycoreutils/secon: free scon_trans before returning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] policycoreutils/secon: fix typo in comment
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] python/sepolgen: fix typo in PathChoooser name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/4] policycoreutils/hll/pp: remove unused variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: BTRFS losing SE Linux labels on power failure or "reboot -nffd".
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: BTRFS losing SE Linux labels on power failure or "reboot -nffd".
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- BTRFS losing SE Linux labels on power failure or "reboot -nffd".
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [lustre-devel] [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Doug Oucharek <doucharek@xxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH] staging: lustre: delete the filesystem from the tree.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH V2] selinux-testsuite: Add SCTP test support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add SCTP test support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH V3 3/5 selinux-next] selinux: sidtab_clone switch to use rwlock.
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH V3 3/5 selinux-next] selinux: sidtab_clone switch to use rwlock.
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add SCTP test support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: Fix line wrapping in selabel_file.5
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: Make the clean target call the clean target of docs/
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/7] Fix some issues spotted by static analyzers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Selinux policy creation giving error
- From: shagun maheshwari <shagunmaheshwariitmec@xxxxxxxxx>
- [GIT PULL] SELinux fixes for v4.17 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix the mode bits for the binder tests
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux-testsuite: fix some style problems in the binder tests
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V3 1/5 selinux-next] selinux: Make allocation atomic in policydb objects functions.
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V3 5/5 selinux-next] selinux: Switch to rcu read locks for avc_compute
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V3 3/5 selinux-next] selinux: sidtab_clone switch to use rwlock.
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V3 4/5 selinux-next] selinux: seqno separation
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- system-config-selinux requires root to run
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: fixfiles and load_policy moved from /sbin to /usr/sbin
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: fixfiles and load_policy moved from /sbin to /usr/sbin
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- fixfiles and load_policy moved from /sbin to /usr/sbin
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: Fix typo in newrole.1 manpage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 7/7] libsepol: destroy the copied va_list
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Invalid security context while executing audit2alllow.orig
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Invalid security context while executing audit2alllow.orig
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Invalid security context while executing audit2alllow.orig
- From: bhawna goel <bhawnagoel13@xxxxxxxxx>
- Re: [PATCH 1/6] Generic radix trees
- From: Liu Bo <obuil.liubo@xxxxxxxxx>
- Re: [PATCH 1/6] Generic radix trees
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 1/6] Generic radix trees
- From: Liu Bo <obuil.liubo@xxxxxxxxx>
- Re: [PATCH 0/7] Fix some issues spotted by static analyzers
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] secilc: Make the clean target call the clean target of docs/
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] libselinux: Fix spelling errors in manpages
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/3] libselinux: Fix line wrapping in selabel_file.5
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/3] libselinux: fix the whatis line for the selinux_boolean_sub.3 manpage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] restorecond: Fix consistancy of DESTDIR usage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/7] libsepol: do not leak memory if list_prepend fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/7] checkpolicy: destroy the class datum if it fails to initialize
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/7] libsepol: remove unused variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/7] Fix some issues spotted by static analyzers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/7] libsepol: do not call malloc with 0 byte
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 7/7] libsepol: destroy the copied va_list
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/7] libsepol: remove some dead assignments
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/7] libsepol: cil: silence clang analyzer false positive
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Selinux load_policy command on chrooted partition is loading policy on active partition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
- From: Sachin Grover <sgrover@xxxxxxxxxxxxxx>
- Selinux load_policy command on chrooted partition is loading policy on active partition
- From: bhawna goel <bhawnagoel13@xxxxxxxxx>
- ANN: SELinux userspace release 20180524 / 2.8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Selinux load_policy command on inactive partition is loading policy on active partition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Bug][KASAN] crash in xattr_getsecurity()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Bug][KASAN] crash in xattr_getsecurity()
- From: Sachin Grover <sachin.grover91@xxxxxxxxx>
- Selinux load_policy command on inactive partition is loading policy on active partition
- From: shagun maheshwari <shagunmaheshwariitmec@xxxxxxxxx>
- Re: [PATCH 4/6] openvswitch: convert to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 2/6] proc: commit to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 6/6] Drop flex_arrays
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [Bug][KASAN] crash in xattr_getsecurity()
- From: Sachin Grover <sachin.grover91@xxxxxxxxx>
- Re: [RFC V4 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc3 release candidate
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] Drop flex_arrays
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc3 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] Drop flex_arrays
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 4/6] openvswitch: convert to genradix
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] proc: commit to genradix
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH 5/6] selinux: convert to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH 6/6] Drop flex_arrays
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH 3/6] md: convert to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH 1/6] Generic radix trees
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH 4/6] openvswitch: convert to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH 2/6] proc: commit to genradix
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [RFC V4 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] travis.yml: add ruby 2.5 to the test matrix
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC V4 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC V4 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] travis.yml: add ruby 2.5 to the test matrix
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Packaging policycoreutils for OpenSUSE
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC V3 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC V3 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V3 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC V3 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC V3 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] travis.yml: add ruby 2.5 to the test matrix
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: SELinux musl support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [RFC V2 PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC V2 PATCH 0/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: SELinux musl support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: SELinux musl support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 2/3] audit: normalize loginuid read access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 1/3] audit: use new audit_context access funciton for seccomp_actions_logged
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux musl support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux musl support
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Re: [RFC PATCH] selinux-testsuite: check the "expand-check" setting in semanage.conf
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Mathieu Poirier <mathieu.poirier@xxxxxxxxxx>
- [PATCH 2/5] libselinux: enable linking to musl-fts
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/5] genhomedircon: sysconf can return -1 without failure
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/5] restorecond: Musl compatibility for GLOB_BRACE and GLOB_TILDE
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/5] setfiles: Musl compatibility for GLOB_BRACE and GLOB_TILDE
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/5] sestatus: include limits.h for PATH_MAX
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- SELinux musl support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v4.17 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc3 release candidate
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Re: [RFC PATCH] selinux-testsuite: check the "expand-check" setting in semanage.conf
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 2/3] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 1/3] audit: use new audit_context access funciton for seccomp_actions_logged
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 0/3] audit: group task params
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Charles Keepax <ckeepax@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Stephen Boyd <sboyd@xxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: check the "expand-check" setting in semanage.conf
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: check the "expand-check" setting in semanage.conf
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fixfiles: failure to create /.autorelabel is fatal
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Add binder tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit Europe 2018 - CFP
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 5/5] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 4/5] audit: use inline function to set audit context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add binder tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Anyone using the SELinux test suite on Fedora 28?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Anyone using the SELinux test suite on Fedora 28?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 2/5] audit: convert sessionid unset to a macro
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 1/5] audit: normalize loginuid read access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 20/23] LSM: Move common usercopy into
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 20/23] LSM: Move common usercopy into
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/23] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 20/23] LSM: Move common usercopy into
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 10/23] LSM: Infrastructure management of the inode security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: Packaging policycoreutils for OpenSUSE
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Packaging policycoreutils for OpenSUSE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH ghak81 RFC V2 4/5] audit: use inline function to set audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 5/5] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 2/5] audit: convert sessionid unset to a macro
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 0/5] audit: group task params
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Packaging policycoreutils for OpenSUSE
- From: Neal Gompa <ngompa13@xxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Packaging policycoreutils for OpenSUSE
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Packaging policycoreutils for OpenSUSE
- From: Matěj Cepl <mcepl@xxxxxxx>
- [PATCH] policycoreutils: fixfiles: failure to create /.autorelabel is fatal
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 24/23] LSM: Functions for dealing with struct secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v2 3/3] selinux: correctly handle sa_family cases in selinux_sctp_bind_connect()
- From: Alexey Kodanev <alexey.kodanev@xxxxxxxxxx>
- [PATCH v2 1/3] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Alexey Kodanev <alexey.kodanev@xxxxxxxxxx>
- [PATCH v2 2/3] selinux: fix address family in bind() and connect() to match address/port
- From: Alexey Kodanev <alexey.kodanev@xxxxxxxxxx>
- Re: [PATCH 00/23] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/23] Netfilter: Add a selection for Smack
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/23] LSM: Multiple concurrent major security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/23] LSM: Fix setting of the IMA data in inode init
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/23] LSM: Move common usercopy into
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/23] LSM: Use multiple secids in LSM interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/23] LSM: Use multiple secids in security module interfaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/23] LSM: Allow mount options from multiple security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/23] LSM: Sharing of security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/23] LSM: Mark security blob allocation failures as unlikely
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/23] LSM: Infrastructure management of the ipc security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/23] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/23] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/23] LSM: Infrastructure management of the inode security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/23] Smack: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/23] SELinux: Abstract use of inode security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/23] SELinux: Abstract use of file security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/23] LSM: Infrastructure management of the task security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/23] LSM: Infrastructure management of the file security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/23] LSM: Infrastructure management of the cred security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/23] SELinux: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/23] Smack: Abstract use of cred security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/23] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/23] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 5/5] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 15/18] security: Remove pr_fmt duplicate logging prefixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 15/18] security: Remove pr_fmt duplicate logging prefixes
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 00/18] Convert default pr_fmt from empty to KBUILD_MODNAME
- From: Joe Perches <joe@xxxxxxxxxxx>
- ANN: SELinux userspace 2.8-rc3 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Alexey Kodanev <alexey.kodanev@xxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 5/5] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] docs: Fix some broken references
- From: Andrea Parri <parri.andrea@xxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 3/5] audit: use inline function to get audit context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 0/5] audit: group task params
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 2/5] audit: convert sessionid unset to a macro
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: cil: prevent stack buffer overflow in cil_expr_to_string
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 09/11] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 4/5] audit: use inline function to set audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 4/5] audit: use inline function to set audit context
- From: "Tobin C. Harding" <tobin@xxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 2/5] audit: convert sessionid unset to a macro
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: prevent string overflow on final paths
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsemanage: prevent string overflow on final paths
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()
- From: Alexey Kodanev <alexey.kodanev@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix build warnings with gcc 8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] smack: provide socketpair callback
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH ghak81 RFC V1 5/5] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V1 2/5] audit: convert sessionid unset to a macro
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V1 4/5] audit: use inline function to set audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V1 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V1 0/5] audit: group task params
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce LSM-hook for socketpair(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] net: hook socketpair() into LSM
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] python/semanage/seobject.py: Fix undefined store check
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 0/4] Introduce LSM-hook for socketpair(2)
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH v2 3/4] selinux: provide socketpair callback
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH v2 2/4] net: hook socketpair() into LSM
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH v2 1/4] security: add hook for socketpair()
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH v2 4/4] smack: provide socketpair callback
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Last call for selinux userspace 2.8 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/4] libselinux: audit2why: fix build warnings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/4] libselinux: avcstat: fix build warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: remove unused function and type
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/4] libselinux: fix build warning in save_booleans()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/4] Fix build warnings with gcc 8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Last call for selinux userspace 2.8 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Loopback TCP connection
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Loopback TCP connection
- From: Troels Arvin <troels.arvin@xxxxxxxxx>
- Re: Loopback TCP connection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Loopback TCP connection
- From: Troels Arvin <troels.arvin@xxxxxxxxx>
- ANN: SELinux userspace 2.8-rc2 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: always check append_arg return value
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: free process and file contexts which are checked
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Revert "libselinux: verify file_contexts when using restorecon"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH 04/24] VFS: Add LSM hooks for filesystem context [ver #7]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] net/unix: hook unix_socketpair() into LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] net/unix: hook unix_socketpair() into LSM
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] net/unix: hook unix_socketpair() into LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/24] VFS: Add LSM hooks for filesystem context [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: selinux crashes always at startup
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "libselinux: verify file_contexts when using restorecon"
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: free process and file contexts which are checked
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: always check append_arg return value
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Alias path subbing results in unexpected policy labelling
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] selinux: provide unix_stream_socketpair callback
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Alias path subbing results in unexpected policy labelling
- From: Joe Kirwin <jpk@xxxxxxx>
- [PATCH 3/3] selinux: provide unix_stream_socketpair callback
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH 2/3] net/unix: hook unix_socketpair() into LSM
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH 1/3] security: add hook for socketpair(AF_UNIX, ...)
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- [PATCH 0/3] Introduce LSM-hook for socketpair(2)
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [PATCH 04/24] VFS: Add LSM hooks for filesystem context [ver #7]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libsemanage: always check append_arg return value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] sestatus: resolve symlinks in path when looking for a process
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] sestatus: free process and file contexts which are checked
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 04/24] VFS: Add LSM hooks for filesystem context [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] Revert "libselinux: verify file_contexts when using restorecon"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.8-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 04/24] VFS: Add LSM hooks for filesystem context [ver #7]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.8-rc1 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux crashes always at startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux crashes always at startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux crashes always at startup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- selinux crashes always at startup
- From: Jaap <jjb@xxxxxxxxx>
- Re: selinux namespace work rebased to 4.17-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak47 V1] audit: normalize MAC_POLICY_LOAD record
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- selinux namespace work rebased to 4.17-rc1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: only add the infiniband tests to SUBDIRS if they are enabled
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] security: selinux: Change return type to vm_fault_t
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux next branch rebased to v4.17-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 5/5] libselinux: remove unused variable usercon
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] libselinux: remove unused variable usercon
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] security: selinux: Change return type to vm_fault_t
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH 5/5] libselinux: remove unused variable usercon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] libselinux: remove unused variable usercon
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 5/5] libselinux: remove unused variable usercon
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/5] libsepol: do not dereference NULL if stack_init fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/5] libselinux: remove unused variable usercon
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: ensure the level context is not empty
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libselinux: fix memory leak in getconlist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/5] libselinux: label_file: fix memory management in store_stem()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux-testsuite: Enhance inet_socket tests
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: do not change file mode of seusers and users_extra
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: do not change file mode of seusers and users_extra
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: do not change file mode of seusers and users_extra
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: do not change file mode of seusers and users_extra
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: do not change file mode of seusers and users_extra
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] python/sepolgen: Try to translate SELinux contexts to raw
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH ghak47 V1] audit: normalize MAC_POLICY_LOAD record
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix type for cgi scripts
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] python/sepolgen: Try to translate SELinux contexts to raw
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: add some additional comments to the IB configuration files
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux-testsuite: convert the README to markdown (README.md)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix type for cgi scripts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/sepolgen: Try to translate SELinux contexts to raw
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- [PATCH ghak47 V1] audit: normalize MAC_POLICY_LOAD record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak46 V1] audit: normalize MAC_STATUS record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: fix missing dput() before selinuxfs unmount
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: fix missing dput() before selinuxfs unmount
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: CIL namespaces and blockinheritfilter keyword.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- CIL namespaces and blockinheritfilter keyword.
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.17
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- last call for selinux 2.8-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/sepolicy: Fix type for cgi scripts
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3 0/2] restorecon context validation improvement
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for v4.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux Policy Tools - selpoltools
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: Re: [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] restorecon context validation improvement
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: valdis.kletnieks@xxxxxx
- Re: [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: Tri Vo <trong@xxxxxxxxxxx>
- [PATCH v3 0/2] restorecon context validation improvement
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v3 1/2] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v3 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: Pierre-Hugues Husson <phh@xxxxxx>
- Re: [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/1] libsepol/cil: Improve processing of context rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: valdis.kletnieks@xxxxxx
- Re: [PATCH net-next 0/5] Introduce net_rwsem to protect net_namespace_list
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH net-next 4/5] ovs: Remove rtnl_lock() from ovs_exit_net()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 5/5] net: Remove rtnl_lock() in nf_ct_iterate_destroy()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 3/5] security: Remove rtnl_lock() in selinux_xfrm_notify_policyload()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 2/5] net: Don't take rtnl_lock() in wireless_nlevent_flush()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 1/5] net: Introduce net_rwsem to protect net_namespace_list
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 0/5] Introduce net_rwsem to protect net_namespace_list
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] restorecon context validation improvement
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v2 0/2] restorecon context validation improvement
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v2 1/1] Detect identical genfscon
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: verify file_contexts when using restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2 1/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH v2 0/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- Re: [PATCH 0/1] Support multiple identical genfscon
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setools: Add sctp portcon support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: linux-next: manual merge of the selinux tree with the security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix handling of uninitialized selinux state in get_bools/classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Update SELinux SCTP documentation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add SCTP test support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] setools: Add sctp portcon support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: fix handling of uninitialized selinux state in get_bools/classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Alias path subbing results in unexpected policy labelling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Alias path subbing results in unexpected policy labelling
- From: Joe Kirwin <jpk@xxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/1] Support multiple identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH 1/1] Delete identical genfscon-s
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH] selinux: Update SELinux SCTP documentation
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Re: [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add support for the SCTP portcon keyword
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add support for the SCTP portcon keyword
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] secilc: resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] secilc: resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Improve man page and unify it with --help
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Improve man page and unify it with --help
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: Add support for the SCTP portcon keyword
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/8] LSM: Security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 0/8] LSM: Security module stacking
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 6/8] LSM: General stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5/8] LSM: Manage remaining security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/8] LSM: Manage task security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/8] LSM: Manage file security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/8] LSM: Manage credential security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/8] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 8/8] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 7/8] LSM: Multiple security mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/8] LSM: Security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux Namespace on bind mounted files
- From: Zvonko Kosic <zkosic@xxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: libsepol policycap names
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- libsemanage: Perform access check using euid instead of uid v2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] selinux: wrap AVC state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: rename the {is, set}_enforcing() functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- libsepol policycap names
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: rename the {is,set}_enforcing() functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]