SELinux - Date Index
[Prev Page][Next Page]
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] gui/fcontextPage: Set default object class in addDialog
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Regression found when running LTP connect01 on next-20180301
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 1/3] secilc: Fix documentation build for OS X systems
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] gui/fcontextPage: Set default object class in addDialog
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] secilc: Fix documentation build for OS X systems
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Improve warning for installing disabled module
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Improve warning for installing disabled module
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Improve warning for installing disabled module
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Linux 4.16 cap_sys_module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix documentation build for OS X systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semodule-utils/semodule_package: fix semodule_unpackage man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Minor update for bash completion. Bash completion for ports is missing '-' for type. Based on documentation, it should be --type, not -type.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V8 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH] secilc: Fix documentation build for OS X systems
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH] gui/polgengui.py: Use stop_emission_by_name instead of emit_stop_by_name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semodule-utils/semodule_package: fix semodule_unpackage man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Describe multiple-decls in secilc.8.xml
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Rework of makefiles v5
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V7 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Minor update for bash completion. Bash completion for ports is missing '-' for type. Based on documentation, it should be --type, not -type.
- From: Lee Stubbs <lee.stubbs@xxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: wrap global selinux state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: Facing problem while running the audit2allow command
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Describe multiple-decls in secilc.8.xml
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Facing problem while running the audit2allow command
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH 3/3] python/sepolicy: Fix translated strings with parameters
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] python/sepolicy: Initialize policy.ports as a dict in generate.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] python/sepolicy: Support non-MLS policy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH Rework of makefiles v5 16/15] Travis-CI: do not duplicate $DESTDIR in $PYSITEDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Rework of makefiles v5
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] netlabel: If PF_INET6, check sk_buff ip header version
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- KASAN: use-after-free Read in selinux_inode_free_security
- From: syzbot <syzbot+14580019ce01b3f29b74@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in selinux_inode_free_security
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in do_raw_spin_lock
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/4] gui/polgengui.py: Convert polgen.glade to Builder format polgen.ui
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v5 12/15] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 11/15] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 15/15] build: setup buildpaths if DESTDIR is specified
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 09/15] python: build: move modules from platform-specific to platform-shared
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 03/15] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 05/15] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 14/15] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 13/15] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 10/15] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 02/15] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 4/4] python/sepolicy: Do not use types.BooleanType
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/4] python/sepolicy: Use list instead of map
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/4] gui/polgengui.py: Fix sepolicy.generate import in polgengui.py
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 4/4] selinux: Add SCTP support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 3/4] sctp: Add LSM hooks
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 1/4] security: Add support for SCTP security hooks
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Minor bash completion update for semanage ports
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Minor bash completion update for semanage ports
- From: Lee Stubbs <lee.stubbs@xxxxxxxxx>
- FYI: selinux/next rebased to v4.16-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] [RFC] sidtab: use memset vs loop for init
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3.18 34/36] selinux: general protection fault in sock_has_perm
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [SELinuxProject/selinux] gui: remove selinux-sepolgengui (#77)
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 4.4 65/67] selinux: general protection fault in sock_has_perm
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [SELinuxProject/selinux] gui: remove selinux-sepolgengui (#77)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: CIL: should this work?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- CIL: should this work?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.16
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Ben Kane <bbk1524@xxxxxxxxx>
- [PATCH v2 5/5] selinux: Switch locking to RCU.
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 2/5] selinux: Move policydb to pointer structure
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 0/5] selinux:Significant reduce of preempt_disable holds
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 3/5] selinux: Move sidtab to pointer structure
- From: <peter.enderborg@xxxxxxxx>
- [PATCH 2/2] gui: remove "new" button in Modules page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Return commit number if save-previous false
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: [PATCH v2 14/15] selinux: allow setxattr on rootfs so initramfs code can set them]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: [PATCH v2 15/15] selinux: delay sid population for rootfs till init is complete]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v4 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 15/15] build: setup buildpaths if DESTDIR is specified
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 12/15] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 13/15] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 14/15] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 11/15] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 10/15] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 09/15] python: build: move modules from platform-specific to platform-shared
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 05/15] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 03/15] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 02/15] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: Return commit number if save-previous false
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 10/14] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 09/14] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 13/14] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 12/14] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 11/14] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 03/14] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles v3
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 14/14] build: add prefix for includes in top Makefile
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 07/14] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 06/14] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 05/14] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 04/14] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 01/14] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: default_type limitations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux:Significant reduce of preempt_disable holds
- From: <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: Reference Policy 2.20180114
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2 09/14] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 04/14] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles v2
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 05/14] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 03/14] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 14/14] build: add prefix for includes in top Makefile
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 07/14] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 06/14] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 13/14] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 10/14] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 12/14] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 11/14] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 01/14] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: ANN: Reference Policy 2.20180114
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Remove redundant and broken moduleRecords.modify()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: bring semanageRecords.set_reload back
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SETools source policy support will be dropped
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: Reference Policy 2.20180114
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Correct manpages regarding removable_context
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/3] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 1/3] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 3/3] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: PATCH V5 4/4] selinux: Add SCTP support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Re: selabel_lookup() with MEDIA backend issue
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: PATCH V5 4/4] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: Remove redundant and broken moduleRecords.modify()
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] python/semanage: bring semanageRecords.set_reload back
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- PATCH V5 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Correct manpages regarding removable_context
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: Correct manpages regarding removable_context
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Re: selabel_lookup() with MEDIA backend issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selabel_lookup() with MEDIA backend issue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: selabel_lookup() with MEDIA backend issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V6 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- selabel_lookup() with MEDIA backend issue
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V5 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] libselinux: introduce PCPREFIX substitute variables for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH V4 3/3] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V4 1/3] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- BUG: unable to handle kernel paging request in security_compute_sid
- From: syzbot <bot+d10271989aa91b0c140f6c218c5537f942888ce2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 3/4] sctp: Add LSM hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH V4 1/4] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 2/4] sctp: Add ip option support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 3/4] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in security_compute_sid
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in security_compute_sid
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v3 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH v3 4/4] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 3/4] sctp: Add LSM hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in selinux_binder_transaction
- From: syzbot <bot+df8ae082ed15905d04a1cef226c7db1d6fd68a8f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: syzbot <bot+904436b33e141b4f4c57c1ddc94199ffd2e34b9d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Selinux Context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: Object range_transition issue when type_transition is involved
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH] python/semanage: make seobject.py backward compatible
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Object range_transition issue when type_transition is involved
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Object range_transition issue when type_transition is involved
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: PAM Security related issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PAM Security related issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: make seobject.py backward compatible
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] libsemanage: properly check return value of iterate function
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Issue regarding Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- KASAN: use-after-free Read in selinux_netlbl_sk_security_free (2)
- From: syzbot <bot+fcb30800d359ef1113a6edda069a77c2eebb9bf1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: ensure the context is NUL terminated in security_context_to_sid_core()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Issue regarding Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Issue regarding Selinux
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Issue regarding Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Issue regarding Selinux
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH v2] selinux: ensure the context is NUL terminated in security_context_to_sid_core()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: ensure the context is NULL terminated in security_context_to_sid_core()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH v2] selinux: ensure the context is NUL terminated in security_context_to_sid_core()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- KASAN: slab-out-of-bounds Read in strcmp
- From: syzbot <bot+015afdb01dbf2abb6a6bfdd5430b72e5503fca6d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- general protection fault in sidtab_search_core
- From: syzbot <bot+142bbfb097c0d742b14261501fb0c0d4dc85a47e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure the context is NULL terminated in security_context_to_sid_core()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] selinux: ensure the context is NULL terminated in security_context_to_sid_core()
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] selinux: ensure the context is NULL terminated in security_context_to_sid_core()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Add SCTP support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default User in Selinux
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Default User in Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Default User in Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG] kernel stack corruption during/after Netlabel error
- From: Eric Dumazet via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Default User in Selinux
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- [BUG] kernel stack corruption during/after Netlabel error
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Add SCTP support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Add SCTP support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Use umask(0077) for fopen() write operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/4] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Read in strcmp
- From: syzbot <bot+015afdb01dbf2abb6a6bfdd5430b72e5503fca6d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] sctp: Add ip option support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/4] Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/4] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2] libsemanage: Use umask(0077) for fopen() write operations
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: properly check return value of iterate function
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: properly check return value of iterate function
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Use umask(0077) for fopen() write operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fwd: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- KASAN: use-after-free Read in file_has_perm
- From: syzbot <bot+5c3ae7f2679bf34ddaae704a4c99bd47872b2140@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] libsemanage: properly check return value of iterate function
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Fwd: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH] libsemanage: properly check return value of iterate function
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Create new keep field for type attribute sets
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- [PATCH] libsemanage: properly check return value of iterate function
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: [RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Create new keep field for type attribute sets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix sepolicy manpage.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: Use umask(0077) for fopen() write operations
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] security: replace FSF address with web source in license notices
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Create new keep field for type attribute sets
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: cil: only overwrite cil_typeattribute used when false.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libsepol: cil: only overwrite cil_typeattribute used when false.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary assignment to subdir-
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] python/sepolicy: Fix sepolicy manpage.
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] python/semanage: Update Infiniband code to work on python3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH] libsepol: cil: only overwrite cil_typeattribute used when false.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] netlabel: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] netlabel: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Update Infiniband code to work on python3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary assignment to subdir-
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netlabel: If PF_INET6, check sk_buff ip header version
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] netlabel: If PF_INET6, check sk_buff ip header version
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.15
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: remove unnecessary assignment to subdir-
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH] python/semanage: Update Infiniband code to work on python3
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH] python/semanage: Fix export of ibendport entries
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] netlabel: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: free genhomedircon fallback user
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libsemanage: free genhomedircon fallback user
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] python/semanage: Don't use global setup variable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/3] python/semanage: Enforce noreload only if it's requested by -N option
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] python/semanage: drop *_ini functions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: security_bounded_transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security_bounded_transition
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- KASAN: use-after-free Read in selinux_netlbl_sk_security_free
- From: syzbot <bot+c06fb26dfcd8220259619bf322a79eb0887147c8@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in do_raw_spin_lock
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in do_raw_spin_lock
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in do_raw_spin_lock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- KASAN: use-after-free Read in do_raw_spin_lock
- From: syzbot <bot+23f79c6532ceddb959aaea30dd5e3c752b93bf21@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semanage: Do not try to reload policy when SELinux is disabled
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] sctp: Add ip option support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [RFC PATCH 2/5] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]