SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v2 1/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"
- From: valdis.kletnieks@xxxxxx
- Re: [PATCH net-next 0/5] Introduce net_rwsem to protect net_namespace_list
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH net-next 4/5] ovs: Remove rtnl_lock() from ovs_exit_net()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 5/5] net: Remove rtnl_lock() in nf_ct_iterate_destroy()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 3/5] security: Remove rtnl_lock() in selinux_xfrm_notify_policyload()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 2/5] net: Don't take rtnl_lock() in wireless_nlevent_flush()
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 1/5] net: Introduce net_rwsem to protect net_namespace_list
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- [PATCH net-next 0/5] Introduce net_rwsem to protect net_namespace_list
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] restorecon context validation improvement
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2 2/2] libselinux: echo line number of bad label in selabel_fini()
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v2 0/2] restorecon context validation improvement
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- [PATCH v2 1/2] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v2 1/1] Detect identical genfscon
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: verify file_contexts when using restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: verify file_contexts when using restorecon
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2 1/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH v2 0/1] Detect identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- Re: [PATCH 0/1] Support multiple identical genfscon
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: dbus-daemon patches review
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: dbus-daemon patches review
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setools: Add sctp portcon support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- dbus-daemon patches review
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: linux-next: manual merge of the selinux tree with the security tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix handling of uninitialized selinux state in get_bools/classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Update SELinux SCTP documentation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add SCTP test support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] setools: Add sctp portcon support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: fix handling of uninitialized selinux state in get_bools/classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Alias path subbing results in unexpected policy labelling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Alias path subbing results in unexpected policy labelling
- From: Joe Kirwin <jpk@xxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/1] Support multiple identical genfscon
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH 1/1] Delete identical genfscon-s
- From: Pierre-Hugues Husson <phh@xxxxxx>
- [PATCH] selinux: Update SELinux SCTP documentation
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Re: [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add support for the SCTP portcon keyword
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsemanage/direct_api.c: Fix iterating over array
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- [PATCH v3] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] Resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2] Resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add support for the SCTP portcon keyword
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] secilc: resolve conflicts in expandattribute.
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] secilc: resolve conflicts in expandattribute.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] secilc: resolve conflicts in expandattribute.
- From: Tri Vo <trong@xxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH] policycoreutils/semodule: Allow enabling/disabling multiple modules at once
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Improve man page and unify it with --help
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] policycoreutils/semodule: Improve man page and unify it with --help
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: Add support for the SCTP portcon keyword
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/8] LSM: Security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 0/8] LSM: Security module stacking
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Export sepol_polcap_getnum/name functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux Namespace on bind mounted files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 6/8] LSM: General stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5/8] LSM: Manage remaining security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/8] LSM: Manage task security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/8] LSM: Manage file security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/8] LSM: Manage credential security blobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/8] procfs: add smack subdir to attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 8/8] LSM: Full security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 7/8] LSM: Multiple security mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/8] LSM: Security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux Namespace on bind mounted files
- From: Zvonko Kosic <zkosic@xxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] libsepol: Prevent freeing unitialized value in ibendport handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- [PATCH] python/sepolgen: fix typo in PolicyGenerator
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: libsepol policycap names
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] net: don't unnecessarily load kernel modules in dev_ioctl()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- libsemanage: Perform access check using euid instead of uid v2
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: wrap AVC state
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: wrap selinuxfs state
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 2/3] libsepol: cil: show an error when cil_expr_to_string() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: initialize tmp_key->ibdev_name if its allocation failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsemanage: silence clang static analyzer report
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] selinux: wrap AVC state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: wrap selinuxfs state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix ltp test connect-syscall failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol policycap names
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: rename the {is, set}_enforcing() functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- libsepol policycap names
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: rename the {is,set}_enforcing() functions
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] gui/fcontextPage: Set default object class in addDialog
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Regression found when running LTP connect01 on next-20180301
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Regression found when running LTP connect01 on next-20180301
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 1/3] secilc: Fix documentation build for OS X systems
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] gui/fcontextPage: Set default object class in addDialog
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] secilc: Fix documentation build for OS X systems
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Improve warning for installing disabled module
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Improve warning for installing disabled module
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Improve warning for installing disabled module
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Linux 4.16 cap_sys_module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Linux 4.16 cap_sys_module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V8 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix documentation build for OS X systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] semodule-utils/semodule_package: fix semodule_unpackage man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Minor update for bash completion. Bash completion for ports is missing '-' for type. Based on documentation, it should be --type, not -type.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V8 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH] secilc: Fix documentation build for OS X systems
- From: Yuli Khodorkovskiy <ykhodo@xxxxxxxxx>
- Re: [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 5/5] security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock'
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH] gui/polgengui.py: Use stop_emission_by_name instead of emit_stop_by_name
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semodule-utils/semodule_package: fix semodule_unpackage man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] gui/semanagePage: Close "edit" and "add" dialogues when successfull
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Describe multiple-decls in secilc.8.xml
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Rework of makefiles v5
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V7 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH V7 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Minor update for bash completion. Bash completion for ports is missing '-' for type. Based on documentation, it should be --type, not -type.
- From: Lee Stubbs <lee.stubbs@xxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH selinux-next] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: wrap global selinux state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: wrap global selinux state
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: Facing problem while running the audit2allow command
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Describe multiple-decls in secilc.8.xml
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Facing problem while running the audit2allow command
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH 3/3] python/sepolicy: Fix translated strings with parameters
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] python/sepolicy: Initialize policy.ports as a dict in generate.py
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] python/sepolicy: Support non-MLS policy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V6 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH Rework of makefiles v5 16/15] Travis-CI: do not duplicate $DESTDIR in $PYSITEDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Rework of makefiles v5
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] netlabel: If PF_INET6, check sk_buff ip header version
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- KASAN: use-after-free Read in selinux_inode_free_security
- From: syzbot <syzbot+14580019ce01b3f29b74@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in selinux_inode_free_security
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in do_raw_spin_lock
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/4] gui/polgengui.py: Convert polgen.glade to Builder format polgen.ui
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v5 12/15] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 11/15] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 15/15] build: setup buildpaths if DESTDIR is specified
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 09/15] python: build: move modules from platform-specific to platform-shared
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 03/15] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 05/15] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 14/15] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 13/15] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 10/15] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 02/15] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v5 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of makefiles v5
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 4/4] python/sepolicy: Do not use types.BooleanType
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/4] python/sepolicy: Use list instead of map
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/4] gui/polgengui.py: Fix sepolicy.generate import in polgengui.py
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Update selinux-sepolgengui to be compatible with Gtk3, Python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 4/4] selinux: Add SCTP support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 3/4] sctp: Add LSM hooks
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 2/4] sctp: Add ip option support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 1/4] security: Add support for SCTP security hooks
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 0/4] Add SELinux SCTP protocol support
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Minor bash completion update for semanage ports
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: FYI: selinux/next rebased to v4.16-rc1
- From: Richard Haines via Selinux <selinux@xxxxxxxxxxxxx>
- Minor bash completion update for semanage ports
- From: Lee Stubbs <lee.stubbs@xxxxxxxxx>
- FYI: selinux/next rebased to v4.16-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] sidtab: use memset vs loop for init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Does selinux work with kernel namespaces?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] [RFC] sidtab: use memset vs loop for init
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Does selinux work with kernel namespaces?
- From: Matt Callaway <matt.callaway@xxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 01/10] selinux: introduce a selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3.18 34/36] selinux: general protection fault in sock_has_perm
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [SELinuxProject/selinux] gui: remove selinux-sepolgengui (#77)
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 4.4 65/67] selinux: general protection fault in sock_has_perm
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [SELinuxProject/selinux] gui: remove selinux-sepolgengui (#77)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH-selinuxns] selinux: Annotate lockdep for services locks
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: CIL: should this work?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- CIL: should this work?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.16
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Update setenforce, getenforce, sestatus man pages with references to each other.
- From: Ben Kane <bbk1524@xxxxxxxxx>
- [PATCH v2 5/5] selinux: Switch locking to RCU.
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 4/5] selinux: Use pointer to switch policydb and sidtab
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 2/5] selinux: Move policydb to pointer structure
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 1/5] selinux:Remove direct references to policydb.
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 0/5] selinux:Significant reduce of preempt_disable holds
- From: <peter.enderborg@xxxxxxxx>
- [PATCH v2 3/5] selinux: Move sidtab to pointer structure
- From: <peter.enderborg@xxxxxxxx>
- [PATCH 2/2] gui: remove "new" button in Modules page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Return commit number if save-previous false
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: [PATCH v2 14/15] selinux: allow setxattr on rootfs so initramfs code can set them]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Fwd: [PATCH v2 15/15] selinux: delay sid population for rootfs till init is complete]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH V3] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v4 08/15] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 15/15] build: setup buildpaths if DESTDIR is specified
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 12/15] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 13/15] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 07/15] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 14/15] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 11/15] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 10/15] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 09/15] python: build: move modules from platform-specific to platform-shared
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 06/15] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 05/15] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 04/15] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 03/15] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 02/15] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v4 01/15] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH V2] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: Return commit number if save-previous false
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 10/14] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 09/14] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 13/14] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 12/14] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 11/14] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 03/14] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles v3
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 14/14] build: add prefix for includes in top Makefile
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 07/14] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 06/14] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 05/14] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 04/14] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v3 01/14] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: default_type limitations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] general protection fault in sock_has_perm
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- default_type limitations
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] general protection fault in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux:Significant reduce of preempt_disable holds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux:Significant reduce of preempt_disable holds
- From: <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: Reference Policy 2.20180114
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2 09/14] restorecond: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 04/14] checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 08/14] python: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles v2
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 05/14] gui: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 02/14] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 03/14] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 14/14] build: add prefix for includes in top Makefile
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 07/14] policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 06/14] mcstrans: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 13/14] dbus: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 10/14] sandbox: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 12/14] semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 11/14] secilc: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH v2 01/14] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: ANN: Reference Policy 2.20180114
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Remove redundant and broken moduleRecords.modify()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: bring semanageRecords.set_reload back
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- SETools source policy support will be dropped
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: Reference Policy 2.20180114
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] libsemanage: Allow tmp files to be kept if a compile fails
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Correct manpages regarding removable_context
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/3] libselinux: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 1/3] libsepol: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- [PATCH 3/3] libsemanage: build: follow standard semantics for DESTDIR and PREFIX
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Rework of Makefiles
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: PATCH V5 4/4] selinux: Add SCTP support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Re: selabel_lookup() with MEDIA backend issue
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: PATCH V5 4/4] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: Remove redundant and broken moduleRecords.modify()
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] python/semanage: bring semanageRecords.set_reload back
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- PATCH V5 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Correct manpages regarding removable_context
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: Correct manpages regarding removable_context
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- I am being asked does SELinux provide any protection on Meltdown/Spectre.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Re: selabel_lookup() with MEDIA backend issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selabel_lookup() with MEDIA backend issue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: More problems with bounds checking.
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: selabel_lookup() with MEDIA backend issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V6 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V6 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- selabel_lookup() with MEDIA backend issue
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH V5 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V5 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH v2] libselinux: introduce PCPREFIX substitute variable for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] libselinux: introduce PCPREFIX substitute variables for .pc files
- From: Marcus Folkesson <marcus.folkesson@xxxxxxxxx>
- Re: [PATCH V4 2/3] IMA: Use consistent creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH V4 3/3] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V4 1/3] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V4 2/3] IMA: Use consistent creds
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- BUG: unable to handle kernel paging request in security_compute_sid
- From: syzbot <bot+d10271989aa91b0c140f6c218c5537f942888ce2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4 4/4] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 3/4] sctp: Add LSM hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V4 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH V4 1/4] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 4/4] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 2/4] sctp: Add ip option support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 3/4] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 0/4] Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in security_compute_sid
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in security_compute_sid
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v3 0/4] Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH v3 1/4] security: Add support for SCTP security hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH v3 4/4] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 3/4] sctp: Add LSM hooks
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in selinux_binder_transaction
- From: syzbot <bot+df8ae082ed15905d04a1cef226c7db1d6fd68a8f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
- From: syzbot <bot+904436b33e141b4f4c57c1ddc94199ffd2e34b9d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Selinux Context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- [BUG RFD]selinux: sidtab_context_to_sid return -NOMEM when concurrent with security_load_policy
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: Object range_transition issue when type_transition is involved
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH] python/semanage: make seobject.py backward compatible
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Object range_transition issue when type_transition is involved
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Object range_transition issue when type_transition is involved
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Non-DoD Source] 答复: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: PAM Security related issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PAM Security related issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: PAM Security related issue
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [BUG]kernel softlockup due to sidtab_search_context run for long time because of too many sidtab context node
- From: yangjihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: make seobject.py backward compatible
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- PAM Security related issue
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH 2/4] sctp: Add ip option support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] libsemanage: properly check return value of iterate function
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] selinux: skip bounded transition processing if the policy isn't loaded
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V2] selinux: Add SCTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Issue regarding Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- KASAN: use-after-free Read in selinux_netlbl_sk_security_free (2)
- From: syzbot <bot+fcb30800d359ef1113a6edda069a77c2eebb9bf1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: ensure the context is NUL terminated in security_context_to_sid_core()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Qwery regarding Selinux Change Id context
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in strcmp
- From: Dmitry Vyukov via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Issue regarding Selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Issue regarding Selinux
- From: Aman Sharma <amansh.sharma5@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]