SELinux - Date Index
[Prev Page][Next Page]
- Re: [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: inet_socket: test xfrm state selectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Travis-CI: try working around network issues by retrying downloads
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux-testsuite: nnp_nosuid: tidy perl style
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: inet_socket: tighten checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Travis-CI: try working around network issues by retrying downloads
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: travis CI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] Travis-CI: try working around network issues by retrying downloads
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: travis CI
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: travis CI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: travis CI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add CALIPSO/IPv6 tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Stop Infiniband building if not enabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libsepol: free ibendport device names
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: support exact match for a property key
- From: Jaekyun Seok via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: android: support exact match for a property key
- From: Jaekyun Seok via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
- Re: [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
- Re: [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
- From: Nicolas Belouin <nicolas@xxxxxxxxxx>
- Re: [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
- From: Nicolas Belouin <nicolas@xxxxxxxxxx>
- [RFC PATCH 2/2] fs: Grant CAP_TRUSTED rw access to trusted xattrs
- From: Nicolas Belouin <nicolas@xxxxxxxxxx>
- [RFC PATCH 2/2] fs: add the possibility to use CAP_SYS_MOUNT to (u)mount a fs
- From: Nicolas Belouin <nicolas@xxxxxxxxxx>
- [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
- From: Nicolas Belouin <nicolas@xxxxxxxxxx>
- [PATCH] libsepol: free ibendport device names
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selinux: Add SCTP support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: android: support exact match for a property key
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: android: support exact match for a property key
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH] libselinux: android: support exact match for a property key
- From: Jaekyun Seok via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add CALIPSO/IPv6 tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Stop Infiniband building if not enabled
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add CALIPSO/IPv6 tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH net-next v7 1/5] bpf: Add file mode configuration into bpf maps
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v7 2/5] bpf: Add tests for eBPF file mode
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v7 1/5] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] CleanSpec.mk: remove
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: travis CI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- [RFC PATCH 4/5] netlabel: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 2/5] sctp: Add ip option support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 5/5] selinux: Add SCTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 3/5] sctp: Add LSM hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/5] Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant assignment to len
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6 2/5] bpf: Add tests for eBPF file mode
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant assignment to str
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH net-next v6 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v6 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v6 2/5] bpf: Add tests for eBPF file mode
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v6 3/5] security: bpf: Add LSM hooks for bpf object related syscall
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxns: mark init_selinux_ns as __ro_after_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Value of file_contexts.bin after the move to pcre2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
- From: walter harms <wharms@xxxxxx>
- [PATCH] selinux: remove redundant assignment to len
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] selinux: remove redundant assignment to str
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][RFC] selinuxns: mark init_selinux_ns as __ro_after_init
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: travis CI
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RowHammer Protection
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix bool initialization/comparison
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add support for pcre2 to pkgconfig definition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: travis CI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- travis CI
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] semodule-utils: remove semodule_deps
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH net-next v3 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v3 3/5] security: bpf: Add LSM hooks for bpf object related syscall
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v3 1/5] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v3 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v3 2/5] bpf: Add tests for eBPF file mode
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] libselinux: Add support for pcre2 to pkgconfig definition
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] selinux: Fix bool initialization/comparison
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix bool initialization/comparison
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- Re: Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: About commit 901ef845fa2469c ("selinux: allow per-file labeling for cgroupfs")
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [RFC 03/10] selinux: move the AVC into the selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: About commit 901ef845fa2469c ("selinux: allow per-file labeling for cgroupfs")
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v2 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH net-next v2 2/5] bpf: Add tests for eBPF file mode
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v2 3/5] security: bpf: Add LSM hooks for bpf object related syscall
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH] selinux: Fix bool initialization/comparison
- From: Thomas Meyer <thomas@xxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- About commit 901ef845fa2469c ("selinux: allow per-file labeling for cgroupfs")
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC 03/10] selinux: move the AVC into the selinux namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 05/10] selinux: support per-task/cred selinux namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 05/10] selinux: support per-task/cred selinux namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/3] python/semanage: Enable listing file_contexts.homedirs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 05/10] selinux: support per-task/cred selinux namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH 0/4] net-next: security: New file mode and LSM hooks for eBPF object permission control
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix build warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fix build warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] python/semanage: Enable listing file_contexts.homedirs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: fix build warning
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsemanage: Keep copy of file_contexts.homedirs in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/3] python/semanage: Enable listing file_contexts.homedirs
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Add support for listing fcontext.homedirs file
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] semodule-utils: remove semodule_deps
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] semodule-utils: remove semodule_deps
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Labeling sysfs files
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: Labeling sysfs files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Labeling sysfs files
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Labeling sysfs files
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: Add support for listing fcontext.homedirs file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 01/10] selinux: introduce a selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 10/10] selinuxfs: restrict write operations to the same selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 07/10] selinux: support per-namespace inode security structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 06/10] selinux: introduce cred_selinux_ns() and use it
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 09/10] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 08/10] selinux: support per-namespace superblock security structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 03/10] selinux: move the AVC into the selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 05/10] selinux: support per-task/cred selinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 04/10] netns, selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 02/10] selinux: support multiple selinuxfs instances
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC 00/10] Introduce a SELinux namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] gui: remove the status bar
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] python/semanage: Enable listing file_contexts.homedirs
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: Keep copy of file_contexts.homedirs in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/4] gui: fix parsing of "semodule -lfull" in tab Modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/4] gui: remove mappingsPage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] gui: remove the status bar
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/4] gui: delete overridden definition of usersPage.delete()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2 v2] selinux-testsuite: README: Update kernel config requirements
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2 v2] selinux-testsuite: Move kernel config to a defconfig fragment
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: README: Update kernel config requirements
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] python/semanage: Enable listing fcontexts.homedirs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] python/semanage: Enable listing fcontexts.homedirs
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] libsemanage: Add support for listing fcontext.homedirs file
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Enable listing fcontexts.homedirs
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: A casestudy where selinux has stopped malware attacks
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] gui: port to Python 3 by migrating to PyGI
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] sepolicy: support non-MLS policy in gui
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Travis-CI: fix configuration after September's update
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] sepolicy: ignore comments and empty lines in file_contexts.subs_dist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] sepolicy: support non-MLS policy in gui
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] Travis-CI: fix configuration after September's update
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A casestudy where selinux has stopped malware attacks
- From: masoom alam <masoom.alam@xxxxxxxxx>
- Re: A casestudy where selinux has stopped malware attacks
- From: Nick Kralevich via Selinux <selinux@xxxxxxxxxxxxx>
- Re: A casestudy where selinux has stopped malware attacks
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: A casestudy where selinux has stopped malware attacks
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- A casestudy where selinux has stopped malware attacks
- From: masoom alam <masoom.alam@xxxxxxxxx>
- Re: Shepherd - A mandatory Access Controller (Selinux) for VMs/Containers
- From: masoom alam <masoom.alam@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix memory leak in sepol_bool_query()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use kmem_cache for hashtab_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- FYI: selinux/next rebase to v4.14-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] gui: port to Python 3 by migrating to PyGI
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Shepherd - A mandatory Access Controller (Selinux) for VMs/Containers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Shepherd - A mandatory Access Controller (Selinux) for VMs/Containers
- From: masoom alam <masoom.alam@xxxxxxxxxxxxx>
- [PATCH v2 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- My notes from the 2017 Linux Security Summit
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Userspace Python version
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] libsepol: fix memory leak in sepol_bool_query()
- From: Jan.Zarsky.jzarsky@xxxxxxxxxx
- Re: Userspace Python version
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: log no default label warning in verbose mode
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: log no default label warning in verbose mode
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: log no default label warning in verbose mode
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: with extended_socket_class should be still be seeing "socket"?
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Userspace Python version
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- with extended_socket_class should be still be seeing "socket"?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: libselinux: Enable multiple input files to selabel_open.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [Fwd: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill]
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] libselinux: log no default label warning in verbose mode
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- restorecon: Warning no default label for foo
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Userspace Python version
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Userspace Python version
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use kmem_cache for hashtab_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/6] libsepol: use IN6ADDR_ANY_INIT to initialize IPv6 addresses
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: conditional role and range transitions?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pam_selinux and systemd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- conditional role and range transitions?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- pam_selinux and systemd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] selinux: Use kmem_cache for hashtab_node
- From: Kyeongdon Kim <kyeongdon.kim@xxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 3/6] libsepol/cil: fix -Wwrite-strings warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] libsepol: use IN6ADDR_ANY_INIT to initialize IPv6 addresses
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] libsepol/cil: __cil_post_db_neverallow_attr_helper() does not use extra_args
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/6] libsepol/cil: drop wrong unused attribute
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/6] Makefile: define a default value for CFLAGS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] restorecond: check write() and daemon() results
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/3] Security: add lsm hooks for checking permissions on eBPF objects
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH 3/3] selinux: bpf: Implement the selinux checks for eBPF object
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Chenbo Feng <chenbofeng.kernel@xxxxxxxxx>
- tycho.nsa.gov mailing list memberships reminder
- From: mailman-owner@xxxxxxxxxxxxx
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.14
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field to eBPF map
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v4.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Keep attributes used by generated attributes in neverallow rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: cil: Add ability to redeclare types[attributes]
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Keep attributes used by generated attributes in neverallow rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: sysfs symlinks in genfscon
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: cil: Add ability to redeclare types[attributes]
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- [PATCH v2] libsepol: cil: Add ability to redeclare types[attributes]
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: sysfs symlinks in genfscon
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: sysfs symlinks in genfscon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sysfs symlinks in genfscon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] RFC: Allow for multiple cil declarations.
- From: Dan Cashman <dcashman@xxxxxxxxxxx>
- sysfs symlinks in genfscon
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: constify nf_hook_ops
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: reset pointer after free
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] selinux: constify nf_hook_ops
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Chenbo Feng via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Permissions for eBPF objects
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Permissions for eBPF objects
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Permissions for eBPF objects
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH] libsepol: reset pointer after free
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for cgroupfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: file_contexts non-ascii error
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for cgroupfs
- From: Antonio Murdaca <runcom@xxxxxxxxxx>
- Re: file_contexts non-ascii error
- From: Sky Autumn <autumnsky00@xxxxxxxxx>
- Re: file_contexts non-ascii error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [no subject]
- From: Sky Autumn <autumnsky00@xxxxxxxxx>
- Re: [PATCH 0/1] RFC: Allow for multiple cil declarations.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: cil: Add ability to redeclare types[attributes]
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] lsm_audit: update my email address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: update my email address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 0/1] RFC: Allow for multiple cil declarations.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH] Fixed bad reference in roleattribute
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] checkpolicy, libselinux, libsepol, policycoreutils: Update my email address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libsepol: cil: Add ability to redeclare types[attributes]
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- [PATCH 1/2] selinux: update my email address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] lsm_audit: update my email address
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] SELinux: Fine-tuning for some function implementations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Adjust five checks for null pointers
- From: Yanhao Mo <yanhaocs@xxxxxxxxx>
- Re: [PATCH 1/4] selinux: Delete eight unnecessary variable assignments
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/4] selinux: Adjust jump targets in ebitmap_read()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] selinux: Delete eight unnecessary variable assignments
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Adjust five checks for null pointers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 4/4] selinux: Adjust five checks for null pointers
- From: SF Markus Elfring via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 3/4] selinux: Delete an unnecessary return statement in ebitmap_destroy()
- From: SF Markus Elfring via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/4] selinux: Adjust jump targets in ebitmap_read()
- From: SF Markus Elfring via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/4] selinux: Delete eight unnecessary variable assignments
- From: SF Markus Elfring via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/4] SELinux: Fine-tuning for some function implementations
- From: SF Markus Elfring via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] sepolicy: remove stray space in section "SEE ALSO"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Travis-CI: do not test gold linkers with clang
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- ANN: SETools 4.1.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: Reference Policy 2.20170805
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 4/6] sepolicy: support non-MLS policy in manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] sepolicy: fix Python3 syntax in manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/6] sepolicy: remove stray space in section "SEE ALSO"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] sepolicy: support non-MCS policy in manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/6] sepolicy: fix misspelling of _ra_content_t suffix
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] sepolicy: do not fail when file_contexts.local does not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] Travis-CI: do not test gold linkers with clang
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] Travis-CI: use sugulite environment
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: ANN: SELinux userspace release 20170804 / 2.7
- From: Dominick Grift <dac.override@xxxxxxxxx>
- ANN: SELinux userspace release 20170804 / 2.7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: suspicious __GFP_NOMEMALLOC in selinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Dominick Grift <dac.override@xxxxxxxxx>
- httpd_graceful_shutdown makes httpd_can_network_connect mostly mute
- From: Carlos Rodrigues <cefrodrigues@xxxxxxxxx>
- Re: [PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v3] selinux-testsuite: Add tests for transitions under NNP/nosuid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: genheaders should fail if too many permissions are defined
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: test email delivery
- From: Robert Lee <robert.lee@xxxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: Add tests for transitions under NNP/nosuid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: Add tests for transitions under NNP/nosuid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Email problems with this mailing list
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Please adjust the SELinux/audit trees for linux-next
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: setfiles crashing when SELinux is disabled
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: setfiles crashing when SELinux is disabled
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- setfiles crashing when SELinux is disabled
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Email problems with this mailing list
- From: Paul Bolton via Selinux <selinux@xxxxxxxxxxxxx>
- test email delivery
- From: Paul Bolton via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: update the selinux info in MAINTAINERS
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Please adjust the SELinux/audit trees for linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux kernel repository moving to kernel.org
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.7-rc6 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] selinux: remove AVC init audit log message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: remove AVC init audit log message
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 4/4] sepolicy: File labels used to be sorted in a man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/4] sepolicy: Fix minor typo in 'transition -s' test
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/4] sepolicy: Fix syntax errors in 'manpage -w'
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 4/4] sepolicy: File labels used to be sorted in a man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/4] sepolicy: Make manpage and transition faster
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: fix thread safety issues with lookup_common()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: fix thread safety issues with lookup_common()
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: cil: enable cpp compilation of cil.h.
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol: cil: enable cpp compilation of cil.h.
- From: Daniel Cashman <dcashman@xxxxxxxxxxx>
- Re: [PATCH] libselinux: fix thread safety issues with lookup_common()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix thread safety issues with lookup_common()
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Security next tree merged to v4.13-rc2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] selinux: genheaders should fail if too many permissions are defined
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add tests for transitions under NNP/nosuid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for transitions under NNP/nosuid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- SELinux/IP_PASSSEC regression in 4.13-rcX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add tests for AT_SECURE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for AT_SECURE
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.7-rc5 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] open_init_pty: restore stdin/stdout to blocking upon exit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] Revert "open_init_pty: Do not make stdin and stdout non-blocking"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: open_init_pty: Do not make stdin and stdout non-blocking
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Define nnp_nosuid_transition policy capability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Additional tests for long-time supported netlink classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Additional tests for long-time supported netlink classes
- From: Milos Malik <mmalik@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/8] exec: Correct comments about "point of no return"
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/8] exec: Correct comments about "point of no return"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] open_init_pty: Do not make stdin and stdout non-blocking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] exec: Use sane stack rlimit under secureexec
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/8] exec: Correct comments about "point of no return"
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 5/8] smack: Remove redundant pdeath_signal clearing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/8] exec: Move security_bprm_secureexec() earlier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 7/8] exec: Consolidate pdeath_signal clearing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/8] exec: Correct comments about "point of no return"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 8/8] exec: Use sane stack rlimit under secureexec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 6/8] exec: Consolidate dumpability logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 4/8] exec: Use secureexec for clearing pdeath_signal
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/8] exec: Use sane stack rlimit under secureexec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/8] exec: Use secureexec for setting dumpability
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc4 release candidate
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v4.13 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 1/1] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Doug Ledford <dledford@xxxxxxxxxx>
- Re: [PATCH] selinux: return -ENOMEM if kzalloc() fails
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix uninitialized variable use in check_qp_port_pkey_settings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IB/core: Fix uninitialized variable use in check_qp_port_pkey_settings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 2.7-rc4 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix consistency of PYTHONLIBDIR variable across modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix consistency of PYTHONLIBDIR variable across modules
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] IB/core: Fix static analysis warning in ib_policy_change_task
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH] IB/core: Fix uninitialized variable use in check_qp_port_pkey_settings
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux: return -ENOMEM if kzalloc() fails
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Travis-CI: test defining CFLAGS, LDFLAGS, etc. on make command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: return -ENOMEM if kzalloc() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: return -ENOMEM if kzalloc() fails
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 1/3] Travis-CI: update the list of Ruby's and Python's versions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] Travis-CI: test defining CFLAGS, LDFLAGS, etc. on make command line
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/tests: override CPPFLAGS too
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libselinux,libsemanage: fix RUBYLIBS definition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix consistency of PYTHONLIBDIR variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Russell Coker via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Fix consistency of PYTHONLIBDIR variable
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix consistency of PYTHONLIBDIR variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix consistency of PYTHONLIBDIR variable
- Re: run_init messes up terminal settings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: run_init messes up terminal settings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]