SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 3/3] Enable security.selinux in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- run_init messes up terminal settings
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 3/3] Enable security.selinux in user namespaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.7-rc3 release candidate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] mcstrans: Allow overriding libsepol.a location during build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] mcstrans: Allow overriding libsepol.a location during build
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v4.13
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for v4.13
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] genhomedircon: avoid use of non-standard `getpwent_r`
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Use DESTDIR only in install targets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Use DESTDIR only in install targets
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/2] libselinux: avoid redefining _FORTIFY_SOURCE
- From: Patrick Steinhardt <ps@xxxxxx>
- [PATCH v2 0/2] Portability improvements
- From: Patrick Steinhardt <ps@xxxxxx>
- [PATCH v2 2/2] genhomedircon: avoid use of non-standard `getpwent_r`
- From: Patrick Steinhardt <ps@xxxxxx>
- Re: [PATCH 3/3] genhomedircon: avoid use of non-standard `getpwent_r`
- From: Patrick Steinhardt <ps@xxxxxx>
- Re: [PATCH] Use DESTDIR only in install targets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Use DESTDIR only in install targets
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] python/sepolicy: remove definition of SYSCONFDIR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: [PATCH 2/4] libselinux, libsemanage: link Ruby wrapper with -lruby
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] python/sepolicy: remove definition of SYSCONFDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [atomic-devel] New SELinux/Container Blog
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/3] libsemanage/tests: fix linking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] gui: do not create /etc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for tracefs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- New SELinux/Container Blog
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for tracefs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] selinux: enable genfscon labeling for tracefs
- From: Jeff Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Makefiles: override *FLAGS and *LIBS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: fix error when FORTIFY_SOURCE is already set
- From: Patrick Steinhardt <ps@xxxxxx>
- Re: [PATCH 3/3] genhomedircon: avoid use of non-standard `getpwent_r`
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: fix error when FORTIFY_SOURCE is already set
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] Makefiles: override *FLAGS and *LIBS
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: fix error when FORTIFY_SOURCE is already set
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: replace non-standard use of __BEGIN_DECLS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix BINDIR/SBINDIR/... variables in Makefiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: fix error when FORTIFY_SOURCE is already set
- From: Patrick Steinhardt <ps@xxxxxx>
- [PATCH 1/3] libsepol: replace non-standard use of __BEGIN_DECLS
- From: Patrick Steinhardt <ps@xxxxxx>
- [PATCH 3/3] genhomedircon: avoid use of non-standard `getpwent_r`
- From: Patrick Steinhardt <ps@xxxxxx>
- [PATCH 0/3] Portability improvements
- From: Patrick Steinhardt <ps@xxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: BINDIR/SBINDIR/... variables in Makefiles
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC][PATCH] Make BINDIR/SBINDIR/USRSBINDIR definition and usage consistent.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: BINDIR/SBINDIR/... variables in Makefiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets
- From: Luis Ressel <aranea@xxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libselinux utils: override LD{FLAGS, LIBS} for libselinux.so in Makefile
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- BINDIR/SBINDIR/... variables in Makefiles
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- ANN: SELinux userspace 2.7-rc2 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/fixfiles: do not dereference link files in tmp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] policycoreutils/fixfiles: do not dereference link files in tmp
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Fix bugs when writing policy.conf rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH v2] libsepol/cil: Fix bugs when writing policy.conf rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix bugs when writing policy.conf rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix bugs when writing policy.conf rules
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix bugs when writing policy.conf rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Collecting ideas for audit2allow improvement
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Collecting ideas for audit2allow improvement
- From: Jan Zarsky <jzarsky@xxxxxxxxxx>
- Re: SO_PEERSEC on socket connected to the same process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC on socket connected to the same process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SO_PEERSEC on socket connected to the same process
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2] libsepol: Fix neverallow bug when checking conditional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v4.12 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Update test policy and documentation for Infiniband
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: ibendportcon fails to resolve in CIL policy
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: destroy the expanded level when mls_semantic_level_expand() fails
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: "Junil Lee" <junil0814.lee@xxxxxxx>
- [PATCH] secilc: Update test policy and documentation for Infiniband
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: ibendportcon fails to resolve in CIL policy
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] libsepol: destroy the expanded level when mls_semantic_level_expand() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 2.7-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.7-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Fix neverallow bug when checking conditional policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH] libselinux: always unmount selinuxfs for SELINUX=disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: boot failure due to ambiguous SELinux config
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: boot failure due to ambiguous SELinux config
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: boot failure due to ambiguous SELinux config
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: tomcat_t domain behavior
- From: 面和毅 <ka-omo@xxxxxxxx>
- boot failure due to ambiguous SELinux config
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: "이준일/연구원/MC연구소 BSP실 BSP6팀(junil0814.lee@xxxxxxx)" <junil0814.lee@xxxxxxx>
- [PATCH] security: selinux: use kmem_cache for ebitmap
- From: Junil Lee <junil0814.lee@xxxxxxx>
- Re: [RFC PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: icmp and rawip socket
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: icmp and rawip socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- icmp and rawip socket
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: "이준일/연구원/MC연구소 BSP실 BSP6팀(junil0814.lee@xxxxxxx)" <junil0814.lee@xxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: "이준일/연구원/MC연구소 BSP실 BSP6팀(junil0814.lee@xxxxxxx)" <junil0814.lee@xxxxxxx>
- [RFC PATCH] selinux: fix double free in selinux_parse_opts_str()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: use kmem_cache for ebitmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: [PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: call cil_reset_context() when context is not NULL
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH v3] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] security: selinux: use kmem_cache for ebitmap
- From: Junil Lee <junil0814.lee@xxxxxxx>
- [PATCH 1/1] libsepol/cil: call cil_reset_context() when context is not NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] sepolicy: Fix sorting of port_strings in python 3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] sepolicy: Fix sorting of port_strings in python 3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] sepolicy/interface: Use relative python 3 imports
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [no subject]
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: last call for selinux 2.7-rc1 release
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix error check in new cil_resolve_name
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH security-next 2/2] selinux: use pernet operations for hook registration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH v2] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsepol/cil: fix error check in new cil_resolve_name
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH] libselinux: fix selabel_lookup*() double slash bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] sort input files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol,libsemanage,libselinux: Fix fallthrough warnings from gcc 7
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Clean up scope handling
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: do not use handle when it is marked unused
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: do not mark db as unused when it is used
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: selabel_lookup_raw() doesn't find correct context for path with double slashes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH] security/selinux: allow security_sb_clone_mnt_opts to enable/disable native labeling behavior
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: selabel_lookup_raw() doesn't find correct context for path with double slashes
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: selabel_lookup_raw() doesn't find correct context for path with double slashes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: better error message with duplicate aliases + support aliases to aliases
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: selabel_lookup_raw() doesn't find correct context for path with double slashes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] sort input files
- From: bernhardout@xxxxxxxx
- selabel_lookup_raw() doesn't find correct context for path with double slashes
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Fix alloc-size-larger-than warning from gcc 7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/3] libsemanage: Fix snprintf warnings from gcc 7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/3] libsepol, libsemanage, libselinux: Fix fallthrough warnings from gcc 7
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: do not mark db as unused when it is used
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsepol: do not use handle when it is marked unused
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2 v2] libsepol: Fix module_to_cil's handling of type aliases
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol: Clean up scope handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: fix aliasactual resolution errors
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] tools: add perltidy to the syntax checker/fixer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] tools: add perltidy to the syntax checker/fixer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Clean up scope handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Clean up scope handling
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
- [PATCH 2/2] libsepol: Fix module_to_cil's handling of type aliases
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Clean up scope handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: libsepol segfaults with typealias and typealiasactual
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH] tools: add perltidy to the syntax checker/fixer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol segfaults with typealias and typealiasactual
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] sort input files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2 1/2] selinux-testsuite: Infiniband pkey tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 2/2] selinux-testsuite: Infiniband endport tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 0/2] Selinux tests for Infinfiband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/1] libsepol/cil: fix aliasactual resolution errors
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH v1 2/2] selinux-testsuite: Infiniband endport tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] selinux-testsuite: Infiniband pkey tests
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] semanage: Fix manpage author for ibpkey and ibendport pages.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libsepol segfaults with typealias and typealiasactual
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH] tools: add perltidy to the syntax checker/fixer
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] semanage: Fix manpage author for ibpkey and ibendport pages.
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: Access Vector Cache initialization audit message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Access Vector Cache initialization audit message
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 2/2] all: use ./tools/check-syntax to fix the existing code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] all: use ./tools/check-syntax to fix the existing code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] all: use ./tools/check-syntax to fix the existing code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] all: use ./tools/check-syntax to fix the existing code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tools: add perltidy to the syntax checker/fixer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] tools: add perltidy to the syntax checker/fixer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 2/2] all: use ./tools/check-syntax to fix the existing code
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 1/2] tools: add a syntax checker/fixer
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 0/2] Add a file syntax checker/fixer to the testsuite
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] Fix setting of security labels over NFSv4.2
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC 0/2] Fix setting of security labels over NFSv4.2
- From: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] Fix setting of security labels over NFSv4.2
- From: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] Fix setting of security labels over NFSv4.2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix recently introduced TabError's
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Fix recently introduced TabError's
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Fix recently introduced TabError's
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semanage: print is a function in python3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix recently introduced TabError's
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH RFC 1/2] selinux: allow SECURITY_LSM_NATIVE_LABELS to be set on an already initialized superblock
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC 2/2] nfs: update labeling behavior on a superblock when submounting
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC 0/2] Fix setting of security labels over NFSv4.2
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH v1 2/2] selinux-testsuite: Infiniband endport tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] selinux-testsuite: Infiniband pkey tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] selinux-testsuite: Infiniband endport tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] selinux-testsuite: Infiniband pkey tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: allow more instances of map permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ioctl help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ioctl help
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ioctl help
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: ioctl help
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 9/9] semanage: Update man pages for infiniband
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make role_list_destroy() do nothing when role_list is NULL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/9] semanage: Update man pages for infiniband
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: ioctl help
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Fedora COPR repositories with builds of latest code
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Fedora COPR repositories with builds of latest code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v1 2/2] selinux-testsuite: Infiniband endport tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 1/2] selinux-testsuite: Infiniband pkey tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 0/2] Selinux tests for Infinfiband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- ioctl help
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: use the number of elements in calloc first argument
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: security-next merged to v4.12-rc2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/9] IB/core: Enforce PKey security on QPs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v7 2/9] IB/core: Enforce PKey security on QPs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v8 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/1] libsepol: make role_list_destroy() do nothing when role_list is NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [pcmoore-selinux:next 17/17] security/selinux/ibpkey.c:116:24: sparse: incompatible types in comparison expression (different address spaces)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 17/17] security/selinux/ibpkey.c:116:24: sparse: incompatible types in comparison expression (different address spaces)
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 17/17] security/selinux/ibpkey.c:116:24: sparse: incompatible types in comparison expression (different address spaces)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: "Chris O'Neil" <anzavalley@xxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: "Chris O'Neil" <anzavalley@xxxxxxxxx>
- Re: RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RHEL 7.3 : httpd : type=SELINUX_ERR op=security_bounded_transition seresult=denied
- From: "Chris O'Neil" <anzavalley@xxxxxxxxx>
- [PATCH v3 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 6/9] libsepol: Add IB end port handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 3/9] libsepol: Add Infiniband Pkey handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 9/9] semanage: Update man pages for infiniband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 4/9] checkpolicy: Add support for ibendportcon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 5/9] libsepol: Add ibendport ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 2/9] libsepol: Add ibpkey ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 0/9] SELinux user space support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v7 2/9] IB/core: Enforce PKey security on QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 8/9] selinux: Add IB Port SMP access vector
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 6/9] selinux: Allocate and free infiniband security hooks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 5/9] selinux: Create policydb version for Infiniband support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 3/9] selinux lsm IB/core: Implement LSM notification system
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 2/9] IB/core: Enforce PKey security on QPs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: James Morris <jmorris@xxxxxxxxx>
- [pcmoore-selinux:next 17/17] security/selinux/ibpkey.c:116:24: sparse: incompatible types in comparison expression (different address spaces)
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v7 4/9] IB/core: Enforce security on management datagrams
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/2] libsepol: use the number of elements in calloc first argument
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsepol: propagate calloc() failure
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/9] IB/core: Enforce security on management datagrams
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/9] IB/core: Enforce PKey security on QPs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove redundant check for unknown labeling behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Remove redundant check for unknown labeling behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Remove redundant check for unknown labeling behavior
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Mark array 'labeling_behaviors' as __maybe_unused
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux: Mark array 'labeling_behaviors' as __maybe_unused
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Mark array 'labeling_behaviors' as __maybe_unused
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v7 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v7 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 6/9] libsepol: Add IB end port handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 4/9] checkpolicy: Add support for ibendportcon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 9/9] semanage: Update man pages for infiniband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 5/9] libsepol: Add ibendport ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 3/9] libsepol: Add Infiniband Pkey handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 2/9] libsepol: Add ibpkey ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 0/9] SELinux user space support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v1 5/9] libsepol: Add ibendport ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: do not check open permission on sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: do not check open permission on sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Mark array 'labeling_behaviors' as __maybe_unused
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH] selinux: do not check open permission on sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: do not check open permission on sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: open permission is sometimes spelled recvfrom
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: do not check open permission on sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: remove unused attribute on a used argument
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: propagate selabel_subs_init() errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: remove unused attribute on a used argument
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: remove unused attribute on a used argument
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsepol: remove unused attribute on a used argument
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libselinux: rework selabel_subs_init() to avoid use-after-free
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libselinux: propagate selabel_subs_init() errors
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 0/2] Selinux tests for Infinfiband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: Infiniband endport tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: Infiniband pkey tests
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v6 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v6 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH] selinux-testsuite: Test ioctl xperms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/9] libsepol: Add ibendport ocontext handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol, checkpolicy: add binary module support for xperms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux: Use an other error code for an input validation failure in sidtab_insert()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: Use an other error code for an input validation failure in sidtab_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: Return an error code only as a constant in sidtab_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/9] checkpolicy: Add support for ibendportcon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Return directly after a failed memory allocation in policydb_index()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use task_alloc hook rather than task_create hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v1 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: add brief info to policydb
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH v5 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v5 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v1 9/9] semanage: Update man pages for infiniband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 6/9] libsepol: Add IB end port handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 4/9] checkpolicy: Add support for ibendportcon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v1 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 3/9] libsepol: Add Infiniband Pkey handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 5/9] libsepol: Add ibendport ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 2/9] libsepol: Add ibpkey ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v1 0/9] SELinux user space support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: close the subs file if fstat failed
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v4 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH] libsepol,checkpolicy: add binary module support for xperms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible use after free in selabel_subs_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [lkp-robot] [selinux] e9c01c13c6: BUG:unable_to_handle_kernel
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Possible use after free in selabel_subs_init
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Possible use after free in selabel_subs_init
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libselinux: close the subs file if fstat failed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsepol/cil: do not use an uninitialized value in __cil_fqn_qualify_blocks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH v3 1/2] selinux: add brief info to policydb
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: do not check open permission on sockets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] libsepol: Add IB end port handling to CIL
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH] selinux: log policy capability state when a policy is loaded
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: enh via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] procattr.c: Use __BIONIC__ instead of __ANDROID__
- From: Tom Cherry via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] libsepol: Add IB end port handling to CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v3 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v3 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: semanage: is __default__ login map required?
- From: Karl Macmillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH 4/9] checkpolicy: Add support for ibendportcon labels
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/9] checkpolicy: Add support for ibendportcon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] checkpolicy,libsepol: drop unnecessary usage of s6_addr32
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 7/9] semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 3/9] libsepol: Add Infiniband Pkey handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 5/9] libsepol: Add ibendport ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 9/9] semanage: Update man pages for infiniband
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/9] checkpolicy: Add support for ibpkeycon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 4/9] checkpolicy: Add support for ibendportcon labels
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 8/9] semanage: Update semanage to allow runtime labeling of ibendports
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 6/9] libsepol: Add IB end port handling to CIL
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/9] libsepol: Add ibpkey ocontext handling
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 0/9] SELinux user space support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update mmap tests for map permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix CFLAGS definition
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- [PATCH] libselinux: Fix CFLAGS definition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: show checkreqprot status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does recvfrom(2) imply { getattr }?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [lkp-robot] [selinux] 089f088df7: BUG:unable_to_handle_kernel
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dan Stromberg <drsalists@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 09/10] policycoreutils: fixfiles: don't ignore `-F` when run in `-C` mode
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 07/10] policycoreutils: fixfiles: un-document `-R -a` option
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 02/10] policycoreutils: fixfiles: remove two unused variables
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 05/10] policycoreutils: fixfiles: if restorecon aborts, we should too
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 03/10] policycoreutils: fixfiles: syntax error
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 06/10] policycoreutils: fixfiles: refactor into the `set -u` dialect
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 10/10] policycoreutils: fixfiles: use a consistent order for options to restorecon
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 08/10] policycoreutils: fixfiles: remove bad modes of "relabel" command
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 04/10] policycoreutils: fixfiles: usage errors are fatal
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Does recvfrom(2) imply { getattr }?
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Why does Python want to read /proc/meminfo
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Announcing SPAN: SELinux Policy Analysis Notebook
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Why does Python want to read /proc/meminfo
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: Jeffrey Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] Add attribute expansion options
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/utils: Fix build without system sepol.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add brief info to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add brief info to policydb
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Announcing SPAN: SELinux Policy Analysis Notebook
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH 2/2] sestatus: show checkreqprot status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: silence false-positive -Wwrite-strings warning
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] sepolicy/gui: Update text strings to use better gettext templates
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: add a map permission check for mmap
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH] selinux: add a map permission check for mmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] libsemanage: remove access() check to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/3] libsemanage: replace access(, F_OK) checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- libsemanage: remove/replace access() checks to make setuid programs work
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Full SELinux labels on loopback for UDP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: add selinuxenforced tool
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol/utils: Fix build without system sepol.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: add brief info to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- [PATCH v2 2/2] selinux: expose policy brief via selinuxfs
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Full SELinux labels on loopback for UDP
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Add attribute expansion options
- From: Jeff Vander Stoep via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: add selinuxenforced tool
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 0/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 2/2] sestatus: show checkreqprot status
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: add security_get_checkreqprot
- From: Christian Göttsche via Selinux <selinux@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- open permission is sometimes spelled recvfrom
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 6/6] policycoreutils: fixfiles: deprecate -l option
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 2/6] policycoreutils: fixfiles: remove (broken) redundant code
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 4/6] policycoreutils: fixfiles: fix logging about R/O filesystems
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 3/6] policycoreutils: fixfiles: clarify exclude_dirs()
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH 5/6] policycoreutils: fixfiles: move logit call outside of redirected function
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol: Add INCLUDEDIR to utils/Makefile
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 1/2] libselinux/utils: add noreturn attribute to selinux_check_access's usage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsepol: silence false-positive -Wwrite-strings warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: semanage: is __default__ login map required?
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: semanage: is __default__ login map required?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: semanage: is __default__ login map required?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- semanage: is __default__ login map required?
- From: "Arnold, Paul C CTR USARMY PEO STRI (US)" <paul.c.arnold4.ctr@xxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy capabilities: when to use and complications with using
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Policy capabilities: when to use and complications with using
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- MLS on centos 7
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- [PATCH 19/19] sepolicy/gui: Update text strings to use better gettext templates
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 18/19] sepolicy: info() should provide attributes for a TYPE
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 17/19] sepolicy: Fix several issues in 'sepolicy manpage -a'
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 16/19] sepolicy: setools.*Query wants a list in ruletype
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 15/19] dbus: Use text streams in selinux_server.py
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 14/19] policycoreutils/sepolicy: Define our own cmp()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 13/19] sepolicy/generate.py: Fix string formatting
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 12/19] sepolicy: Simplify policy types detection
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 11/19] sepolicy: Don't return filter(), use [ ] notation instead
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 10/19] sepolicy: Adapt to new the semodule list output
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 09/19] Fix typo in executable.py template.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 08/19] sepolicy: We should be creating _exec interfaces when we create the domtrans interface
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 07/19] sepolicy: ptrace should be a part of deny_ptrace boolean in TEMPLATETYPE_admin
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 06/19] Fix up generation of application policy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 05/19] policycoreutils/sepolicy: boolean.png is in help/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 04/19] sepolicy: Move svirt man page out of libvirt into its own
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 03/19] sepolicy: Add manpages for typealiased types
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 02/19] sepolicy: Fix spelling mistakes in commands in generated manpages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 01/19] policycoreutils/sepolicy: Add documentation for MCS separated domains
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Several sepolicy fixes from Fedora
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Remove util/selinux_restorecon.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: Remove util/selinux_restorecon.c
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Add selinux_check_access utility
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: is_selinux_enabled() always returns 0 after selinux_set_policy_root()
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: add checksum to policydb
- From: Sebastien Buisson <sbuisson.ddn@xxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH V2] libselinux: Add permissive= entry to avc audit log
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]