SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] selinux: fix off-by-one in setprocattr
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] setfiles: Fix setfiles progress indicator
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] setfiles: Fix setfiles progress indicator
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: remove deprecated -o option from fixfiles verify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] setfiles: Fix setfiles progress indicator
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Where to troubleshoot and ask questions?
- From: Thomas Mueller <thomas@xxxxxxxxxxxxxx>
- Where to troubleshoot and ask questions?
- From: Bassam Alsanie <bassam.alsanie@xxxxxxxxx>
- RE: CIL Typepermissive Symbol not inside parenthesis
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: CIL Typepermissive Symbol not inside parenthesis
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- CIL Typepermissive Symbol not inside parenthesis
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: libselinux: selinux_restorecon.3 man page typo fix
- From: Lokesh Mandvekar <lsm5@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selinux_restorecon.3 man page typo fix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon.3 man page typo fix
- From: Lokesh Mandvekar <lsm5@xxxxxxxxxxxxxxxxx>
- Re: Patch for typo fix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Patch for typo fix
- From: Lokesh Mandvekar <lsm5@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix pp module to cil nodecon statement
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: pam_selinux: add new option to select from default_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: dpkg: run maintainer scripts with SELinux user system_u
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: pam_selinux: add new option to select from default_contexts
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: pam_selinux: add new option to select from default_contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- dpkg: run maintainer scripts with SELinux user system_u
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- pam_selinux: add new option to select from default_contexts
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: fix pp module to cil nodecon statement
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] libselinux/src/regex.c: support old compilers for the endian check
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: strange avc
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH] libselinux/src/regex.c: support old compilers for the endian check
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- strange avc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: disable filespec hash table stats on non-debug builds
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: set up a logging callback for libselinux
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- [PATCH] libselinux: disable filespec hash table stats on non-debug builds
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: set up a logging callback for libselinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: let output of `fixfiles` be redirected (as normal)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: selinux post
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- ANN: SETools 4.1.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: marcelo.leitner@xxxxxxxxx
- Re: [PATCH 0/4] Make xfrm usable by 32-bit programs
- From: David Miller <davem@xxxxxxxxxxxxx>
- RE: [PATCH 0/4] Make xfrm usable by 32-bit programs
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 1/1] checkpolicy: do not leak memory when declaring a type which has been required
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] checkpolicy: always free id in define_type()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Make xfrm usable by 32-bit programs
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: let output of `fixfiles` be redirected (as normal)
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH 0/4] Make xfrm usable by 32-bit programs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 4/4] xfrm_user: Add new 32/64-agnostic netlink messages
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 4/4] xfrm_user: Add new 32/64-agnostic netlink messages
- From: Kevin Cernekee <cernekee@xxxxxxxxxxxx>
- [PATCH 1/4] xfrm: Constify xfrm_user arguments and xfrm_mgr callback APIs
- From: Kevin Cernekee <cernekee@xxxxxxxxxxxx>
- [PATCH 3/4] xfrm_user: Initial commit of xfrm_user_legacy.c
- From: Kevin Cernekee <cernekee@xxxxxxxxxxxx>
- [PATCH 2/4] xfrm_user: Allow common functions to be called from another file
- From: Kevin Cernekee <cernekee@xxxxxxxxxxxx>
- [PATCH 0/4] Make xfrm usable by 32-bit programs
- From: Kevin Cernekee <cernekee@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: NFS mount contexts
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- NFS mount contexts
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 3/4] checkpolicy: add a missing free(id) in define_roleattribute()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] checkpolicy: always free id in define_type()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/4] checkpolicy: do not leak memory when a class is not found in an avrule
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] checkpolicy: fix memory leaks in define_filename_trans()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol compilation fixes for macOS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libsepol compilation fixes for macOS.
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH] Compilation fixes for macOS
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- ANN: V3SPA 2.1.1
- From: Robert Gove <robert.gove@xxxxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] policycoreutils/hll/pp: Fix pp crash when processing base module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Compilation fixes for macOS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selinux_restorecon: only log no default label warning for caller-supplied pathname
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] libselinux: fix argument order in get_default_context_with_rolelevel() doc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] policycoreutils/hll/pp: Fix pp crash when processing base module
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: [PATCH 1/1] Re-link programs after libsepol.a is updated
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: extend sockcreate to support other address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Wrong alignment when listing user/login with semanage in French
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] checkpolicy: Fix bug in handling type declaration in optional block.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Has anyone ever looked into adding labeling support for the cgroup file system
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Has anyone ever looked into adding labeling support for the cgroup file system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Compilation fixes for macOS
- From: Karl MacMillan <karlwmacmillan@xxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 1/1] checkpolicy: do not leak memory when declaring a type which has been required
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: audit.py required for seobject.py
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: 面和毅 <ka-omo@xxxxxxxx>
- Re: [PATCH 1/1] Re-link programs after libsepol.a is updated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: audit.py required for seobject.py
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] semanage, sepolicy: make tests not fail on systems without SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Re-link programs after libsepol.a is updated
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] checkpolicy: do not leak memory when declaring a type which has been required
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Wrong alignment when listing user/login with semanage in French
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsemanage: genhomedircon: consider SEMANAGE_FCONTEXT_DIR in fcontext_matches()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 45/46] selinux: Use common error handling code in sidtab_insert()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 15/46] selinux: One check and function call less in genfs_read() after error detection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 15/46] selinux: One check and function call less in genfs_read() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/46] selinux: Two function calls less in range_read() after error detection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 15/46] selinux: One check and function call less in genfs_read() after error detection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 07/46] selinux: Delete unnecessary variable assignments in policydb_index()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Has anyone ever looked into adding labeling support for the cgroup file system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Has anyone ever looked into adding labeling support for the cgroup file system
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libselinux: selinux_restorecon: only log no default label warning for caller-supplied pathname
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux: Checking source code positions for the setting of error codes
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/46] SELinux: Fine-tuning for several function implementations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/46] SELinux: Fine-tuning for several function implementations
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 46/46] selinuxfs: Use seq_puts() in sel_avc_stats_seq_show()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 45/46] selinux: Use common error handling code in sidtab_insert()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 44/46] selinux: Adjust two checks for null pointers
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 43/46] selinux: Use kmalloc_array() in sidtab_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 42/46] selinux: One function call less in roles_init() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 41/46] selinux: Move two assignments for the variable "rc" in roles_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 40/46] selinux: Return directly after a failed kzalloc() in roles_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 39/46] selinux: Move two assignments for the variable "rc" in ocontext_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 38/46] selinux: One function call less in five functions after null pointer detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 37/46] selinux: Move an assignment for the variable "rc" in policydb_load_isids()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 36/46] selinux: Move an assignment for the variable "rc" in mls_read_range_helper()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 35/46] selinux: Return directly after a failed kzalloc() in perm_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 34/46] selinux: Return directly after a failed kzalloc() in common_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 33/46] selinux: Move an assignment for the variable "rc" in class_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 32/46] selinux: Return directly after a failed kzalloc() in class_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 31/46] selinux: Move an assignment for the variable "rc" in role_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 30/46] selinux: Return directly after a failed kzalloc() in role_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 29/46] selinux: Return directly after a failed kzalloc() in type_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 28/46] selinux: Return directly after a failed kzalloc() in user_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 27/46] selinux: Move an assignment for the variable "rc" in sens_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 26/46] selinux: Improve another size determination in sens_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 25/46] selinux: Return directly after a failed kzalloc() in sens_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 24/46] selinux: Return directly after a failed kzalloc() in cat_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 23/46] selinux: Move an assignment for a pointer in range_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 22/46] selinux: Delete an unnecessary variable initialisation in range_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 21/46] selinux: Two function calls less in range_read() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 20/46] selinux: Move four assignments for the variable "rc" in range_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 19/46] selinux: Return directly after a failed next_entry() in range_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 18/46] selinux: One function call less in filename_trans_read() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 17/46] selinux: Delete an unnecessary variable assignment in filename_trans_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 16/46] selinux: Move two assignments for the variable "rc" in filename_trans_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 15/46] selinux: One check and function call less in genfs_read() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 14/46] selinux: One function call less in genfs_read() after null pointer detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 13/46] selinux: Move four assignments for the variable "rc" in genfs_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 12/46] selinux: Move assignments for two pointers in genfs_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 10/46] selinux: Move some assignments for the variable "rc" in policydb_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 11/46] selinux: Return directly after a failed next_entry() in genfs_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 09/46] selinux: Delete an error message for a failed memory allocation in policydb_read()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 08/46] selinux: Delete an unnecessary return statement in policydb_destroy()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 07/46] selinux: Delete unnecessary variable assignments in policydb_index()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 06/46] selinux: Use kcalloc() in policydb_index()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 05/46] selinux: Adjust four checks for null pointers
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 04/46] selinux: Use kmalloc_array() in hashtab_create()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 03/46] selinux: Improve size determinations in four functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Marko Rauhamaa <marko@xxxxxxxxxx>
- [PATCH 02/46] selinux: Delete an unnecessary return statement in cond_compute_av()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 01/46] selinux: Use kmalloc_array() in cond_init_bool_indexes()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/46] SELinux: Fine-tuning for several function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] libselinux: fix argument order in get_default_context_with_rolelevel() doc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: verify the right variable after calling calloc()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libselinux: always free catalog in db_init()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] libsepol: use constant keys in hashtab functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/5] libsepol: remove useless assignments
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- audit.py required for seobject.py
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- audit.py required for seobject.py?
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- [PATCH 1/1] semanage, sepolicy: make tests not fail on systems without SELinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] Re-link programs after libsepol.a is updated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] checkpolicy: do not leak memory when declaring a type which has been required
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Wrong alignment when listing user/login with semanage in French
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/1] libsemanage: genhomedircon: consider SEMANAGE_FCONTEXT_DIR in fcontext_matches()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: New Blog on how SELinux blocked Docker container escape.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon: only log no default label warning for caller-supplied pathname
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- New Blog on how SELinux blocked Docker container escape.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policy_define.c: don't free memory returned from queue_head()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policy_define.c: don't free memory returned from queue_head()
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [PATCH] selinux-testsuite: extend sockcreate to support other address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libselinux: replace all malloc + memset by calloc in android label backend.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_restorecon: only log no default label warning if recursive
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] can: Fix kernel panic at security_sock_rcv_skb
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] can: Fix kernel panic at security_sock_rcv_skb
- From: william.c.roberts@xxxxxxxxx
- [PATCH] libselinux: replace all malloc + memset by calloc in android label backend.
- From: Sandeep Patil <sspatil@xxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- Re: [PATCH] restorecon manpage: link back to fixfiles
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unused socket security classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: remove wait test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: drop unused socket security classes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] restorecon manpage: link back to fixfiles
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH] policycoreutils, python: Fix bad manpage formatting in "SEE ALSO"
- From: Alan Jenkins <alan.christopher.jenkins@xxxxxxxxx>
- [PATCH] selinux-testsuite: remove wait test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] security,selinux,smack: kill security_task_wait hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: SELinux lead to soft lockup when pid 1 proceess reap child
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux lead to soft lockup when pid 1 proceess reap child
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy: always include ctypes.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make capability index an unsigned int
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checkpolicy: memory leak in declare_type()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] checkpolicy: fix memory usage in define_bool_tunable()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: SELinux lead to soft lockup when pid 1 proceess reap child
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux lead to soft lockup when pid 1 proceess reap child
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: Rewrite restorecon() python method
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux lead to soft lockup when pid 1 proceess reap child
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: genhomedircon: remove duplicated test condition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fwd: Will security-next be updated for 4.10?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux lead to soft lockup when pid 1 proceess reap child
- From: yangshukui <yangshukui@xxxxxxxxxx>
- [PATCH 2/3] checkpolicy: always include ctypes.h
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] mcstransd: fix and reorder includes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libselinux: include errno.h instead of sys/errno.h
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsemanage: increment the right index variable in for loop
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: genhomedircon: remove duplicated test condition
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/restorecond: Decrease loglevel of termination message
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] checkpolicy: free id where it was leaked
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] checkpolicy: do not leak queue elements in queue_destroy()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] checkpolicy: fix memory leaks in genfscon statements parsing
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] checkpolicy: free id in define_port_context()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] checkpolicy: fix memory usage in define_bool_tunable()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol/tests: fix some memory leaks
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/tests: fix -Wsometimes-uninitialized clang warnings
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: fix optimized compile errors
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: fix optimized compile errors
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make capability index an unsigned int
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol: make capability index an unsigned int
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 1/1] libsepol: make capability index an unsigned int
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsemanage: genhomedircon: remove duplicated test condition
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsemanage: increment the right index variable in for loop
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] policycoreutils/restorecond: Decrease loglevel of termination message
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v2] libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: libsemanage: special handling of the identity reserved to system objects
- From: Dominick Grift <dac.override@xxxxxxxxx>
- libsemanage: special handling of the identity reserved to system objects
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- checkpolicy: memory leak in declare_type()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Domain of kernel module initalization code
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Domain of kernel module initalization code
- From: Luis Ressel <aranea@xxxxxxxx>
- [PATCH 2/5] checkpolicy: free id in define_port_context()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/5] checkpolicy: free id where it was leaked
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] checkpolicy: do not leak queue elements in queue_destroy()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/5] checkpolicy: fix memory leaks in genfscon statements parsing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] checkpolicy: fix memory usage in define_bool_tunable()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsepol/tests: fix some memory leaks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsepol/tests: fix -Wsometimes-uninitialized clang warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsemanage: fix optimized compile errors
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsemanage: fix optimized compile errors
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Another getcon() vs getcon_raw() issue in systemd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add tests for extended socket classes.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: default to security isid in sel_make_bools() if no sid is found
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: log errors when loading new policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsemanage: fix optimized compile errors
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: fix optimized compile errors
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: Rewrite restorecon() python method
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] libselinux: Generate SWIG wrappers for selinux_restorecon()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Rewrite restorecon python method
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux/utils: do not create an empty /sbin directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libselinux/utils: do not create an empty /sbin directory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [GIT PULL] SELinux fixes for 4.10 (#1)
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2] selinux: use the kernel headers when building scripts/selinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Remove ustr library dependency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2 0/7] Remove ustr library dependency
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 6/7] libsemanage: genhomedircon: drop ustr dependency
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 7/7] libsemanage: remove ustr library from Makefiles, README and pkg-config
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 5/7] libsemanage: add semanage_str_replace() utility function
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 3/7] libsemanage/tests: test more cases of semanage_split*()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 4/7] libsemanage: simplify string utilities functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 2/7] libsemanage/tests: make tests standalone
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 1/7] libsemanage/tests: make "make test" fail when a CUnit test fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] selinux: use the kernel headers when building scripts/selinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH v2] selinux: use the kernel headers when building scripts/selinux
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 6/7] libsemanage: genhomedircon: drop ustr dependency
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/7] libsemanage: simplify string utilities functions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/7] libsemanage: genhomedircon: drop ustr dependency
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Mention customizable types in restorecon man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: José Bollo <jobol@xxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: Mention customizable types in restorecon man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: José Bollo <jobol@xxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use the kernel headers when building scripts/selinux/genheaders
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: use the kernel headers when building scripts/selinux/genheaders
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Issues Confined domain
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: Issues Confined domain
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Issues Confined domain
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use the kernel headers when building scripts/selinux/genheaders
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: use the kernel headers when building scripts/selinux/genheaders
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: José Bollo <jobol@xxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] proc,security: move restriction on writing /proc/pid/attr nodes to proc
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mailing list not receiving/sending mail?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up cred usage and simplify
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux: clean up cred usage and simplify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up cred usage and simplify
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: -EXT-Re: Possible SELinux problem on Fedora 25 Install
- From: "Parker, Michael D." <Michael.D.Parker@xxxxxx>
- Re: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: David Laight <David.Laight@xxxxxxxxxx>
- [RFC PATCH 1/1] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] kernel: Add SELinux SCTP protocol support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Unconfined label
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible SELinux problem on Fedora 25 Install
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Unconfined label
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: Possible SELinux problem on Fedora 25 Install
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Possible SELinux problem on Fedora 25 Install
- From: "Parker, Michael D." <Michael.D.Parker@xxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: remove avrules with no affected types
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/9] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v6 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v6 5/9] selinux: Create policydb version for Infiniband support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Doug Ledford <dledford@xxxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] man: standardize spacing with pointers in prototypes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] libsepol, checkpolicy: convert rangetrans and filenametrans to hashtabs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux(8): fix display of man page references
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- [PATCH 2/2] man: standardize spacing with pointers in prototypes
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- ANN: SETools 4.1.0-rc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] libselinux: add O_CLOEXEC
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: add O_CLOEXEC
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH v2] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: handle ICMPv6 consistently with ICMP
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up cred usage and simplify
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: clean up cred usage and simplify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] python/sepolicy/sepolicy: optimise sepolicy gui loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add tests for extended socket classes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for extended socket classes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] python/sepolicy/sepolicy: optimise sepolicy gui loading
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] python/sepolicy/sepolicy: Cleanup of gui code
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] selinux: handle ICMPv6 consistently with ICMP
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol: Define extended_socket_class policy capability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: add security in-core xattr support for tracefs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Why do we block context="foobar" from User Namespace
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC][PATCH] selinux: allow context mounts on tmpfs, ramfs, devpts within user namespaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why do we block context="foobar" from User Namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why do we block context="foobar" from User Namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: remove avrules with no affected types
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] quick selinux support for tracefs
- From: YongQin Liu <yongqin.liu@xxxxxxxxxx>
- Re: [PATCH] quick selinux support for tracefs
- From: YongQin Liu <yongqin.liu@xxxxxxxxxx>
- [PATCH] cil: remove avrules that have no associated types
- From: Gary Tierney <gary.tierney@xxxxxxx>
- [PATCH] libsepol/cil: remove avrules with no affected types
- From: Gary Tierney <gary.tierney@xxxxxxx>
- RE: [PATCH] quick selinux support for tracefs
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Why do we block context="foobar" from User Namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Filtering an avtab in libsepol
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [PATCH v3] selinux: add security in-core xattr support for tracefs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why do we block context="foobar" from User Namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Why do we block context="foobar" from User Namespace
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH v3] selinux: add security in-core xattr support for tracefs
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2] selinux: add security in-core xattr support for tracefs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: add security in-core xattr support for tracefs
- From: william.c.roberts@xxxxxxxxx
- RE: [PATCH] quick selinux support for tracefs
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Filtering an avtab in libsepol
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Filtering an avtab in libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] quick selinux support for tracefs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] quick selinux support for tracefs
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Filtering an avtab in libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy/sepolicy/gui: Reflect sepolicy changes into gui
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] quick selinux support for tracefs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] quick selinux support for tracefs
- From: william.c.roberts@xxxxxxxxx
- [PATCH] quick selinux support for tracefs
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Filtering an avtab in libsepol
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/sepolicy/sepolicy/gui: Reflect sepolicy changes into gui
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] python/sepolicy/sepolicy/gui: Reflect sepolicy changes into gui
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python: Fix some typos
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python: Fix some typos
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add IPv6 client/server support plus tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: INTERP ELF header and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: INTERP ELF header and SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- INTERP ELF header and SELinux
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SETools 4 segfault - sepolicy gui
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SETools 4 segfault - sepolicy gui
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC][PATCH] selinux: support distinctions among all network address families
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] seobject: Handle python error returns correctly
- From: Kyle Walker <kwalker@xxxxxxxxxx>
- Re: [PATCH] seobject: Handle python error returns correctly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] seobject: Handle python error returns correctly
- From: Kyle Walker <kwalker@xxxxxxxxxx>
- Re: [PATCH] seobject: Handle python error returns correctly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] seobject: Handle python error returns correctly
- From: Kyle Walker <kwalker@xxxxxxxxxx>
- Re: [PATCH] python/semanage/semanage: Unify argument handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/sepolicy/gui: fix current selinux state radiobutton
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/sepolicy/gui: fix current selinux state radiobutton
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] python/semanage/semanage: Unify argument handling
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol: Fix neverallow checking to also check the other types when self is included in a target type set.
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol, libselinux, audit2allow: teach audit2why about type bounds failures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: sepol_av_to_string: clear static buffer
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: avcstat: Clean up redundant condition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: do not #include <sys/cdefs.h>
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2 v2] secilc: Add secil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/sepolicy/gui: fix current selinux state radiobutton
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] libsepol,libsemanage: write file name in flex output
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] libsepol: detect duplicated symbol IDs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils/sepolicy/gui: fix current selinux state radiobutton
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 4/4] libsepol,libsemanage: write file name in flex output
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/4] checkpolicy: remove -lfl from LDLIBS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] libsepol/tests: use LDFLAGS when linking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/4] mcstrans/utils: make "make all" use $DESTDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2 v2] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2 v2] libsepol: check decl_id bounds before using it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support
- From: David Graziano <david.graziano@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2 v2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2 v2] libsepol, checkpolicy: convert rangetrans and filenametrans to hashtabs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol: do not write object_r types to policy file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: setools: cast increases required alignment of target type
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] procattr.c: Use __ANDROID__ instead of ANDROID
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] enabled.c: Remove stdio_ext.h header
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] libsepol: check decl_id bounds before using it
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] libsepol: ebitmap: reject loading bitmaps with incorrect high bit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] libsepol: do not check decl->symtab[i].nprim
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] libsepol: do not modify p->p_roles.nprim in role_set_expand
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- setools: cast increases required alignment of target type
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] procattr.c: Use __ANDROID__ instead of ANDROID
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [GIT PULL] SELinux patches for 4.10
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] enabled.c: Remove stdio_ext.h header
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [PATCH 3/5] libsepol: ebitmap: reject loading bitmaps with incorrect high bit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libsepol: check decl_id bounds before using it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/5] libsepol: detect duplicated symbol IDs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: do not check decl->symtab[i].nprim
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] libsepol: do not modify p->p_roles.nprim in role_set_expand
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v6 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol: fix unknown magic section number error message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v5 2/9] IB/core: Enforce PKey security on QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v5 8/9] selinux: Add IB Port SMP access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 2/2] libsepol, checkpolicy: convert rangetrans and filenametrans to hashtabs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 1/2] libsepol: do not write object_r types to policy file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/2] Enable direct compare of policy file with kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v6 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 4/4] selinux: Convert isec->lock into a spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5/5] libsepol: fix unknown magic section number error message
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/5] libsepol: make scope_index_destroy() more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/5] libsepol: do not crash when block->branch_list is NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/5] libsepol: do not crash when a symbol does not exist
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/5] libsepol: do not call a NULL function in additive_scopes_to_cil()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH v5 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v5 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH 2/2 v2] secilc: Add secil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Lenny Bruzenak <lenny@xxxxxxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: segmentation fault in additive_scopes_to_cil()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: segmentation fault in additive_scopes_to_cil()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- segmentation fault in additive_scopes_to_cil()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Finer grained SELinux controls for CAP_SYS_ADMIN functionality
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] Fix AUDIT_MAC_POLICY_LOAD event formatting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Remove unused permission definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: Remove unused permission definitions
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] label_file.h: actually use the results of compat_validate
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: normalize input to /sys/fs/selinux/enforce
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] label_file.h: actually use the results of compat_validate
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Add cil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH 2/2] policycoreutils: Add cil2conf which creates a policy.conf from CIL policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2] Add the ability to write policy.conf file from CIL AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: github issue trackers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: github issue trackers
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy: treat -self as an error
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- github issue trackers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: keep SELinux in sync with new capability definitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: normalize enforce values from the kernel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: normalize input to /sys/fs/selinux/enforce
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy disable error
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy disable error
- From: cgzones <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux, libsemanage: use Python-specific .so extension
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: audit2why: remove unused module_state structure
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/1] libselinux, libsemanage: use Python-specific .so extension
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] mcstrans: fix global "make install"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: audit2why: remove unused module_state structure
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] mcstrans: fix global "make install"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] sandbox: make test not fail on systems without SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] expand_terule_helper: cleanups
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] sandbox: make test not fail on systems without SELinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3 2/3] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 1/3] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- [PATCH v3 3/3] expand_terule_helper: cleanups
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Using "override CFLAGS += -I$(PREFIX)/include" in mcstrans?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Using "override CFLAGS += -I$(PREFIX)/include" in mcstrans?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 1/2] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- [PATCH v2 2/2] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] mcstrans: Fix signed/unsigned warnings
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] expand_avrule_helper: cleanup
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: what is the purpose of security initial sid?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/2] expand_avrule_helper: cleanup
- From: william.c.roberts@xxxxxxxxx
- [PATCH 1/2] policydb.h: use AVTAB macros to avoid duplications
- From: william.c.roberts@xxxxxxxxx
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Split up policycoreutils
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: what is the purpose of security initial sid?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- what is the purpose of security initial sid?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: make parsing symbol table headers more robust
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol: test for ebitmap_read() negative return value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 5/5] restorecond: Add gitignore
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/5] mcstrans: Add utils gitignore
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/5] Add stub make test targets to new subdirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/5] mcstrans: take LIBDIR from args, dont guess
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/5] mcstrans: Fix Werror=shadow errors
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v4] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SELinux system configuration using CIPSO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH take2 v6] libsepol: fix checkpolicy dontaudit compiler bug
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH take2 v5] libsepol: fix checkpolicy dontaudit compiler bug
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]