SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 08/12] policycoreutils: import sepolicy directly
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 12/12] semanage: Print usage when no args
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 11/12] policycoreutils/gui: py3 support for modules that changed name
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 10/12] policycoreutils/gui: update to python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 09/12] policycoreutils: gettext compat for py2 and 3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 07/12] sepolicy: dont alias sepolicy.search and sepolicy.info
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 06/12] sepolicy: update exceptions and print for python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 05/12] sepolicy: C Module init for python3
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 04/12] sepolicy: Add python3 PyInt and PyString defs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 03/12] semanage: misc style issues
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 02/12] seobject: use sorted() instead of .sort()
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 01/12] semanage: py3 support for print function and map/filter
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Python3 support in policycoreutils
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v3] module_to_cil: fix possible use of initialized value
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux/utils/Makefile: Fix in tree compilation
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] policycoreutils/sepolicy: Check get_rpm_nvr_list() return value
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: semodule - remove 'q' from getopt string
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux/utils/Makefile: Fix in tree compilation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: semodule - remove 'q' from getopt string
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH v2] module_to_cil: fix use of uninitialized variables
- From: william.c.roberts@xxxxxxxxx
- RE: [PATCH] module_to_cil: fix possible use of initialized value
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] module_to_cil: fix possible use of initialized value
- From: william.c.roberts@xxxxxxxxx
- Re: [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- Should port 3269 be ldap_port_t?
- From: Colin Powers <Colin.Powers@xxxxxxxxx>
- [PATCH] policycoreutils: Don't use subprocess.getstatusoutput() in Python 2 code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Planet SE Linux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Planet SE Linux
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v3 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Add tests for non-init userns capability checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add test for execstack on thread stacks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- selinux custom mls label
- From: Kashif ali <kashif.ali.9498@xxxxxxxxx>
- [PATCH] genhomedircon: add support for %group syntax
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: I still think typebounds checking is too tight.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- I still think typebounds checking is too tight.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ignore object_r in userrole mappings when creating policy binary
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Ignore object_r in userrole mappings when creating policy binary
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH] security: lsm_audit: print pid and tid
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/2] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH V3 4/4] policycoreutils: restorecond - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 3/4] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 2/4] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 1/4] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/4] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] semanage: add auditing of changes in records
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] semanage: add auditing of changes in records
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- [PATCH 2/2] semanage: fix modify action in node and interface
- From: Miroslav Vadkerti <mvadkert@xxxxxxxxxx>
- Re: genhomedircon: some issues with a custom policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- genhomedircon: some issues with a custom policy
- From: Gary Tierney <gary.tierney@xxxxxxx>
- Re: Is there any SELinux support for labelled printing like with Trusted Extensions?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Is there any SELinux support for labelled printing like with Trusted Extensions?
- From: ileyd <ileyd@xxxxxxxxxx>
- Re: rpm running with MLS range?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- rpm running with MLS range?
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- Re: redis - selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: redis - selinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Sheng Yang <sheng@xxxxxxxxxx>
- redis - selinux
- From: Kamil Boratyński <kboratynski@xxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Sheng Yang <sheng@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- RE: RFC Fuzzing SE Linux interfaces
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] Extend checkpolicy pathname matching.
- From: Inamdar Sharif <isharif@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC Fuzzing SE Linux interfaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] field-dictionary: add ioctlcmd
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- RFC Fuzzing SE Linux interfaces
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] field-dictionary: add ioctlcmd
- From: william.c.roberts@xxxxxxxxx
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <pmoore@xxxxxxxxxx>
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v2] security: Add task_settimerslack LSM hook
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFC][PATCH 2/2 v2] security: Add task_settimerslack LSM hook
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 9/9] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 8/9] selinux: Add IB Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 7/9] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 6/9] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 5/9] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 4/9] IB/core: Enforce security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 2/9] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 0/9] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH v2 1/9] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: print leading 0x on ioctlcmd audits
- From: william.c.roberts@xxxxxxxxx
- Re: Inconsistent RSS on Red Hat 7 but not 6.
- From: Todd Rinaldo <toddr@xxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Use IS_ENABLED() instead of checking for built-in or module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Extend checkpolicy pathname matching.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] policycoreutils: Remove duplicate, empty translation files
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] policycoreutils: Remove unused autoconf files from po/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Inconsistent RSS on Red Hat 7 but not 6.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] open_init_pty: Do not error on EINTR
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Add missing return to sepol_node_query()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Inconsistent RSS on Red Hat 7 but not 6.
- From: Todd Rinaldo <toddr@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Add missing return to sepol_node_query()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.8
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] open_init_pty: Do not error on EINTR
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [BUG libselinux] Use nftw() instead of fts()
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- Re: Fwd: SElinux user tools 2.5 change
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH libsepol] Add missing <stdarg.h> include
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix [-s STORE] typos in semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Change the location of _selinux.so
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [BUG libselinux] Use nftw() instead of fts()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [BUG libselinux] Use nftw() instead of fts()
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- [PATCH libsepol] Add missing <stdarg.h> include
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Fwd: SElinux user tools 2.5 change
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Fwd: SElinux user tools 2.5 change
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: fix [-s STORE] typos in semanage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Change the location of _selinux.so
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 11/12] IB/core: Enforce Infiniband device SMI security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 12/12] IB/core: Implement the Infiniband flush callback
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 09/12] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 10/12] IB/core: Enforce PKey security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: man: Clarify is_selinux_mls_enabled() description
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: compare absolute pathname in matchpathcon -V
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix typos in test/dispol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: sandbox - trying to use it / some bugs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: rewrite sepol_string_to_security_class to use hashtab_search
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Modify audit2why analyze function to use loaded policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: man: Explain how to free policy type from selinux_getpolicytype()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] libselinux: man: Clarify is_selinux_mls_enabled() description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux: compare absolute pathname in matchpathcon -V
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- [PATCH v4 05/19] netlabel: Add support for enumerating the CALIPSO DOI list.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 07/19] netlabel: Add support for removing a CALIPSO DOI.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 08/19] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 15/19] calipso: Allow the lsm to label the skbuff directly.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 02/19] netlabel: Add an address family to domain hash entries.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 06/19] netlabel: Add support for creating a CALIPSO protocol domain mapping.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 04/19] netlabel: Add support for querying a CALIPSO DOI.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 03/19] netlabel: Initial support for the CALIPSO netlink protocol.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 10/19] calipso: Set the calipso socket label to match the secattr.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 09/19] netlabel: Move bitmap manipulation functions to the NetLabel core.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 13/19] calipso: Allow request sockets to be relabelled by the lsm.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 11/19] netlabel: Prevent setsockopt() from changing the hop-by-hop option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 12/19] ipv6: Allow request socks to contain IPv6 options.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 16/19] netlabel: Pass a family parameter to netlbl_skbuff_err().
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 14/19] ipv6: constify the skb pointer of ipv6_find_tlv().
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 17/19] calipso: Add validation of CALIPSO option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 18/19] calipso: Add a label cache.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 00/19] CALIPSO Implementation
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 19/19] netlabel: Implement CALIPSO config functions for SMACK.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 01/19] netlabel: Mark rcu pointers with __rcu.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Selectively assigning SELinux policies to permissive and enforcement mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- When/how to use "delete" in CIL?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- sandbox - trying to use it / some bugs
- From: linseonn.20.mddlr@xxxxxxxxxxxxxxx
- [PATCH] checkpolicy: Fix typos in test/dispol
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Selectively assigning SELinux policies to permissive and enforcement mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Selectively assigning SELinux policies to permissive and enforcement mode
- From: Taeho Kgil <taeho.kgil@xxxxxxxxx>
- [PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: [PATCH 1/1] selinuxfs: fix type mismatch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Ursula Braun <ubraun@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: import NetLabel category bitmaps correctly
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Ursula Braun <ubraun@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] selinuxfs: fix type mismatch
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Ryusuke Konishi <konishi.ryusuke@xxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Steven Whitehouse <swhiteho@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Felipe Balbi <balbi@xxxxxxxxxx>
- [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Problem building CLIP ISO
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Sort object files for deterministic linking order
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix typos in semanage manpages
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Fix the documentation of -l,--list
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: XWindows and CLIP?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- XWindows and CLIP?
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] Sort object files for deterministic linking order
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC 2/2] overlayfs: Make getxattr work with inode only
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 0/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] policycoreutils: fix typos in semanage manpages
- From: Philipp Gesang <philipp.gesang@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- [PATCH] policycoreutils/semodule: Fix the documentation of -l,--list
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] selinux: Only apply bounds checking to source types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Only apply bounds checking to source types
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol will not compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fw: libsepol will not compile
- From: "Jesse M. Bacon" <jesse.bacon@xxxxxxxxxxxxxxxxxxxxx>
- libsepol will not compile
- From: "Jesse M. Bacon" <jesse.bacon@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix neverallowxperm checking on attributes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: Minor fix in a French translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: set flex as default lexer
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix neverallowxperm checking on attributes
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Dalibor Pospíšil <dapospis@xxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Dalibor Pospíšil <dapospis@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: SETools 4.0.1
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2] policycoreutils: Minor fix in a French translation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: Minor fix for in a French translation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] checkpolicy: set flex as default lexer
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix checkmodule output message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Support overriding Makefile RANLIB
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: Fix checkmodule output message
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Avoid mounting /proc outside of selinux_init_load_policy().
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] setools3: Allow to override PKG_CONFIG
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- [PATCH] libqpol: Make Makefile AR overwritable
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- [PATCH] libsemanage: Support overriding Makefile RANLIB
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.
- From: Bill <wch1m1@xxxxxxxxx>
- [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: update sandbox.8 man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: remove typos from chcat --help
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Update make clean instructions and .gitgnore files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable
- From: roidelapluie@xxxxxxxxx
- Re: Selinux Docker issues
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: [RFC PATCH v3 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 4.7
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.7
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 6/6 v3] libsepol: When generating CIL use HLL line mark for neverallows
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/6 v3] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/6 v3] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/6 v3] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/6 v3] libsepol/cil: Store CIL filename in parse tree and AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Selinux Docker issues
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 2/3] sepolgen: remove additional files when cleaning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: remove libsepol.map when cleaning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/3] Update make clean instructions and .gitgnore files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] Update .gitignore files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Licence of the new setools icons
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Selinux Docker issues
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- [PATCH 4/6 v2] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/6 v2] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 6/6 v2] libsepol: When generating CIL use HLL line mark for neverallows
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/6 v2] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/6 v2] libsepol/cil: Store CIL filename in parse tree and AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change logic of bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: David Merritt <david.d.merritt@xxxxxxxxx>
- Re: [PATCH] libsepol: Change logic of bounds checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux build errors
- From: David Merritt <david.d.merritt@xxxxxxxxx>
- ANN: SETools 4.0.0
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libsepol: Change logic of bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v3] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: enh <enh@xxxxxxxxxx>
- [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix multiple spelling errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] genhomedircon: fix FALLBACK_NAME regex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix multiple spelling errors
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: policycoreutils: fixfiles does not relabel contents of btrfs subvolumes
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v4 7/7] genhomedircon: fix FALLBACK_NAME regex
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 6/7] genhomedircon: write contexts for username and userid
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 5/7] genhomedircon: make USERID, USERNAME context lists
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 4/7] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 3/7] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 2/7] genhomedircon: rename FALLBACK #defines consistent with user struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 1/7] genhomedircon: factor out common replacement code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- genhomedircon userid patches v4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix type bounds checking for attributes
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Only apply bounds checking to source types in rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: fix type bounds checking for attributes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches v2
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 21/21] fuse: Allow user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 09/21] Smack: Handle labels consistently in untrusted mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 06/21] fs: Treat foreign mounts as nosuid
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 07/21] selinux: Add support for unprivileged mounts from user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 05/21] block_dev: Check permissions towards block device inode when mounting
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 01/21] fs: fix a posible leak of allocated superblock
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: apply execstack check on thread stacks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: trying to understand a cronie issue anno 2008
- From: Dominick Grift <dac.override@xxxxxxxxx>
- trying to understand a cronie issue anno 2008
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 3/8] genhomedircon: rename FALLBACK #defines consistent with struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 1/8] genhomedircon: factor out common replacement code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 7/8] genhomedircon: write contexts for username and userid
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 8/8] genhomedircon: fix FALLBACK_NAME regex
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 4/8] genhomedircon: make all write context funcs take user_entry struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 6/8] genhomedircon: make USERID, USERNAME context lists
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- genhomedircon USERID and USERNAME patches v2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v3 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 06/21] fs: Treat foreign mounts as nosuid
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 07/21] selinux: Add support for unprivileged mounts from user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]