SELinux - Date Index
[Prev Page][Next Page]
- [GIT PULL] SELinux patches for 4.8
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] libselinux: If autorelabel, force permissive mode.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- [PATCH] libselinux: If autorelabel, force permissive mode.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] libselinux: Add openrc_contexts functions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] open_init_pty: Do not error on EINTR
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [BUG libselinux] Use nftw() instead of fts()
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- Re: Fwd: SElinux user tools 2.5 change
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH libsepol] Add missing <stdarg.h> include
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix [-s STORE] typos in semanage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Change the location of _selinux.so
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [BUG libselinux] Use nftw() instead of fts()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [BUG libselinux] Use nftw() instead of fts()
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- [PATCH libsepol] Add missing <stdarg.h> include
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Fwd: SElinux user tools 2.5 change
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Fwd: SElinux user tools 2.5 change
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Yuval Shaia <yuval.shaia@xxxxxxxxxx>
- Re: [PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] policycoreutils: fix [-s STORE] typos in semanage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Change the location of _selinux.so
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 11/12] IB/core: Enforce Infiniband device SMI security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 06/12] selinux: Add IB End Port SMP access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 04/12] selinux: Allocate and free infiniband security hooks
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 12/12] IB/core: Implement the Infiniband flush callback
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 09/12] IB/core: Enforce PKey security on QPs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 10/12] IB/core: Enforce PKey security on management datagrams
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 03/12] selinux: Implement Infiniband flush callback
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 00/12] SELinux support for Infiniband RDMA
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 02/12] selinux: Create policydb version for Infiniband support
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH 01/12] security: Add LSM hooks for Infiniband security
- From: Dan Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: man: Clarify is_selinux_mls_enabled() description
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: compare absolute pathname in matchpathcon -V
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix typos in test/dispol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: New rules on restrict kernel module loading
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: sandbox - trying to use it / some bugs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- Re: abnormal SELinux context labels
- From: Simon Sekidde <ssekidde@xxxxxxxxxx>
- abnormal SELinux context labels
- From: Bond Masuda <bond.masuda@xxxxxxxxxx>
- New rules on restrict kernel module loading
- From: Ravi Kumar <nxp.ravi@xxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: "Patrick K., ITF" <cto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] CALIPSO Implementation
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: rewrite sepol_string_to_security_class to use hashtab_search
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Modify audit2why analyze function to use loaded policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: man: Explain how to free policy type from selinux_getpolicytype()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] libselinux: man: Clarify is_selinux_mls_enabled() description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] libselinux: compare absolute pathname in matchpathcon -V
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Sven Vermeulen <sven.j.vermeulen@xxxxxxxxx>
- [PATCH v4 05/19] netlabel: Add support for enumerating the CALIPSO DOI list.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 07/19] netlabel: Add support for removing a CALIPSO DOI.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 08/19] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 15/19] calipso: Allow the lsm to label the skbuff directly.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 02/19] netlabel: Add an address family to domain hash entries.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 06/19] netlabel: Add support for creating a CALIPSO protocol domain mapping.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 04/19] netlabel: Add support for querying a CALIPSO DOI.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 03/19] netlabel: Initial support for the CALIPSO netlink protocol.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 10/19] calipso: Set the calipso socket label to match the secattr.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 09/19] netlabel: Move bitmap manipulation functions to the NetLabel core.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 13/19] calipso: Allow request sockets to be relabelled by the lsm.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 11/19] netlabel: Prevent setsockopt() from changing the hop-by-hop option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 12/19] ipv6: Allow request socks to contain IPv6 options.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 16/19] netlabel: Pass a family parameter to netlbl_skbuff_err().
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 14/19] ipv6: constify the skb pointer of ipv6_find_tlv().
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 17/19] calipso: Add validation of CALIPSO option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 18/19] calipso: Add a label cache.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 00/19] CALIPSO Implementation
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 19/19] netlabel: Implement CALIPSO config functions for SMACK.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH v4 01/19] netlabel: Mark rcu pointers with __rcu.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- Re: When/how to use "delete" in CIL?
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Selectively assigning SELinux policies to permissive and enforcement mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Protect Xen Virtualization via SElinux.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- When/how to use "delete" in CIL?
- From: Sven Vermeulen <sven.vermeulen@xxxxxxxxx>
- sandbox - trying to use it / some bugs
- From: linseonn.20.mddlr@xxxxxxxxxxxxxxx
- [PATCH] checkpolicy: Fix typos in test/dispol
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: add selinux_snapperd_contexts_path()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Selectively assigning SELinux policies to permissive and enforcement mode
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Selectively assigning SELinux policies to permissive and enforcement mode
- From: Taeho Kgil <taeho.kgil@xxxxxxxxx>
- [PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Protect Xen Virtualization via SElinux.
- From: Jason Long <hack3rcon@xxxxxxxxx>
- Re: [PATCH 1/1] selinuxfs: fix type mismatch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Ursula Braun <ubraun@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: import NetLabel category bitmaps correctly
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Ursula Braun <ubraun@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] selinuxfs: fix type mismatch
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Ryusuke Konishi <konishi.ryusuke@xxxxxxxxxxxxx>
- Re: [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] iucv: properly clone LSM attributes to newly created child sockets
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Steven Whitehouse <swhiteho@xxxxxxxxxx>
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Felipe Balbi <balbi@xxxxxxxxxx>
- [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: Michael Napolitano <mnapolitano@xxxxxxxxxx>
- RE: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [Clip] Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Problem building CLIP ISO
- From: Brandon Whalen <brandon@xxxxxxxxxxxxxxxxx>
- Problem building CLIP ISO
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr()
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] Sort object files for deterministic linking order
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix typos in semanage manpages
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/semodule: Fix the documentation of -l,--list
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] Correctly detect unknown classes in sepol_string_to_security_class
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] Modify audit2why analyze function to use loaded policy
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: XWindows and CLIP?
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- XWindows and CLIP?
- From: John Chludzinski <john.chludzinski@xxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] Sort object files for deterministic linking order
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] LSM: Reorder security_capset to do access checks properly
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC 2/2] overlayfs: Make getxattr work with inode only
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 1/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 0/2] selinux: Stop looking up dentries from inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] policycoreutils: fix typos in semanage manpages
- From: Philipp Gesang <philipp.gesang@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- [PATCH] policycoreutils/semodule: Fix the documentation of -l,--list
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] selinux: Only apply bounds checking to source types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Only apply bounds checking to source types
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: libsepol will not compile
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Fw: libsepol will not compile
- From: "Jesse M. Bacon" <jesse.bacon@xxxxxxxxxxxxxxxxxxxxx>
- libsepol will not compile
- From: "Jesse M. Bacon" <jesse.bacon@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix neverallowxperm checking on attributes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: Minor fix in a French translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: set flex as default lexer
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix neverallowxperm checking on attributes
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Dalibor Pospíšil <dapospis@xxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Dalibor Pospíšil <dapospis@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: SETools 4.0.1
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] semodule: Fix the --list-modules=full example in the manpage
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2] policycoreutils: Minor fix in a French translation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] policycoreutils: Minor fix for in a French translation
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] checkpolicy: set flex as default lexer
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix checkmodule output message
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Support overriding Makefile RANLIB
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: Fix checkmodule output message
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Avoid mounting /proc outside of selinux_init_load_policy().
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] setools3: Allow to override PKG_CONFIG
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- [PATCH] libqpol: Make Makefile AR overwritable
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- [PATCH] libsemanage: Support overriding Makefile RANLIB
- From: Julien Pivotto <roidelapluie@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.
- From: Bill <wch1m1@xxxxxxxxx>
- [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3)
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/3] Update setfiles/restorecon to support selinux_restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: fix the extract example in semodule.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: update sandbox.8 man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils: remove typos from chcat --help
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Update make clean instructions and .gitgnore files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Huw Davies <huw@xxxxxxxxxxxxxxx>
- [PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable
- From: roidelapluie@xxxxxxxxx
- Re: Selinux Docker issues
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- Re: [RFC PATCH v3 00/19] CALIPSO Implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 17/19] calipso: Add validation of CALIPSO option.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for 4.7
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux patches for 4.7
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 6/6 v3] libsepol: When generating CIL use HLL line mark for neverallows
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/6 v3] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/6 v3] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/6 v3] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/6 v3] libsepol/cil: Store CIL filename in parse tree and AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Selinux Docker issues
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Licence of the new setools icons
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH 2/3] sepolgen: remove additional files when cleaning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: remove libsepol.map when cleaning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/3] Update make clean instructions and .gitgnore files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] Update .gitignore files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Licence of the new setools icons
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Selinux Docker issues
- From: Naina Emmanuel <nemmanuel1992@xxxxxxxxx>
- [PATCH 4/6 v2] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/6 v2] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 6/6 v2] libsepol: When generating CIL use HLL line mark for neverallows
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 3/6 v2] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/6 v2] libsepol/cil: Store CIL filename in parse tree and AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Change logic of bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: David Merritt <david.d.merritt@xxxxxxxxx>
- Re: [PATCH] libsepol: Change logic of bounds checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux build errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux build errors
- From: David Merritt <david.d.merritt@xxxxxxxxx>
- ANN: SETools 4.0.0
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libsepol: Change logic of bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v3] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: enh <enh@xxxxxxxxxx>
- [PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix multiple spelling errors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] genhomedircon: fix FALLBACK_NAME regex
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix multiple spelling errors
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: policycoreutils: fixfiles does not relabel contents of btrfs subvolumes
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v4 7/7] genhomedircon: fix FALLBACK_NAME regex
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 6/7] genhomedircon: write contexts for username and userid
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 5/7] genhomedircon: make USERID, USERNAME context lists
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 4/7] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 3/7] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 2/7] genhomedircon: rename FALLBACK #defines consistent with user struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v4 1/7] genhomedircon: factor out common replacement code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- genhomedircon userid patches v4
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: userspace object managers get confused if an update changes object classes and access vectors
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Only apply bounds checking to source types in rules
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: fix type bounds checking for attributes
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- userspace object managers get confused if an update changes object classes and access vectors
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Miroslav Grepl <mgrepl@xxxxxxxxxx>
- [PATCH] selinux: Only apply bounds checking to source types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: Only apply bounds checking to source types in rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: fix type bounds checking for attributes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches v2
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 21/21] fuse: Allow user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 09/21] Smack: Handle labels consistently in untrusted mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 06/21] fs: Treat foreign mounts as nosuid
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 07/21] selinux: Add support for unprivileged mounts from user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 05/21] block_dev: Check permissions towards block device inode when mounting
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 01/21] fs: fix a posible leak of allocated superblock
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: apply execstack check on thread stacks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: trying to understand a cronie issue anno 2008
- From: Dominick Grift <dac.override@xxxxxxxxx>
- trying to understand a cronie issue anno 2008
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx>
- [PATCH] selinux: Build policy on systems not supporting DCCP protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2 2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 3/8] genhomedircon: rename FALLBACK #defines consistent with struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 1/8] genhomedircon: factor out common replacement code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 7/8] genhomedircon: write contexts for username and userid
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 8/8] genhomedircon: fix FALLBACK_NAME regex
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 4/8] genhomedircon: make all write context funcs take user_entry struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 6/8] genhomedircon: make USERID, USERNAME context lists
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v2 5/8] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- genhomedircon USERID and USERNAME patches v2
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH v3 13/21] fs: Update posix_acl support to handle user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 06/21] fs: Treat foreign mounts as nosuid
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 08/21] userns: Replace in_userns with current_in_userns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 00/21] Support fuse mounts in user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 11/21] cred: Reject inodes with invalid ids in set_create_file_as()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 07/21] selinux: Add support for unprivileged mounts from user namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 10/21] fs: Check for invalid i_uid in may_follow_link()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 21/21] fuse: Allow user namespace mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 09/21] Smack: Handle labels consistently in untrusted mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 18/21] fuse: Add support for pid namespaces
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 16/21] fs: Allow superblock owner to access do_remount_sb()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 04/21] block_dev: Support checking inode permissions in lookup_bdev()
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 01/21] fs: fix a posible leak of allocated superblock
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] Fix extended permissions neverallow checking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] Fix extended permissions neverallow checking
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] Fix extended permissions neverallow checking
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 5/6] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] libsepol/cil: Remove path field from cil_tree_node struct
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 3/6] libsepol/cil: Add cil_tree_log() and supporting functions
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: Add high-level language line marking support
- From: Steve Lawrence <slawrence@xxxxxxxxxx>
- [PATCH] selinux: check ss_initialized before revalidating an inode label
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: delay inode label lookup as long as possible
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH] selinux: don't revalidate an inode's label when explicitly setting it
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [PATCH 3/6] libsepol/cil: Add cil_tree_log() and supporting functions
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/6] libsepol/cil: Store CIL filename in parse tree and AST
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/6] libsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 5/6] libsepol/cil: Remove path field from cil_tree_node struct
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 6/6] libsepol: When generating CIL use HLL line mark for neverallows
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 4/6] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/6] ibsepol/cil: Add high-level language line marking support
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] libsepol/cil: Fixes to neverallow and bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [RFC PATCH] selinux: always return a value from the netport/netnode/netif caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] security/selinux: Change bool variable name to index.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] security/selinux: Change bool variable name to index.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH] security/selinux: Change bool variable name to index.
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: always return a value from the netport/netnode/netif caches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: "Hefty, Sean" <sean.hefty@xxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: Failure in sel_netport_sid_slow()
- From: Greg <gkubok@xxxxxxxxx>
- Re: [RFC PATCH] selinux: always return a value from the netport/netnode/netif caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Failure in sel_netport_sid_slow()
- From: Greg <gkubok@xxxxxxxxx>
- Re: [RFC PATCH] selinux: always return a value from the netport/netnode/netif caches
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [RFC PATCH] selinux: always return a value from the netport/netnode/netif caches
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: Failure in sel_netport_sid_slow()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Failure in sel_netport_sid_slow()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 3/3] libsepol/cil: Cleanup neverallow checking and fail if bounds checking fails
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/3] libsepol/cil: Improve type bounds check reporting
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Fixed bug in cil_type_match_any()
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/3] libsepol/cil: Fixes to neverallow and bounds checking
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Failure in sel_netport_sid_slow()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Failure in sel_netport_sid_slow()
- From: Greg <gkubok@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: "Hefty, Sean" <sean.hefty@xxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Hal Rosenstock <hal@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Hal Rosenstock <hal@xxxxxxxxxxxxxxxxxx>
- [PATCH] fixfiles: make sure $LOGFILE starts with a slash
- From: Oskari Saarenmaa <os@xxxxxxxx>
- [PATCH] selinux-testsuite: Update README
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: "Hefty, Sean" <sean.hefty@xxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH] libselinux: Fix typo in sefcontext_compile.8
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2 v3] Check if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- [PATCH] libselinux: Fix typo in sefcontext_compile.8
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Hal Rosenstock <hal@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Hal Rosenstock <hal@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: genhomedircon USERID and USERNAME patches
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Android.mk: Add -D_GNU_SOURCE to common_cflags
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 04/13] selinux: Allocate and free infiniband security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] security: drop the unused hook skb_owned_by
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH net-next] security: drop the unused hook skb_owned_by
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: apply execstack check on thread stacks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: distinguish non-init user namespace capability checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net-next] security: drop the unused hook skb_owned_by
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/7] genhomedircon: make all write context funcs take user_entry struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/7] genhomedircon: write contexts for username and userid
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/7] genhomedircon: make USERID, USERNAME context lists
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/7] genhomedircon: factor out common replacement code
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/7] genhomedircon: Add uid and gid to struct user_entry
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] genhomedircon: rename FALLBACK #defines consistent with struct
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/7] genhomedircon: move fallback user to genhomedircon_user_entry_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- genhomedircon USERID and USERNAME patches
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 0/2 v3] Check if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2 v3] checkpolicy: Fail if module name different than output base filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v3] policycoreutils/hll/pp: Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 11/13] ib/core: Enforce Infiniband device SMI security
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: "leon@xxxxxxx" <leon@xxxxxxx>
- [PATCH net-next] security: drop the unused hook skb_owned_by
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC PATCH v2 10/13] ib/core: Enforce PKey security on management datagrams
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: "leon@xxxxxxx" <leon@xxxxxxx>
- Re: [RFC PATCH v2 12/13] ib/core: Track which QPs are using which port and PKey index
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [PATCH 0/2 v2] Warn if module name different than output filename
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v2 11/13] ib/core: Enforce Infiniband device SMI security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] checkpolicy: Warn if module name different than output filename
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] checkpolicy: Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] policycoreutils/hll/pp: Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: "leon@xxxxxxx" <leon@xxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] policycoreutils/hll/pp: Warn if module name different than output filename
- From: Thomas Hurd <toml.hurd@xxxxxxxxx>
- Re: [RFC PATCH v2 08/13] ib/core: IB cache enhancements to support Infiniband security
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [RFC PATCH v2 08/13] ib/core: IB cache enhancements to support Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] checkpolicy: Warn if module name different than output filename
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 2/2 v2] checkpolicy: Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] policycoreutils/hll/pp: Warn if module name different from filenames
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 0/2 v2] Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2 v2] policycoreutils/hll/pp: Warn if module name different than output filename
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC PATCH v2 08/13] ib/core: IB cache enhancements to support Infiniband security
- From: Leon Romanovsky <leon@xxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: apply execstack check on thread stacks
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC][PATCH] selinux-testsuite: Add test for execstack on thread stack
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [RFC][PATCH] selinux: apply execstack check on thread stacks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux: distinguish non-init user namespace capability checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [RFC][PATCH] selinux: distinguish non-init user namespace capability checks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC][PATCH] selinux: distinguish non-init user namespace capability checks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] selinux-testsuite: Add tests for non-init userns capability checks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [RFC][PATCH] selinux-testsuite: Add tests for non-init userns capability checks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [RFC][PATCH] selinux: distinguish non-init user namespace capability checks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] selinux: Add support for portcon dccp protocol
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v3] selinux: restrict kernel module loading
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] selinux: restrict kernel module loading
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Add support for portcon dccp protocol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: restrict kernel module loading
- From: Dennis Sherrell <sherrellconsulting@xxxxxxxxx>
- [PATCH] cil_mem.c: #define _GNU_SOURCE
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] cil_mem.c: #define _GNU_SOURCE
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH v3] selinux: restrict kernel module loading
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v3] selinux: restrict kernel module loading
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Kernel merge to v4.6-rc2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: restrict kernel module loading
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v2] selinux: restrict kernel module loading
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/7] security: Add LSM hooks for Infiniband security
- From: Or Gerlitz <gerlitz.or@xxxxxxxxx>
- Re: [RFC PATCH 0/7] SELinux support for Infiniband RDMA
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/7] security: Add LSM hooks for Infiniband security
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] SELinux support for Infiniband RDMA
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] SELinux support for Infiniband RDMA
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/7] security: Add LSM hooks for Infiniband security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]