SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v2 3/8] block: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] [RFC PATCH] sched: only perform capability check on privileged operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] Update missing sandbox translations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: include necessary headers in headers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: avoid extra semicolon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix indentation level of mls_ops block
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: update parameter documentation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: use unsigned char for boolean values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: resolve checkpatch errors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Update missing sandbox translations
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH for-3.5 3/5] setfiles: remove useless "iamrestorecon" checks in option parsing
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH for-3.5 5/5] setfiles: introduce the -C option for distinguishing file tree walk errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 2/5] setfiles: remove useless assignment and comment (after RHBZ#1926386)
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 3/5] setfiles: remove useless "iamrestorecon" checks in option parsing
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 1/5] setfiles: fix up inconsistent indentation
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 03/29] LSM: Add the lsmblob data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] checkpolicy: mention class name on invalid permission
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/2] FIOQSIZE followup fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: John Stultz <jstultz@xxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- SELinux userspace 3.4-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH testsuite 0/2] FIOQSIZE followup fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/2] tests/ioctl: adjust size of variable passed to ioctl(2)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] policy/test_ioctl_xperms.te: add ioctl numbers for other arches
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/ioctl: Update ioctl tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 0/2] Make SCTP and Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v4] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v35 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 7/7] SELINUXNS: Fixing concurrency issues
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 6/7] SELINUXNS: Fixing superblock security structure memory leakage
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 5/7] SELINUXNS: Migrate all open files and all vma to new namespace
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 4/7] SELINUXNS: Namespacing for xattrs
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 2/7] selinux: support per-namespace superblock security structures
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 3/7] SELINUXNS: Fix initilization of the superblock security under spinlock
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 1/7] LSM: Infrastructure management of the superblock
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 0/7] SELinux-namespace
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- Re: [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- [PATCH 2/5] libsepol/test: Include paired headers for prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] libsepol/test: Declare file local functions as static
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5] libsemanage/tests: Remove unused functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5] libsemanage/tests: Declare file local functions as static
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite 2/2] tests: check more thoroughly for SCTP support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] tests/extended_socket_class: make Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/2] Make SCTP and Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: free memory on selabel_open(3) failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: correctly hash specfiles larger than 4G
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH testsuite v4] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [HEADS UP MISSING PATCH] Update python library and binding versions to 3.4-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 6/6] Enable missing prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/5] libselinux: limit has buffer size
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libselinux: limit has buffer size
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] libsepol: drop unnecessary const discarding casts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] libsepol: check correct pointer for oom
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] libsemanage: avoid double fclose
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Correct misc typos
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: James Carter <jwcart2@xxxxxxxxx>
- ANN: SELinux userspace 3.4-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V3 Notebook] How to add a new policy capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH v2 3/6] libsepol/cil: post process pirqcon rules
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/6] libsepol/cil: drop unused function cil_tree_error
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol/cil: declare file local functions static
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Split po/ translation files into the relevant sub-directories
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: add missing oom checks
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/6] libsepol/cil: declare file local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/6] libsepol/cil: drop unused function cil_tree_error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/6] libsepol/cil: post process pirqcon rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH v2 5/6] libsemanage: ignore missing prototypes in swig generated code
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 6/6] Enable missing prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH] github: add some basic GH Actions to build the notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] github: add some basic GH Actions to build the notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] checkreqprot is being deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] optional statement is not valid in if and require statement
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] SELINUX=disabled is being deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] Reference Policy: Module versioning now optional
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Split po/ translation files into the relevant sub-directories
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: Remove redundant assignments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Improve description of -d switch
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2 Notebook] How to add a new policy capability
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] Enable missing prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/4] libsepol/cil: post process pirqcon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] libsepol/cil: drop unused function cil_tree_error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/4] libsepol/cil: declare file local functions static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolgen: Update permission map
- From: Karl MacMillan <karl@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: add missing oom checks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] sepolgen: Update permission map
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] semodule_package: Close leaking fd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: Improve description of -d switch
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Split po/ translation files into the relevant sub-directories
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Translate or not?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 4/5] selinux: Remove redundant assignments
- From: Michal Orzel <michalorzel.eng@xxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] libsepol/cil: declare file local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 4/4] Enable missing prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] libsepol/cil: drop unused function cil_tree_error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] libsepol/cil: post process pirqcon rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: check for valid contexts to improve error causes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: mark immutable common helper parameter const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: add missing oom checks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Validate conditional expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Write a message when a log message is truncated
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] secilc: kernel policy language is infix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] secilc: kernel policy language is infix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Lets start with 3.4 userspace release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 1/8] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 1/8] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 01/12] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 01/16] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 05/16] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 01/29] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 01/21] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 22/43] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 07/21] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 06/21] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 13/29] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 11/29] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 14/35] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 01/35] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 17/35] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 15/43] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 01/43] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Add a file describing the security vulnerability handling process
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Close leaked FILEs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Fallback to semanage_copy_dir when rename() failed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsemanage: Fallback to semanage_copy_dir when rename() failed
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.18
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux patches for v5.18
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] optional statement is not valid in if and require statement
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] optional statement is not valid in if and require statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] optional statement is not valid in if and require statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Pwnkit and SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Pwnkit and SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol: Validate conditional expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] gui: do not recreate /etc/selinux/config
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Close leaked FILEs
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2 RFC] libsepol: Adding support for not-self rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Don't add constraint if there are no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Shorten the policy capability enum names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do a more thorough validation of constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: fix reallocarray imports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] gui: do not recreate /etc/selinux/config
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH] libselinux: Close leaked FILEs
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Shorten the policy capability enum names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Write a message when a log message is truncated
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Recently fixed neverallowx checks report (range 0x)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: validate boolean datum arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/5] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- libsemanage rename calls fail on containers
- From: Joseph Marrero Corchado <jmarrero@xxxxxxxxxx>
- Recently fixed neverallowx checks report (range 0x)
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Shorten the policy capability enum names
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix reallocarray imports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: validate expressions by evaluating
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Do a more thorough validation of constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] newrole: add Makefile target to test build options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: NULL pointer offset fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: allow spaces in user/group names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- [PATCH] libsepol: fix reallocarray imports
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: shorten the policy capability enum names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/4] newrole: add Makefile target to test build options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: shorten the policy capability enum names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: NULL pointer offset fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: allow spaces in user/group names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 3/4] libsepol: export functions for policy analysis
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] docs: fix 'make htmldocs' warning in SCTP.rst
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Populate and use policy name
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.17 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/ioctl: Update ioctl tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.17 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix misuse of mutex_is_locked()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] libsepol: add policy utilities
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/4] libsepol: export functions for policy analysis
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/4] libsepol: introduce sepol_const_security_context_t typedef
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] newrole: ensure password memory erasure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] newrole: check for crypt(3) failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] newrole: silence compiler warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] newrole: add Makefile target to test build options
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: NULL pointer offset fix
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/bpf: use new API if version >= 0.6
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] selinux: fix misuse of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Populate and use policy name
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite] tests/bpf: use new API if version >= 0.6
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] selinux: use correct type for context length
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selinux: drop return statement at end of void functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] capability: use new capable_or functionality
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] capability: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] selinux: drop return statement at end of void functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] selinux: use correct type for context length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] security: declare member holding string literal const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/fixfiles: Use parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsemanage: allow spaces in user/group names
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] SELinux-namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils/fixfiles: Use parallel relabeling
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] SELinux-namespaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 0/1] SELinux-namespaces
- From: Igor Baranov <igor.baranov@xxxxxxxxxx>
- [RFC PATCH 1/1] selinuxns: Replace state pointer with namespace id
- From: Igor Baranov <igor.baranov@xxxxxxxxxx>
- [PATCH v2] libsepol: Populate and use policy name
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite v3] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 1/2] security: add sctp_assoc_established hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Don't add constraint if there are no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol: Don't write out constraint if it has no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsepol: validate several flags
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libsepol: more strict constraint validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Adjust kernel uapi headers check for building
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/binder: Adjust kernel uapi headers check for building
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- RE: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] policycoreutils: handle argument counter of zero
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: do not add gaps to string list
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]