SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 02/12] libsepol: use string literals as format strings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/12] checkpolicy: use correct unsigned format specifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: New chapter: Hardening SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Support static-only builds
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: avoid passing NULL pointer to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libselinux: use valid address to silence glibc 2.34 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/3] libsepol: do not pass NULL to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 1/1] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] Use IANA-managed domain example.com in examples
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 5.10 3/3] binder: use cred instead of task for getsecid
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5.10 2/3] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5.10 1/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5.4 3/3] binder: use cred instead of task for getsecid
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5.4 2/3] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5.4 1/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.19 2/2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.19 1/2] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.14 2/2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.14 1/2] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.9 2/2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.9 1/2] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.4 2/2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 4.4 1/2] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v3 0/1] fuse: Send file/inode security context during creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v3 1/1] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 5/5] libsepol: Write out genfscon file type when writing out CIL policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5 v2] secilc/docs: Document the optional file type for genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5 v2] libsepol/cil: Allow optional file type in genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v2] libsepol/cil: Refactor filecon file type handling
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v2] libsepol: Add support for file types in writing out policy.conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v2] Fix/add optional file type handling for genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] selinux: Add netlink xperm support
- From: Bram Bonne <brambonne@xxxxxxxxxx>
- [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: Bram Bonne <brambonne@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] testsuite sctp: Add tests for sctp_socket transition rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix/add optional file type handling for genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 10/36] libsepol: add checks for read sizes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 30/36] libsepol: validate ocontexts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 10/36] libsepol: add checks for read sizes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 10/36] libsepol: add checks for read sizes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC] Cascade: a high level SELinux policy language
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC] Cascade: a high level SELinux policy language
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Use IANA-managed domain example.com in examples
- From: markus.linnala@xxxxxxxxx
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] testsuite sctp: Add tests for sctp_socket transition rules
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix/add optional file type handling for genfscon rules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: avoid passing NULL pointer to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libselinux: use valid address to silence glibc 2.34 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/3] libsepol: do not pass NULL to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] Cascade: a high level SELinux policy language
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] testsuite sctp: Add tests for sctp_socket transition rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] testsuite sctp: Add tests for sctp_socket transition rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Add tests for sctp_socket transition rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: David Miller <davem@xxxxxxxxxxxxx>
- [RFC PATCH 1/1] testsuite sctp: Add tests for sctp_socket transition rules
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add tests for sctp_socket transition rules
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Cascade: a high level SELinux policy language
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 39/40] [CROSS-PATCH] libsepol: avoid passing NULL pointer to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 40/40] [CROSS-PATCH] libsepol: do not pass NULL to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 38/40] [WIP] checkpolicy: validate generated policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 37/40] [WIP] libsepol: export policydb_validate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 35/36] libsepol: validate fsuse types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 36/36] libsepol: validate class default targets
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 33/36] libsepol: validate policy properties
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 34/36] libsepol: validate categories
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 32/36] libsepol: validate permissive types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 31/36] libsepol: validate genfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 30/36] libsepol: validate ocontexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 29/36] libsepol: validate type of avtab type rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 27/36] libsepol: validate avtab and avrule types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 28/36] libsepol: validate constraint expression operators and attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 26/36] libsepol: resolve log message mismatch
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 24/36] libsepol: validate expanded user range and level
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 25/36] libsepol: validate permission count of classes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 18/36] libsepol: do not crash on class gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 23/36] libsepol: validate MLS levels
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 22/36] libsepol: split validation of datum array gaps and entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 21/36] libsepol: do not create a string list with initial size zero
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 20/36] libsepol: use correct size for initial string list
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 19/36] libsepol: do not crash on user gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 17/36] libsepol: do not underflow on short format arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 15/36] libsepol: zero member before potential dereference
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 16/36] libsepol: use size_t for indexes in strs helpers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 14/36] libsepol: reject invalid filetrans source type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 12/36] libsepol: clean memory on conditional insertion failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 13/36] libsepol: reject abnormal huge sid ids
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 11/36] libsepol: enforce avtab item limit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 09/36] libsepol: use reallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 10/36] libsepol: add checks for read sizes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 08/36] libsepol: use mallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 07/36] libsepol: use logging framework in ebitmap.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 06/36] libsepol: use logging framework in conditional.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 05/36] libsepol/fuzz: limit element sizes for fuzzing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 04/36] libsepol: add libfuzz based fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 03/36] libsepol/fuzz: silence secilc-fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 02/36] cifuzz: use the default runtime of 600 seconds
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 01/36] cifuzz: enable report-unreproducible-crashes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v4 5/8] libselinux: make is_context_customizable() thread-safe
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: avoid passing NULL pointer to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix/add optional file type handling for genfscon rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC] Cascade: a high level SELinux policy language
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCHv2 net 0/4] security: fixups for the security hooks in sctp
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.16
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCHv2 net 3/4] security: add sctp_assoc_established hook
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCHv2 net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCHv2 net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCHv2 net 0/4] security: fixups for the security hooks in sctp
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.16
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.16
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux patches for v5.16
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.16
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.16
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.16
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: avoid passing NULL pointer to memcpy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/4] libsepol: Write out genfscon file type when writing out CIL policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] secilc/docs: Document the optional file type for genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4] libsepol/cil: Allow optional file type in genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4] libsepol: Add support for file types in writing out policy.conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/4] Fix/add optional file type handling for genfscon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2] tests: make kernel iptables support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v3 0/7] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 7/8] selinux_restorecon: introduce selinux_restorecon_parallel(3)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 8/8] setfiles/restorecon: support parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 6/8] selinux_restorecon: add a global mutex to synchronize progress output
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 5/8] libselinux: make is_context_customizable() thread-safe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 4/8] libselinux: make selinux_log() thread-safe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 3/8] selinux_restorecon: protect file_spec list with a mutex
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 2/8] selinux_restorecon: simplify fl_head allocation by using calloc()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 1/8] label_file: fix a data race
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 0/8] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] fuse: Send file/inode security context during creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH testsuite v2] tests: make kernel iptables support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/inet_socket: make kernel iptables support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/inet_socket: make kernel iptables support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 3/4] security: add sctp_assoc_established hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] sctp: initialize endpoint LSM labels also on the client side
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net 3/4] security: add sctp_assoc_established hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH net 3/4] security: add sctp_assoc_established hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net 0/4] security: fixups for the security hooks in sctp
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- ANN: SELinux userspace 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net 3/4] security: add sctp_assoc_established hook
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net 0/4] security: fixups for the security hooks in sctp
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] sctp: initialize endpoint LSM labels also on the client side
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] sctp: initialize endpoint LSM labels also on the client side
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] sctp: initialize endpoint LSM labels also on the client side
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] sctp: initialize endpoint LSM labels also on the client side
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: add client peeloff tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: avoid passing NULL pointer to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: use valid address to silence glibc 2.34 warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Release 3.3 or not?
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Release 3.3 or not?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: fix a sock regression in selinux_ip_postroute_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a sock regression in selinux_ip_postroute_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: fix a sock regression in selinux_ip_postroute_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- kernel NULL pointer dereference on selinux_ip_postroute
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] selinux: fix a sock regression in selinux_ip_postroute_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [next] BUG: kernel NULL pointer dereference, address:: selinux_ip_postroute_compat
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v3 0/7] Parallel setfiles/restorecon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] libsemanage: do not sort empty records
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] libsemanage/tests: free memory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] libsepol: do not pass NULL to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH userspace v3 4/7] libselinux: make selinux_log() thread-safe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 7/7] setfiles/restorecon: support parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 6/7] selinux_restorecon: introduce selinux_restorecon_parallel(3)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 5/7] selinux_restorecon: add a global mutex to synchronize progress output
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 3/7] selinux_restorecon: protect file_spec list with a mutex
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 2/7] selinux_restorecon: simplify fl_head allocation by using calloc()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 0/7] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 1/7] label_file: fix a data race
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [next] BUG: kernel NULL pointer dereference, address:: selinux_ip_postroute_compat
- From: Florian Westphal <fw@xxxxxxxxx>
- [next] BUG: kernel NULL pointer dereference, address:: selinux_ip_postroute_compat
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: do not pass NULL to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: use dummy variable to silence glibc 2.34 warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 0/6] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 15/35] libsepol: reject invalid default targets
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 14/35] libsepol: reject invalid fsuse types
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 25/35] libsepol: validate avtab types
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH userspace v2 0/6] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/3] libsemanage/tests: free memory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsemanage: do not sort empty records
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libsepol: do not pass NULL to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: use dummy variable to silence glibc 2.34 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace v2 0/6] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2 0/6] Parallel setfiles/restorecon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: use dummy variable to silence glibc 2.34 warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 0/3] binder: use cred instead of task for security context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v5 0/3] binder: use cred instead of task for security context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace v2 0/6] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 5/6] selinux_restorecon: introduce selinux_restorecon_parallel(3)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 6/6] setfiles/restorecon: support parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 4/6] selinux_restorecon: add a global mutex to synchronize progress output
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 3/6] libselinux: make selinux_log() thread-safe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/6] selinux_restorecon: protect file_spec list with a mutex
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/6] selinux_restorecon: simplify fl_head allocation by using calloc()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 29/35] libsepol: validate genfs contexts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 28/35] libsepol: validate ocontexts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix all of the W=1 build warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix all of the W=1 build warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 27/35] libsepol: validate type of avtab type rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 22/35] libsepol: validate permission count of classes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 33/35] libsepol: validate categories
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 17/35] libsepol: validate types
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 13/35] libsepol: validate MLS levels
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 12/35] libsepol: clean memory on conditional read failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsemanage/tests: free memory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libsemanage: do not sort empty records
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: do not pass NULL to memcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] fuse: Add a flag FUSE_SECURITY_CTX
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs,LSM: introduce the FS_HANDLES_LSM_OPTS flag
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] fuse: Add a flag FUSE_SECURITY_CTX
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security/landlock: use square brackets around "landlock-ruleset"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] fuse: Add a flag FUSE_SECURITY_CTX
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2 0/2] fuse: Send file/inode security context during creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/4] libsepol/cil: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 0/3] binder: use cred instead of task for security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 3/3] binder: use cred instead of task for getsecid
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v5 2/3] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v5 1/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v5 0/3] binder: use cred instead of task for security context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH selinux v3] selinux: remove unneeded ipv6 hook wrappers
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] selinux: consilidate comments from inode_doinit_with_dentry wrt !dentry
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 35/35] libsepol: do not create a string list with initial size zero
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 34/35] libsepol: use correct size for initial string list
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 33/35] libsepol: validate categories
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 32/35] libsepol: do not underflow on short format arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 31/35] libsepol: validate policy properties
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 30/35] libsepol: validate permissive types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 29/35] libsepol: validate genfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 28/35] libsepol: validate ocontexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 27/35] libsepol: validate type of avtab type rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 26/35] libsepol: validate constraint expression operators and attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 25/35] libsepol: validate avtab types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 23/35] libsepol: resolve log message mismatch
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 24/35] libsepol: zero member before potential dereference
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 21/35] libsepol: do not crash on user gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 20/35] libsepol: do not crash on class gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 22/35] libsepol: validate permission count of classes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 19/35] libsepol: reject abnormal huge sid ids
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 17/35] libsepol: validate types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 18/35] libsepol: use size_t for indexes in strs helpers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 16/35] libsepol: validate expanded user range and level
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 15/35] libsepol: reject invalid default targets
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 14/35] libsepol: reject invalid fsuse types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 13/35] libsepol: validate MLS levels
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 12/35] libsepol: clean memory on conditional read failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 11/35] libsepol: enforce avtab item limit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 10/35] libsepol: add checks for read sizes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 09/35] libsepol: use reallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 08/35] libsepol: use mallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 06/35] libsepol: use logging framework in conditional.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 07/35] libsepol: use logging framework in ebitmap.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 05/35] libsepol/fuzz: limit element sizes for fuzzing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 04/35] libsepol: add libfuzz based fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH selinux v3] selinux: remove unneeded ipv6 hook wrappers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 03/35] libsepol/fuzz: silence secilc-fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 02/35] cifuzz: use the default runtime of 600 seconds
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 01/35] cifuzz: enable report-unreproducible-crashes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: consilidate comments from inode_doinit_with_dentry wrt !dentry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH security-next] selinux: remove ipv6 hook wrappers
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH security-next] selinux: remove ipv6 hook wrappers
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] libsepol/cil: Fix potential undefined shifts
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 4/4] libselinux: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] checkpolicy: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4] libsepol/cil: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4] libsepol: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix potential undefined shifts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Fix potential undefined shifts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v4 2/3] binder: use cred instead of task for getsecid
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v4 1/3] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v4 0/3] binder: use cred instead of task for security context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v3 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v3 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] binder: use cred instead of task for getsecid
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v3 3/3] binder: use euid from cred instead of using task
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v3 1/3] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH v3 0/3] binder: use cred instead of task for security context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- ANN: SELinux userspace 3.3-rc3 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux/semodule: Improve extracting message
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not skip macros when resolving until later passes
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Limit the amount of reporting for bounds failures
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Limit the amount of reporting for bounds failures
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Limit the amount of reporting for bounds failures
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Do not skip macros when resolving until later passes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] libselinux/semodule: Improve extracting message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH userspace] GitHub Actions: do not use macOS latest runner for now
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace] README: update continuous integration badges
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/9] libsepol: ebitmap: mark nodes of const ebitmaps const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct some typos
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux/semodule: Improve extracting message
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] binder: use cred instead of task for selinux checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] binder: use cred instead of task for selinux checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] binder: use cred instead of task for selinux checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] Remove the lockdown test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] binder: use cred instead of task for selinux checks
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] libsepol: ebitmap: mark nodes of const ebitmaps const
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] security: Return xattr name from security_dentry_init_security()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: remove the SELinux lockdown implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] Remove the lockdown test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: remove the SELinux lockdown implementation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/cil: Do not skip macros when resolving until later passes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the SELinux lockdown implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove the SELinux lockdown implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Correct some typos
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] selinux: enable genfscon labeling for securityfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Limit the amount of reporting for bounds failures
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 9/9] checkpolicy: delay down-cast to avoid align warning
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/9] checkpolicy: print reason of fopen failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 8/9] checkpolicy: drop incorrect cast
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/9] libsepol: ebitmap: mark nodes of const ebitmaps const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 7/9] checkpolicy: update documentation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/9] libsepol/cil: silence clang void-pointer-to-enum-cast warning
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/9] libsepol: resolve GCC warning about null-dereference
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/9] checkpolicy: policy_define: cleanup declarations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/9] libsepol: use correct cast
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Correct some typos
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: enable genfscon labeling for securityfs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH userspace] GitHub Actions: do not use macOS latest runner for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] README: update continuous integration badges
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] GitHub Actions: do not use macOS latest runner for now
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace] GitHub Actions: do not use macOS latest runner for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace] README: update continuous integration badges
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: ANN: SELinux userspace 3.3-rc2 release candidate
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH testsuite] tests/perf_event: don't assume CPU#0 is online
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace] GitHub Actions: do not use macOS latest runner for now
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH setools] __init__.py: Make NetworkX dep optional
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: "Colin Walters" <walters@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] fuse: Send security context of inode on file creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 0/2] fuse: Send file/inode security context during creation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v29 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 25/28] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 23/28] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 02/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 01/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [GIT PULL] SELinux/Smack fixes for v5.15 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux/Smack fixes for v5.15 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: fix subjective/objective credential use mixups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: fix subjective/objective credential use mixups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: fix subjective/objective credential use mixups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux,smack: fix subjective/objective credential use mixups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/perf_event: don't assume CPU#0 is online
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.3-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: drop requirement to combine compiling and linking
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Handle operations in a class mapping when verifying
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not use original type and typeattribute datums
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 0/8] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH setools] __init__.py: Make NetworkX dep optional
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.15 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] checkpolicy improvements
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Handle operations in a class mapping when verifying
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [selinuxproject-selinux:stable-5.15 1/1] include/linux/rcupdate.h:395:2: warning: passing argument 1 of 'security_locked_down' discards 'const' qualifier from pointer target type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/8] audit: add filtering for io_uring records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: enable genfscon labeling for securityfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH v4 8/8] Smack: Brutalist io_uring support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 7/8] selinux: add support for the io_uring access controls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 6/8] lsm,io_uring: add LSM hooks to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 5/8] io_uring: convert io_uring to the secure anon inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 3/8] audit: add filtering for io_uring records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 1/8] audit: prepare audit_context for use in calling contexts beyond syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 0/8] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: enable genfscon labeling for securityfs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] checkpolicy improvements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Signals upon avc denial
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 02/13] libsepol: free memory after policy validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 11/13] checkpolicy: error out on parsing too big integers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 09/13] checkpolicy: resolve dismod memory leaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 02/13] libsepol: free memory after policy validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC] Signals upon avc denial
- From: Josh Gao <jmgao@xxxxxx>
- Re: [PATCH 11/13] checkpolicy: error out on parsing too big integers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 09/13] checkpolicy: resolve dismod memory leaks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Bruce Fields <bfields@xxxxxxxxxx>
- Re: [RFC] Signals upon avc denial
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Bruce Fields <bfields@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] libselinux/utils: drop requirement to combine compiling and linking
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 13/13] checkpolicy: free extended permission memory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 12/13] checkpolicy: print warning on source line overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/13] checkpolicy: error out on parsing too big integers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 10/13] checkpolicy: avoid implicit conversion
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/13] checkpolicy: resolve dismod memory leaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/13] checkpolicy: add missing function declarations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/13] checkpolicy: mark file local functions in policy_define static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/13] checkpolicy: mark read-only parameters in module compiler const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/13] checkpolicy: misc checkpolicy tweaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/13] checkpolicy: misc checkmodule tweaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/13] checkpolicy: enclose macro argument in parentheses
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/13] libsepol: free memory after policy validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/13] libsepol: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 00/13] checkpolicy improvements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH v3 8/8] Smack: Brutalist io_uring support with debug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 7/8] selinux: add support for the io_uring access controls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 6/8] lsm,io_uring: add LSM hooks to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 5/8] io_uring: convert io_uring to the secure anon inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 3/8] audit: add filtering for io_uring records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 1/8] audit: prepare audit_context for use in calling contexts beyond syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 0/8] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC] Signals upon avc denial
- From: Josh Gao <jmgao@xxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Do not use original type and typeattribute datums
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Free duplicate datums in original calling function
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix typo
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Antony Antony <antony.antony@xxxxxxxxxxx>
- [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH testsuite v2] tests: exclude vsock_socket test where it wouldn't build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/2] tests/module_load: simplify the clean target
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix typo
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: fix typo
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Free duplicate datums in original calling function
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Another libsepol USE_AFTER_FREE defects detected
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] libsepol/cil: Free duplicate datums in original calling function
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Another libsepol USE_AFTER_FREE defects detected
- From: James Carter <jwcart2@xxxxxxxxx>
- Another libsepol USE_AFTER_FREE defects detected
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: Reference Policy 2.20210908
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH testsuite v2] tests: exclude vsock_socket test where it wouldn't build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- ANN: SELinux userspace 3.3-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 2/2] libsepol/cil: Limit the number of active line marks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Limit the number of active line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Add function to get number of items in a stack
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite] tests: exclude vsock_socket test where it wouldn't build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: Fix detected RESOURCE_LEAKs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3 v2] libsepol/cil: Remove redundant syntax checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Improve in-statement to allow use after inheritance
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Fix detected RESOURCE_LEAKs
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- PATH_MAX + 1 in realpath_not_final()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: lets think about 3.3 - 3.3-rc1 release release notes draft
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3 v2] libsepol/cil: Remove redundant syntax checking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- [PATCH testsuite 2/2] tests/module_load: use the right compiler to build kernel modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] tests/module_load: simplify the clean target
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Virtio-fs] [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Sergio Lopez <slp@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]