SELinux - Date Index
[Prev Page][Next Page]
- Re: lets think about 3.3 - 3.3-rc1 release release notes draft
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3 v2] libsepol/cil: Remove redundant syntax checking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- [PATCH testsuite 2/2] tests/module_load: use the right compiler to build kernel modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] tests/module_load: simplify the clean target
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Virtio-fs] [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Sergio Lopez <slp@xxxxxxxxxx>
- Re: lets think about 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Bruce Fields <bfields@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Bruce Fields <bfields@xxxxxxxxxx>
- Re: lets think about 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: lets think about 3.3 release
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: lets think about 3.3 release
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: lets think about 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Zorro Lang <zlang@xxxxxxxxxx>
- Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Properly check parse tree when printing error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Import specific modules from setools for less deps
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/1] xfstest: Add a new test to test xattr operations
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/1] man-pages: xattr.7: Update text for user extended xattr behavior change
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v3 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v3 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: libselinux issue
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/3 v2] libsepol/cil: Fix syntax checking in __cil_verify_syntax()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3 v2] libsepol/cil: Use size_t for len in __cil_verify_syntax()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3 v2] libsepol/cil: Remove redundant syntax checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Properly check parse tree when printing error messages
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol/cil: Fix syntax checking in __cil_verify_syntax()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] python: Import specific modules from setools for less deps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.15
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: libselinux issue
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libselinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- libselinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 3/3] libsepol/cil: Simplify cil_tree_children_destroy()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol/cil: Refactor the function __cil_build_ast_node_helper()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.15
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: syzbot <syzbot+d1e3b1d92d25abf97943@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: syzbot <syzbot+d1e3b1d92d25abf97943@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol/cil: Properly check for parameter when inserting name
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol/cil: Reset expandtypeattribute rules when resetting AST
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Properly check parse tree when printing error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Properly check parse tree when printing error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Cil block inheritance
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Cil block inheritance
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Cil block inheritance
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Cil block inheritance
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Cil block inheritance
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Cil block inheritance
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Cil block inheritance
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: There is an interesting conversation going on about virtiofsd and SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] python: Import specific modules from setools for less deps
- From: Michał Górny <mgorny@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: security/selinux/hooks.c: FILE__ perms used as DIR__ perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: security/selinux/hooks.c: FILE__ perms used as DIR__ perms
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove duplicated initialization of 'i' for clean-up
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove duplicated initialization of 'i' for clean-up
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: security/selinux/hooks.c: FILE__ perms used as DIR__ perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: remove duplicated initialization of 'i' for clean-up
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- security/selinux/hooks.c: FILE__ perms used as DIR__ perms
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] selinux: remove duplicated initialization of 'i' for clean-up
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- [PATCH] libsepol/cil: Properly check parse tree when printing error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Improve error message for label file validation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Improve error message for label file validation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Remove redundant syntax checking
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Fix syntax checking in __cil_verify_syntax()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests/capable_sys: skip test_rawio on BTRFS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Improve in-statement to allow use after inheritance
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Allow some duplicate macro and block declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Improve in-statement to allow use after inheritance
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 8/8 v2] libsepol/cil: When writing AST use line marks for src_info nodes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: lets think about 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: move the fuzz target and build script to the selinux repository
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 7/7 v2] libsepol/cil: Report correct high-level language line numbers
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/7 v2] libsepol/cil: Add line mark kind and line number to src info
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/7 v2] libsepol/cil: Create common string-to-unsigned-integer functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/7 v4] libsepol/cil: Push line mark state first when processing a line mark
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/7 v2] libsepol/cil: Check the token type after getting the next token
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/7 v2] libsepol/cil: Check for valid line mark type immediately
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/7 v2] libsepol/cil: Check syntax of src_info statement
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Improve error message for label file validation
- From: Kelvin Zhang <zhangkelvin@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] libselinux: replace strerror by %m
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 6/8] libsepol/cil: Add line mark kind and line number to src info
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 7/8] libsepol/cil: Report correct high-level language line numbers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 6/8] libsepol/cil: Add line mark kind and line number to src info
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 7/8] libsepol/cil: Report correct high-level language line numbers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol/cil: move the fuzz target and build script to the selinux repository
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: lets think about 3.3 release
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/utils: drop requirement to combine compiling and linking
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Improve in-statement to allow use after inheritance
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol/secilc/docs: Update the CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Improve in-statement to allow use after inheritance
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] cil_container_statements.md: clarify in-statement limitations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] cil_container_statements.md: clarify in-statement limitations
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] libsepol/cil: Allow some duplicate macro and block declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH v2 3/9] audit: dev/test patch to force io_uring auditing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 8/9] selinux: add support for the io_uring access controls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 7/9] lsm,io_uring: add LSM hooks to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 6/9] io_uring: convert io_uring to the secure anon inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/9] audit: add filtering for io_uring records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/9] audit: prepare audit_context for use in calling contexts beyond syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] libsepol: replace strerror by %m
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/2] libselinux: replace strerror by %m
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 8/8] libsepol/cil: When writing AST use line marks for src_info nodes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/8] libsepol/cil: Add line mark kind and line number to src info
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 7/8] libsepol/cil: Report correct high-level language line numbers
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/8] libsepol/cil: Create common string-to-unsigned-integer functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/8] libsepol/cil: Check for valid line mark type immediately
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/8] libsepol/cil: Push line mark state first when processing a line mark
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/8] libsepol/cil: Check the token type after getting the next token
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/8] libsepol/cil: Check syntax of src_info statement
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/8] libsepol/cil: Line mark cleanup and fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] mcstrans: Improve mlstrans-test output
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace] libsepol/cil: remove obsolete comment
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: lets think about 3.3 release
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: lets think about 3.3 release
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/2] libselinux: replace strerror by %m
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 1/2] libselinux: replace strerror by %m
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] libsepol: replace strerror by %m
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] mcstrans: Improve mlstrans-test output
- From: James Carter <jwcart2@xxxxxxxxx>
- lets think about 3.3 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] mcstrans: Improve mlstrans-test output
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.14 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.14 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH SYSTEMD 0/7] Re-add SELinux checks for unit install operations
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH SYSTEMD 4/7] core: add support for MAC checks on unit install operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 7/7] core: tweak job_type_to_access_method SELinux permissions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 5/7] core: implement the sd-bus generic callback for SELinux
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 6/7] core: avoid bypasses in D-BUS SELinux filter
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 3/7] selinux: mark _mac_selinux_generic_access_check with leading underscore
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 2/7] selinux: improve debug log format
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 1/7] selinux: add function name to audit data
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH SYSTEMD 0/7] Re-add SELinux checks for unit install operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] libsepol/cil: remove obsolete comment
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH userspace] libsepol/cil: remove obsolete comment
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [External] Re: LSM policy options for new GPIO kernel driver interface
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: libsepol regressions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite] tests/capable_sys: skip test_rawio on BTRFS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [External] Re: LSM policy options for new GPIO kernel driver interface
- From: "Weber, Matthew L Collins" <Matthew.Weber@xxxxxxxxxxx>
- Re: LSM policy options for new GPIO kernel driver interface
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix COPY_PASTE_ERROR (CWE-398)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] dbus: Use GLib.MainLoop()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Do not use Python slip
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_write_langext()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol regressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- LSM policy options for new GPIO kernel driver interface
- From: "Weber, Matthew L Collins" <Matthew.Weber@xxxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: libsepol regressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH -next, v2] selinux: correct the return value when loads initial sids
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- libsepol regressions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH -next] selinux: correct the return value when loads initial sids
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix COPY_PASTE_ERROR (CWE-398)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] dbus: Use GLib.MainLoop()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Do not use Python slip
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python/sepolicy: Fix COPY_PASTE_ERROR (CWE-398)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net-next v4 00/15] Add Management Component Transport Protocol support
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH -next, v2] selinux: correct the return value when loads initial sids
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH net-next v4 00/15] Add Management Component Transport Protocol support
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- [PATCH net-next v4 01/15] mctp: Add MCTP base
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_write_langext()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] dbus: Use GLib.MainLoop()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Do not use Python slip
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH -next] selinux: correct the return value when loads initial sids
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix race condition when computing ocontext SIDs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_write_langext()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH -next] selinux: correct the return value when loads initial sids
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: libsepol CVE patch issue
- From: Garrett Tucker <gtucker@xxxxxxxxxx>
- Re: libsepol CVE patch issue
- From: James Carter <jwcart2@xxxxxxxxx>
- libsepol CVE patch issue
- From: Garrett Tucker <gtucker@xxxxxxxxxx>
- RE: [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: AVC denied for docker while trying to set labels for tmpfs mounts
- From: Sujithra P <sujithrap@xxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v28 21/25] audit: support non-syscall auxiliary records
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] scripts/run-scan-build: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: AVC denied for docker while trying to set labels for tmpfs mounts
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH v28 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 23/25] Audit: Add record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 21/25] audit: support non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 16/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 14/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 09/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 08/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 07/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 06/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 03/25] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 02/25] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: AVC denied for docker while trying to set labels for tmpfs mounts
- From: Sujithra P <sujithrap@xxxxxxxxx>
- Re: AVC denied for docker while trying to set labels for tmpfs mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- AVC denied for docker while trying to set labels for tmpfs mounts
- From: Sujithra P <sujithrap@xxxxxxxxx>
- Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH RFC 6/9] veth: use skb_prepare_for_gro()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 5/9] skbuff: introduce has_sk state bit.
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 9/9] sk_buff: access secmark via getter/setter
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 8/9] sk_buff: move vlan field after tail.
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 7/9] sk_buff: move inner header fields after tail
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 4/9] net: optimize GRO for the common case.
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 2/9] sk_buff: track dst status in skb->_state
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 3/9] sk_buff: move the active_extensions into the state bitfield
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 1/9] sk_buff: track nfct status in newly added skb->_state
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: issues about selinux namespace
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: issues about selinux namespace
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] scripts/run-scan-build: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: issues about selinux namespace
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH v2] libsepol/cil: move the fuzz target and build script to the selinux repository
- From: Evgeny Vereshchagin <evvers@xxxxx>
- Re: [PATCH v2] libselinux: add lock callbacks
- From: Seth Moore <sethmo@xxxxxxxxxx>
- Re: [PATCH v2] lsm_audit,selinux: return early for possible NULL audit buffers
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [PATCH v2] lsm_audit,selinux: return early for possible NULL audit buffers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: add lock callbacks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/6] policycoreutils: free memory of allocated context in newrole
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/6] policycoreutils: free memory on lstat failure in sestatus
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/6] policycoreutils: free memory of allocated context in run_init
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/6] secilc: fix memory leaks in secilc2conf
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/6] secilc: fix memory leaks in secilc
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/6] scripts/run-scan-build: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: drop requirement to combine compiling and linking
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] lsm_audit,selinux: return early for possible NULL audit buffers
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [PATCH v2] libselinux: add lock callbacks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 2/3] libsepol: avoid implicit conversions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: do not allow \0 in quoted strings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol/cil: Fix handling category sets in an expression
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] libsepol: avoid unsigned integer overflow
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 3/3] libsepol: assure string NUL-termination of ibdev_name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/3] libsepol: ignore UBSAN false-positives
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 06/13] checkpolicy: follow declaration-after-statement
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] ci: turn on CIFuzz
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: move the fuzz target and build script to the selinux repository
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm_audit,selinux: add exception handling for possible NULL audit buffers
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [PATCH] lsm_audit,selinux: add exception handling for possible NULL audit buffers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: describe nosuid and NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: move the fuzz target and build script to the selinux repository
- From: Evgeny Vereshchagin <evvers@xxxxx>
- [PATCH] lsm_audit,selinux: add exception handling for possible NULL audit buffers
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- [PATCH v2] libselinux: add lock callbacks
- From: Seth Moore <sethmo@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Fix handling category sets in an expression
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] libselinux: add lock callbacks
- From: Seth Moore <sethmo@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: do not allow \0 in quoted strings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2] libsepol/cil: Fix handling category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix handling category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Greg Kurz <groug@xxxxxxxx>
- [PATCH] libsepol/cil: do not allow \0 in quoted strings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 2/3] libsepol: avoid implicit conversions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 3/3] libsepol: assure string NUL-termination of ibdev_name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/3] libsepol: ignore UBSAN false-positives
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] libsepol: avoid unsigned integer overflow
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] ci: turn on CIFuzz
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: add lock callbacks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 06/13] checkpolicy: follow declaration-after-statement
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Fix handling category sets in an expression
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] ci: turn on CIFuzz
- From: Evgeny Vereshchagin <evvers@xxxxx>
- [PATCH 2/2] README: add OSS-Fuzz/CIFuzz badges
- From: Evgeny Vereshchagin <evvers@xxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Bruce Fields <bfields@xxxxxxxxxx>
- [PATCH] libselinux: add lock callbacks
- From: Seth Moore <sethmo@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Only expand anonymous category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix handling category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] libsepol/cil: Only expand anonymous category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Improve checking for bad inheritance patterns
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] libsepol: silence -Wextra-semi-stmt warning
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: do not override previous results of __cil_verify_classperms
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Improve checking for bad inheritance patterns
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] checkpolicy: mark read-only parameters in policy define const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 12/13] checkpolicy/test: mark file local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/13] checkpolicy: parse_util drop unused declaration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 10/13] checkpolicy: drop redundant cast to the same type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/13] checkpolicy: avoid potential use of uninitialized variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/13] checkpolicy: remove dead assignments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/13] checkpolicy: check before potential NULL dereference
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/13] checkpolicy: follow declaration-after-statement
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/13] checkpolicy: use correct format specifier for unsigned
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/13] checkpolicy: drop dead condition
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/13] checkpolicy: drop -pipe compile option
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/13] checkpolicy: simplify assignment
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/13] checkpolicy: pass CFLAGS at link stage
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] libsepol: avoid unsigned integer overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: avoid unsigned integer overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] libsepol: silence -Wextra-semi-stmt warning
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: do not override previous results of __cil_verify_classperms
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.4 17/31] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 077/137] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 19/35] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 26/45] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 30/55] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 40/74] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.12 086/160] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 101/189] selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5/6] policycoreutils: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/6] mcstrans: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/6] checkpolicy: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/6] libsemanage: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] libselinux: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] libsepol: silence -Wextra-semi-stmt warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/4 v2] libsepol/cil: Provide option to allow qualified names in declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/utils/getseuser.c: fix build with gcc 4.8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [syzbot] general protection fault in legacy_parse_param
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Improve checking for bad inheritance patterns
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: avoid unsigned integer overflow
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/cil: do not override previous results of __cil_verify_classperms
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] libselinux/utils/getseuser.c: fix build with gcc 4.8
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] libsepol: avoid unsigned integer overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: avoid unsigned integer overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] libsepol: assure string NUL-termination of ibdev_name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] libsepol: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] libsepol: ignore UBSAN false-positives
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux/utils/getseuser.c: fix build with gcc 4.8
- From: Fabrice Fontaine <fontaine.fabrice@xxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.14
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] libsepol/cil: Improve checking for bad inheritance patterns
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] libsepol/cil: make array cil_sym_sizes const
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add function to determine if a subtree has a declaration
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/4 v2] libsepol/cil: Provide option to allow qualified names in declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- RE: [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [GIT PULL] SELinux patches for v5.14
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 4/4 v2] libsepol/cil: Add support for using qualified names to secil2conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4 v2] libsepol/cil: Add support for using qualified names to secil2tree
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4 v2] libsepol/cil: Provide option to allow qualified names in declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4 v2] secilc: Add support for using qualified names to secilc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: make array cil_sym_sizes const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- [PATCH v2] selinux-notebook: describe nosuid and NNP transitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] libsepol/cil: make array cil_sym_sizes const
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Add function to determine if a subtree has a declaration
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
- From: "Schaufler, Casey" <casey.schaufler@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH 4/4] libsepol/cil: Add support for using qualified names to secil2conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] libsepol/cil: Add support for using qualified names to secil2tree
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4] libsepol/cil: Provide option to allow qualified names in declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4] secilc: Add support for using qualified names to secilc
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Only reset AST if optional has a declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Add function to determine if a subtree has a declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/5 v2] Another round of secilc-fuzzer problems fixed
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow duplicate optional blocks in most cases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 00/23] libsepol: miscellaneous cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow duplicate optional blocks in most cases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow duplicate optional blocks in most cases
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/5 v2] Another round of secilc-fuzzer problems fixed
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/3] Fix problems with CIL's handling of anonymous call arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Quote paths when generating policy.conf from binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 22/23] libsepol: declare file local variable static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 19/23] libsepol/cil: avoid using maybe uninitialized variables
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 23/23] libsepol: declare read-only arrays const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 12/23] libsepol: do not allocate memory of size 0
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 11/23] libsepol: mark read-only parameters of type_set_ interfaces const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 15/23] libsepol/cil: silence cast warning
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 06/23] libsepol: avoid unsigned integer overflow
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 21/23] libsepol: drop unnecessary casts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 16/23] libsepol/cil: drop extra semicolon
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 07/23] libsepol: follow declaration-after-statement
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 08/23] libsepol/cil: follow declaration-after-statement
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 17/23] libsepol/cil: drop dead store
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 10/23] libsepol: mark read-only parameters of ebitmap interfaces const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 02/23] libsepol: resolve missing prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 18/23] libsepol/cil: drop unnecessary casts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 20/23] libsepol: drop repeated semicolons
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/23] libsepol: fix typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 03/23] libsepol: remove unused functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5 v2] libsepol/cil: Reduce the initial symtab sizes for blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5 v2] libsepol/cil: Improve degenerate inheritance check
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5 v2] libsepol/cil: Check for empty list when marking neverallow attributes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v2] libsepol/cil: Properly check for loops in sets
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v2] libsepol/cil: Fix syntax checking of defaultrange rule
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v2] Another round of secilc-fuzzer problems fixed
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [SELinux-notebook PATCH] computing_security_contexts.md: clarify mount options with comma
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH] computing_security_contexts.md: clarify mount options with comma
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 5/5] libsepol/cil: Improve degenerate inheritance check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] libsepol/cil: Fix syntax checking of defaultrange rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] evm: Check xattr size discrepancy between kernel and user
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] evm: Check xattr size discrepancy between kernel and user
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] evm: Check xattr size misalignment between kernel and user
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] evm: Check xattr size misalignment between kernel and user
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [patch] mount.2: document SELinux use of MS_NOSUID mount flag
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] libsepol/cil: Reduce the initial symtab sizes for blocks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/5] libsepol/cil: Check for empty list when marking neverallow attributes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/5] libsepol/cil: Properly check for loops in sets
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/3] Fix problems with CIL's handling of anonymous call arguments
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 5/5] libsepol/cil: Improve degenerate inheritance check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/5] libsepol/cil: Fix syntax checking of defaultrange rule
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Quote paths when generating policy.conf from binary policy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux.8: document how mount flag nosuid affects SELinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: fix use-after-free in parse_module_store()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: fix typo
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Allow duplicate optional blocks in most cases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: fix use-after-free in parse_module_store()
- From: James Carter <jwcart2@xxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] libsepol: Quote paths when generating policy.conf from binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: youling 257 <youling257@xxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] secilc/test: Add test for anonymous args
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Fix anonymous IP address call arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol/cil: Account for anonymous category sets in an expression
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/3] Fix problems with CIL's handling of anonymous call arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: youling 257 <youling257@xxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/5] libsepol/cil: Improve degenerate inheritance check
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5] Another round of secilc-fuzzer problems fixed
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5] libsepol/cil: Reduce the initial symtab sizes for blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5] libsepol/cil: Fix syntax checking of defaultrange rule
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libsepol/cil: Properly check for loops in sets
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] libsepol/cil: Check for empty list when marking neverallow attributes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: quote paths in CIL conversion
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsemanage: fix use-after-free in parse_module_store()
- From: HuaxinLu <luhuaxin95@xxxxxxx>
- [PATCH] libsemanage: fix use-after-free in parse_module_store()
- From: HuaxinLu <luhuaxin1@xxxxxxxxxxx>
- [PATCH] selinux.8: document how mount flag nosuid affects SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [patch] mount.2: document SELinux use of MS_NOSUID mount flag
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] selinux-notebook: describe nosuid and NNP transitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: slow_avc_audit has become non-blocking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next v2] selinux: Fix kernel-doc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH -next v2] selinux: Fix kernel-doc
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: slow_avc_audit has become non-blocking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: slow_avc_audit has become non-blocking
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use __GFP_NOWARN with GFP_NOWAIT
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix kernel-doc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v27 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]