SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol: Validate policydb values when reading binary
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Eliminate gaps in the policydb role arrays
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] chcat: allow usage if binary policy is inaccessible
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- Re: [PATCH] selinux(8,5): Describe fcontext regular expressions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux/getconlist: report failures
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] gui: fix "file type" selection in fcontextPage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] secilc: fixes cil_role_statements.md example
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] secilc: fixes cil_role_statements.md example
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libselinux: rename gettid() to something which never conflicts with the libc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH] gui: fix "file type" selection in fcontextPage
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] policycoreutils: Resolve path in restorecon_xattr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] libselinux: fix segfault in add_xattr_entry()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.12
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite failures with selinux-policy-3.14.8-1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- selinux-testsuite failures with selinux-policy-3.14.8-1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] selinux: policy load fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- alternative to glblub defaultrange
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux(8,5): Describe fcontext regular expressions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3 3/3] secilc/docs: add custom color theme
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Recommended value in CONFIG_LSM option on SELinux system?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol/cil: use-after-free with optional+class common
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/3] secilc/docs: add custom color theme
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol: Create function ebitmap_highest_set_bit()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: Validate policydb values when reading binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2] libsepol: Validate policydb values when reading binary
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Eliminate gaps in the policydb role arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libsepol: remove unused files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: remove unused files
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/2] keys: request_key() interception in containers
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH RESEND v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- [PATCH 2/2] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux/getconlist: report failures
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20210203
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: SELinux userspace 3.2-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: remove unused files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- libsepol/cil: use-after-free with optional+class common
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH testsuite] ci: run testsuite also against the secnext kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setfiles: drop now unused static variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] setfiles: drop now unused static variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/cil: fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] scripts/release: make the script more robust and direct
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Fix document links
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolgen: allow any policy statement in if(n)def
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH v24 23/25] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 02/25] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH v24 14/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 03/25] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH] selinux-notebook: Fix document links
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] ci: run testsuite also against the secnext kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH testsuite 0/2] Migrate CI to GH Actions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: VSOCK & getpeercon()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 20/40] init: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH testsuite 1/2] check-syntax: use 'command -v' instead of 'which'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: VSOCK & getpeercon()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolgen: allow any policy statement in if(n)def
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: VSOCK & getpeercon()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] python/sepolgen: allow any policy statement in if(n)def
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH testsuite 1/2] check-syntax: use 'command -v' instead of 'which'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/2] Migrate CI to GH Actions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/2] Migrate CI to GH Actions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 18/40] utimes: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 11/40] stat: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/40] xattr: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 04/40] capability: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/40] fs: add file and path permissions helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libselinux: update getseuser
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 02/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 01/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 09/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 07/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 16/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 20/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 38/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 26/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 32/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 25/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 34/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 22/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 36/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 37/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 13/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 18/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 14/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 11/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 03/40] fs: add file and path permissions helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 04/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 08/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] libsepol: do not decode out-of-bound rolebounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/1] libsepol: do not decode out-of-bound rolebounds
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libselinux: update getseuser
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Jann Horn <jannh@xxxxxxxxxx>
- ANN: SELinux userspace 3.2-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] python/sepolgen: allow any policy statement in ifndef
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [RFC PATCH 0/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH testsuite] Makefile: unload policy when testsuite fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Intent to release 3.2-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- VSOCK & getpeercon()
- From: Marc-André Lureau <marcandre.lureau@xxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: can't unmount /sys/fs/selinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] libselinux: Always close status page fd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: Always close status page fd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: Always close status page fd
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: can't unmount /sys/fs/selinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Always close status page fd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: destroy filename_trans list properly
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Intent to release 3.2-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] python/semanage: Sort imports in alphabetical order
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: can't unmount /sys/fs/selinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: can't unmount /sys/fs/selinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- can't unmount /sys/fs/selinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/2] setfiles: Do not abort on labeling error
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] setfiles: Do not abort on labeling error
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] setfiles: Do not abort on labeling error
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Why every file context is "system_u:object_r"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] setfiles: Do not abort on labeling error
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Why every file context is "system_u:object_r"
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 33/42] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 35/42] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 34/42] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 36/42] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 28/42] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 08/42] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 07/42] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 06/42] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 04/42] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH testsuite] perf_event: update perf_event test for the new CAP_PERFMON capability
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: mark selinux_xfrm_refcount as __read_mostly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: mark some global variables __ro_after_init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: make selinuxfs_mount static
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] selinux: drop the unnecessary aurule_callback variable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selinux: remove unused global variables
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] python/sepolgen: allow any policy statement in ifndef
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v15 4/4] userfaultfd: use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v15 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v15 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v15 1/4] security: add inode_init_security_anon() LSM hook
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: update getseuser
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: accept const fromcon in get_context API
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
- From: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: ARM64: Move selinux_state to a separate page
- From: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
- [PATCH v14 4/4] userfaultfd: use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v14 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v14 1/4] security: add inode_init_security_anon() LSM hook
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v14 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Git link to get semanage , sesearch source code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: dancol <dancol@xxxxxxxxxx>
- Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Update symtab nprim field when adding or removing datums
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Git link to get semanage , sesearch source code
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Selinux context type is same for root & normal user both
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] selinux: mark selinux_xfrm_refcount as __read_mostly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 4/5] selinux: mark some global variables __ro_after_init
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/5] selinux: remove unused global variables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/5] selinux: make selinuxfs_mount static
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/5] selinux: drop the unnecessary aurule_callback variable
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/5] Clean up SELinux global variables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]