SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v6 23/40] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v6 23/40] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
From
: Michal Hocko <mhocko@xxxxxxxx>
[PATCH v24 14/25] LSM: Specify which LSM to display
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v24 03/25] LSM: provide lsm name and id slot mappings
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Michal Hocko <mhocko@xxxxxxxx>
[PATCH] selinux-notebook: Fix document links
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v6 23/40] exec: handle idmapped mounts
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH testsuite] ci: run testsuite also against the secnext kernel
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v6 23/40] exec: handle idmapped mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH testsuite 0/2] Migrate CI to GH Actions
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: bfields@xxxxxxxxxxxx (J. Bruce Fields)
Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: measure state and policy capabilities
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: VSOCK & getpeercon()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6 16/40] open: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v6 20/40] init: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH testsuite 1/2] check-syntax: use 'command -v' instead of 'which'
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: VSOCK & getpeercon()
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] python/sepolgen: allow any policy statement in if(n)def
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: VSOCK & getpeercon()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v2] python/sepolgen: allow any policy statement in if(n)def
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
[PATCH testsuite 1/2] check-syntax: use 'command -v' instead of 'which'
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH testsuite 2/2] Migrate CI to GH Actions
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH testsuite 0/2] Migrate CI to GH Actions
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 23/40] exec: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 18/40] utimes: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 16/40] open: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 11/40] stat: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 09/40] xattr: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 04/40] capability: handle idmapped mounts
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v6 03/40] fs: add file and path permissions helpers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] libselinux: update getseuser
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] selinux: measure state and policy capabilities
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 00/40] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 05/39] namei: make permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 02/40] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 01/40] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 09/40] xattr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 07/40] attr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 16/40] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 20/40] init: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 38/40] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 26/39] ima: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 32/40] fs: split out functions to hold writers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 25/40] apparmor: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 21/40] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 39/40] xfs: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 34/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 23/40] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 22/40] would_dump: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 36/40] tests: add mount_setattr() selftests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 37/40] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 13/40] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 18/40] utimes: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 19/40] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 14/40] namei: prepare for idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 17/40] af_unix: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 11/40] stat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 03/40] fs: add file and path permissions helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 04/40] capability: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 08/40] acl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v6 10/40] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
[PATCH 1/1] process_madvise.2: Add process_madvise man page
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v2 1/1] libsepol: do not decode out-of-bound rolebounds
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
[PATCH v2 1/1] libsepol: do not decode out-of-bound rolebounds
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/2] libselinux: update getseuser
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Jann Horn <jannh@xxxxxxxxxx>
ANN: SELinux userspace 3.2-rc1 release candidate
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v5 15/42] fs: add file_user_ns() helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] python/sepolgen: allow any policy statement in ifndef
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v5 15/42] fs: add file_user_ns() helper
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH v5 23/42] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[RFC PATCH 0/1] selinux-notebook: Add new section for Embedded Systems
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 31/42] exec: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 27/42] notify: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 25/42] utimes: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 23/42] open: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 20/42] namei: introduce struct renamedata
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 18/42] stat: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 16/42] xattr: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 15/42] fs: add file_user_ns() helper
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 14/42] acl: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 13/42] attr: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 10/42] capability: handle idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 09/42] mount: attach mappings to mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH testsuite] Makefile: unload policy when testsuite fails
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Intent to release 3.2-rc1
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: pnagar@xxxxxxxxxxxxxx
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: pnagar@xxxxxxxxxxxxxx
Re: [PATCH v5 37/42] xfs: support idmapped mounts
From
: Dave Chinner <david@xxxxxxxxxxxxx>
VSOCK & getpeercon()
From
: Marc-André Lureau <marcandre.lureau@xxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v5 37/42] xfs: support idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 37/42] xfs: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH v5 37/42] xfs: support idmapped mounts
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/42] idmapped mounts
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: can't unmount /sys/fs/selinux
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] libselinux: Always close status page fd
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libselinux: Always close status page fd
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH] libselinux: Always close status page fd
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: can't unmount /sys/fs/selinux
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libselinux: Always close status page fd
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] libsepol: destroy filename_trans list properly
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Intent to release 3.2-rc1
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 2/2] python/semanage: Sort imports in alphabetical order
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: can't unmount /sys/fs/selinux
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: can't unmount /sys/fs/selinux
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
can't unmount /sys/fs/selinux
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH v2 1/2] setfiles: Do not abort on labeling error
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] setfiles: Do not abort on labeling error
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH] setfiles: Do not abort on labeling error
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: Why every file context is "system_u:object_r"
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Michal Hocko <mhocko@xxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Michal Hocko <mhocko@xxxxxxxx>
Re: [PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] setfiles: Do not abort on labeling error
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Why every file context is "system_u:object_r"
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH v5 41/42] tests: extend mount_setattr tests
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v5 29/42] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 33/42] apparmor: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 26/42] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 23/42] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 35/42] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 30/42] would_dump: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 34/42] ima: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 21/42] namei: prepare for idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 41/42] tests: extend mount_setattr tests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 27/42] notify: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 24/42] af_unix: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 20/42] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 13/42] attr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 15/42] fs: add file_user_ns() helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 36/42] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 37/42] xfs: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 31/42] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 16/42] xattr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 18/42] stat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 25/42] utimes: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 28/42] init: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 17/42] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 14/42] acl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 08/42] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 11/42] namei: make permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 07/42] tests: add mount_setattr() selftests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 10/42] capability: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 09/42] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 06/42] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 00/42] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 04/42] fs: split out functions to hold writers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH testsuite] perf_event: update perf_event test for the new CAP_PERFMON capability
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 5/5] selinux: mark selinux_xfrm_refcount as __read_mostly
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 4/5] selinux: mark some global variables __ro_after_init
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 3/5] selinux: make selinuxfs_mount static
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 2/5] selinux: drop the unnecessary aurule_callback variable
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/5] selinux: remove unused global variables
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: pnagar@xxxxxxxxxxxxxx
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Michal Hocko <mhocko@xxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[PATCH] python/sepolgen: allow any policy statement in ifndef
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: pnagar@xxxxxxxxxxxxxx
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: pnagar@xxxxxxxxxxxxxx
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: David Rientjes <rientjes@xxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
[PATCH v15 4/4] userfaultfd: use secure anon inodes for userfaultfd
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v15 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v15 2/4] fs: add LSM-supporting anon-inode interface
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v15 1/4] security: add inode_init_security_anon() LSM hook
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Minchan Kim <minchan@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
[PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH 2/2] libselinux: update getseuser
From
: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
[PATCH 1/2] libselinux: accept const fromcon in get_context API
From
: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
[RFC PATCH v2] selinux: security: Move selinux_state to a separate page
From
: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
[RFC PATCH] selinux: ARM64: Move selinux_state to a separate page
From
: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
[PATCH v14 4/4] userfaultfd: use secure anon inodes for userfaultfd
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v14 2/4] fs: add LSM-supporting anon-inode interface
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v14 1/4] security: add inode_init_security_anon() LSM hook
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v14 0/4] SELinux support for anonymous inodes and UFFD
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v10 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v10 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Git link to get semanage , sesearch source code
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: dancol <dancol@xxxxxxxxxx>
Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH 1/2] libsepol/cil: Update symtab nprim field when adding or removing datums
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Git link to get semanage , sesearch source code
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
[PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
From
: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
[PATCH 5/5] selinux: mark selinux_xfrm_refcount as __read_mostly
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 4/5] selinux: mark some global variables __ro_after_init
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 1/5] selinux: remove unused global variables
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 3/5] selinux: make selinuxfs_mount static
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/5] selinux: drop the unnecessary aurule_callback variable
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 0/5] Clean up SELinux global variables
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/2] python/semanage: Sort imports in alphabetical order
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: [PATCH] libsepol: destroy filename_trans list properly
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsepol: destroy filename_trans list properly
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] libsepol: destroy filename_trans list properly
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: empty stdout before exiting on BrokenPipeError
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
[PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 3/6] libsepol/cil: constify some strings
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH] python/semanage: empty stdout before exiting on BrokenPipeError
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Intent to release 3.2-rc1
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 3/6] libsepol/cil: constify some strings
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: libsepol/cil: infinite loop using invalid block/blockabstract
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: Inputs w.r.t understanding of selinux notification and systemcall
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: Inputs w.r.t understanding of selinux notification and systemcall
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: libsepol/cil: infinite loop using invalid block/blockabstract
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/4] libsepol/cil: do not add a stack variable to a list
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/4] libsepol/cil: fix NULL pointer dereference when using an unused alias
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/4] libsepol/cil: remove useless print statement
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
libsepol/cil: infinite loop using invalid block/blockabstract
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/6] libsepol/cil: constify some strings
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsemanage: Free contents of modkey in semanage_direct_remove
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] Revert "libsemanage/genhomedircon: check usepasswd"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
libsepol/cil: heap-use-after-free in __class_reset_perm_values
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Inputs w.r.t understanding of selinux notification and systemcall
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
useless debug output by secilc when using expandtypeattribute in containers
From
: bauen1 <j2468h@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
[PATCH v3 1/2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
[PATCH] Revert "libsemanage/genhomedircon: check usepasswd"
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: Free contents of modkey in semanage_direct_remove
From
: Jakub Hrozek <jhrozek@xxxxxxxxxx>
Re: [GIT PULL] SELinux patches for v5.11
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: David Sterba <dsterba@xxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[GIT PULL] SELinux patches for v5.11
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
New release of The SELinux Notebook (20201209)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] reference_policy.md: Remove Ref Policy 'contributed modules'
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] all: various small html to markdown conversions
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH] libsepol/cil: always destroy the lexer state
From
: James Carter <jwcart2@xxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: (subset) [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v4 04/40] fs: split out functions to hold writers
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 2/2] GitHub Actions: drop Ruby 2.4 from matrix
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 13/13] role_statements: Convert to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 07/13] pam_login: Convert to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
[PATCH 2/2] GitHub Actions: drop Ruby 2.4 from matrix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsepol/cil: always destroy the lexer state
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] libsepol/cil: always destroy the lexer state
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] reference_policy.md: Remove Ref Policy 'contributed modules'
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v4 34/40] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 30/40] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 28/40] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 26/40] notify: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 25/40] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]