SELinux - Date Index
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH 2/2] python/semanage: Sort imports in alphabetical order
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: [PATCH] libsepol: destroy filename_trans list properly
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsepol: destroy filename_trans list properly
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] libsepol: destroy filename_trans list properly
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] python/semanage: empty stdout before exiting on BrokenPipeError
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
[PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 3/6] libsepol/cil: constify some strings
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH] python/semanage: empty stdout before exiting on BrokenPipeError
From
: Vit Mojzis <vmojzis@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Intent to release 3.2-rc1
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 3/6] libsepol/cil: constify some strings
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: Selinux context type is same for root & normal user both
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Selinux context type is same for root & normal user both
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: libsepol/cil: infinite loop using invalid block/blockabstract
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: Inputs w.r.t understanding of selinux notification and systemcall
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: Inputs w.r.t understanding of selinux notification and systemcall
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: libsepol/cil: infinite loop using invalid block/blockabstract
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/4] libsepol/cil: propagate failure of cil_fill_list()
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/4] libsepol/cil: do not add a stack variable to a list
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/4] libsepol/cil: fix NULL pointer dereference when using an unused alias
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/4] libsepol/cil: remove useless print statement
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
libsepol/cil: infinite loop using invalid block/blockabstract
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 6/6] libsepol/cil: destroy perm_datums when __cil_resolve_perms fails
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 4/6] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 3/6] libsepol/cil: constify some strings
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 5/6] libsepol/cil: fix out-of-bound read in cil_print_recursive_blockinherit
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 2/6] libsepol: ensure that hashtab_search is not called with a NULL key
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/6] libsepol: do not decode out-of-bound rolebounds
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsemanage: Free contents of modkey in semanage_direct_remove
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] Revert "libsemanage/genhomedircon: check usepasswd"
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[RFC DBUS PATCH] selinux: add option to control checking of reply messages
From
: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
Re: [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
libsepol/cil: heap-use-after-free in __class_reset_perm_values
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Inputs w.r.t understanding of selinux notification and systemcall
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
useless debug output by secilc when using expandtypeattribute in containers
From
: bauen1 <j2468h@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38]
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH v3 2/2] proc: ensure security hook is called after exec
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
[PATCH v3 1/2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
[PATCH] Revert "libsemanage/genhomedircon: check usepasswd"
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH] libsemanage: Free contents of modkey in semanage_direct_remove
From
: Jakub Hrozek <jhrozek@xxxxxxxxxx>
Re: [GIT PULL] SELinux patches for v5.11
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: David Sterba <dsterba@xxxxxxx>
Re: [PATCH] linux: handle MPTCP consistently with TCP
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] linux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[GIT PULL] SELinux patches for v5.11
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v8 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
New release of The SELinux Notebook (20201209)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] reference_policy.md: Remove Ref Policy 'contributed modules'
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] all: various small html to markdown conversions
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH v7 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 7/8] IMA: define a builtin critical data measurement policy
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 5/8] IMA: limit critical data measurement based on a label
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Chris PeBenito <pebenito@xxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH] libsepol/cil: always destroy the lexer state
From
: James Carter <jwcart2@xxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: (subset) [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Dominick Grift <dominick.grift@xxxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Vivek Goyal <vgoyal@xxxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: James Carter <jwcart2@xxxxxxxxx>
Re: [PATCH v4 06/40] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v4 04/40] fs: split out functions to hold writers
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 2/2] GitHub Actions: drop Ruby 2.4 from matrix
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: virtiofs and its optional xattr support vs. fs_use_xattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
virtiofs and its optional xattr support vs. fs_use_xattr
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 13/13] role_statements: Convert to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH 07/13] pam_login: Convert to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
[PATCH 2/2] GitHub Actions: drop Ruby 2.4 from matrix
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/2] GitHub Actions: upgrade to Python 3.9
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH] libsepol/cil: always destroy the lexer state
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] libsepol/cil: always destroy the lexer state
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] reference_policy.md: Remove Ref Policy 'contributed modules'
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: How is policy.31 created from modules under /usr/share/selinux
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
How is policy.31 created from modules under /usr/share/selinux
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v4 34/40] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 30/40] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 28/40] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 26/40] notify: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 25/40] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 32/40] apparmor: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 27/40] init: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 39/40] tests: extend mount_setattr tests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 35/40] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 22/40] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 33/40] ima: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 20/40] namei: prepare for idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 21/40] open: handle idmapped mounts in do_truncate()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 23/40] af_unix: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
[PATCH v4 29/40] would_dump: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 24/40] utimes: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 00/40] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 16/40] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 13/40] attr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 17/40] stat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 15/40] xattr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 14/40] acl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 19/40] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 11/40] namei: make permission helpers idmapped mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 07/40] tests: add mount_setattr() selftests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 10/40] capability: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 09/40] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 08/40] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 06/40] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v4 04/40] fs: split out functions to hold writers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Florian Westphal <fw@xxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
Re: [PATCH] all: various small html to markdown conversions
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH v2 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH] all: various small html to markdown conversions
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: Fix Checkmodule when Writing down to older Module Versions
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: https://github.com/SELinuxProject/selinux/pull/271
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [MPTCP] [RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
[RFC PATCH] selinux: handle MPTCP consistently with TCP
From
: Paolo Abeni <pabeni@xxxxxxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 07/38] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 17/38] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 06/38] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v3 07/38] mount: attach mappings to mounts
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 17/38] namei: introduce struct renamedata
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 07/38] mount: attach mappings to mounts
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 06/38] fs: add id translation helpers
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 04/38] fs: add mount_setattr()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 32/38] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 00/38] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
Re: [PATCH v3 33/38] ext4: support idmapped mounts
From
: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
Re: [PATCH v3 32/38] fat: handle idmapped mounts
From
: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
Re: [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
From
: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
Re: [PATCH userspace] travis: run only selinux-testsuite
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Fix Checkmodule when Writing down to older Module Versions
From
: Matthew Ife <matthew@xxxxxxx>
review needed - coreutils ported to a newer version of libselinux
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 0/6] libsepol/cil: Various CIL cleanups
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] Add configuration to build and run tests in GitHub Actions
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH userspace] travis: run only selinux-testsuite
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH v3 00/38] idmapped mounts
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH v3 08/38] capability: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 09/38] namei: add idmapped mount aware permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 08/38] capability: handle idmapped mounts
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH v3 05/38] tests: add mount_setattr() selftests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 07/38] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 04/38] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 00/38] idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 06/38] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 18/38] namei: prepare for idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 24/38] notify: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 27/38] would_dump: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 33/38] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 20/38] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 28/38] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 26/38] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 22/38] utimes: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 31/38] ima: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 21/38] af_unix: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 23/38] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 30/38] apparmor: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 37/38] tests: extend mount_setattr tests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 25/38] init: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 32/38] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 12/38] acl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 17/38] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 11/38] attr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 13/38] xattr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 14/38] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 15/38] stat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH userspace] travis: run only selinux-testsuite
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH userspace] travis: run only selinux-testsuite
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH userspace] travis: run only selinux-testsuite
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH userspace] travis: run only selinux-testsuite
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: https://github.com/SELinuxProject/selinux/pull/271
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 3/3] Simplify the tarball generating scripts
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 2/3] Use X.Y instead of date for release tag
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
[PATCH 1/3] Introduce VERSION file for selinux
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
https://github.com/SELinuxProject/selinux/pull/271
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Karol Herbst <kherbst@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH 1/1] Add configuration to build and run tests in GitHub Actions
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v1 1/1] selinux-testsuite: Add userfaultfd test
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: Failed to start Udev Kernel device manager
From
: bauen1 <j2468h@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Sean Young <sean@xxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] mls_mcs.md: Convert section to markdown
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [PATCH 053/141] selinux: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] mls_mcs.md: Convert section to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Failed to start Udev Kernel device manager
From
: Ashish Mishra <ashishm@xxxxxxxxxx>
[PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[PATCH 1/1] Add configuration to build and run tests in GitHub Actions
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 0/6] libsepol/cil: Various CIL cleanups
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 053/141] selinux: Fix fall-through warnings for Clang
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] mls_mcs.md: Convert section to markdown
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 31/39] audit: handle idmapped mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 07/39] mount: attach mappings to mounts
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [RFC] Introduce MAJOR.MINOR.PATCH version for the whole project
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 31/39] audit: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 31/39] audit: handle idmapped mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Sam Ravnborg <sam@xxxxxxxxxxxx>
Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
Re: [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v23 23/23] AppArmor: Remove the exclusive flag
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 21/23] Audit: Add a new record for multiple object LSM attributes
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 19/23] audit: add support for non-syscall auxiliary records
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 18/23] LSM: Verify LSM display sanity in binder
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 17/23] NET: Store LSM netlabel data in a lsmblob
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 16/23] LSM: security_secid_to_secctx in netlink netfilter
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 15/23] LSM: Use lsmcontext in security_inode_getsecctx
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 14/23] LSM: Use lsmcontext in security_secid_to_secctx
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 13/23] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 12/23] LSM: Specify which LSM to display
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v23 01/23] LSM: Infrastructure management of the sock security
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v22 00/23] LSM: Module stacking for AppArmor
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Jakub Kicinski <kuba@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Jakub Kicinski <kuba@xxxxxxxxxx>
Re: [PATCH 000/141] Fix fall-through warnings for Clang
From
: Joe Perches <joe@xxxxxxxxxxx>
[PATCH 053/141] selinux: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
[PATCH 000/141] Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH] mls_mcs.md: Convert section to markdown
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
[PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/8] IMA: add support to measure buffer data hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 4/8] IMA: add policy rule to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
Re: [pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: David Sterba <dave@xxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Stephen Barber <smbarber@xxxxxxxxxxxx>
Re: [PATCH v2 00/39] fs: idmapped mounts
From
: Jonathan Corbet <corbet@xxxxxxx>
[pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces)
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 5/6] libsepol/cil: Use the macro NODE() whenever possible
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 4/6] libsepol/cil: Remove unnecessary assignment in cil_resolve_name_keep_aliases()
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 3/6] libsepol/cil: Remove unused field from struct cil_args_resolve
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 6/6] libspepol/cil: Use the macro FLAVOR() whenever possible
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 2/6] libsepol/cil: Git rid of unnecessary check in cil_gen_node()
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 1/6] libsepol/cil: cil_tree_walk() helpers should use CIL_TREE_SKIP_*
From
: James Carter <jwcart2@xxxxxxxxx>
[PATCH 0/6] libsepol/cil: Various CIL cleanups
From
: James Carter <jwcart2@xxxxxxxxx>
Rebased selinux/working-selinuxns on top of selinux/next
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 21/39] af_unix: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 27/39] would_dump: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 34/39] ext4: support idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 26/39] ioctl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 23/39] fcntl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 30/39] apparmor: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 20/39] open: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 22/39] utimes: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 25/39] init: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 28/39] exec: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 32/39] ima: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 24/39] notify: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 33/39] fat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 31/39] audit: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 15/39] stat: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 13/39] xattr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 18/39] namei: prepare for idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 17/39] namei: introduce struct renamedata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 12/39] acl: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 14/39] commoncap: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 11/39] attr: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 09/39] namei: add idmapped mount aware permission helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 07/39] mount: attach mappings to mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 05/39] tests: add mount_setattr() selftests
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 08/39] capability: handle idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 00/39] fs: idmapped mounts
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 06/39] fs: add id translation helpers
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 04/39] fs: add mount_setattr()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [GIT PULL] SELinux fixes for v5.10 (#1)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
From
: Jakub Kicinski <kuba@xxxxxxxxxx>
Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
From
: James Morris <jmorris@xxxxxxxxx>
[GIT PULL] SELinux fixes for v5.10 (#1)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
From
: Jonathan Corbet <corbet@xxxxxxx>
[PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 3/7] IMA: add hook to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] python/sepolicy: allow to override manpage date
From
: Petr Lautrbach <plautrba@xxxxxxxxxx>
Re: [PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] selinux: drop super_block backpointer from superblock_security_struct
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 3/7] IMA: add hook to measure critical data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/7] IMA: add policy to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 3/7] IMA: add hook to measure critical data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH userspace v2 3/3] selinux_config(5): add a note that runtime disable is deprecated
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH userspace] ci: add new dependencies needed by selinux-testsuite
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] libsepol: free memory when realloc() fails
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH 1/1] libsepol: free memory when realloc() fails
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow()
From
: Chen Zhou <chenzhou10@xxxxxxxxxx>
Re: [PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow()
From
: chenzhou <chenzhou10@xxxxxxxxxx>
Re: [PATCH userspace] ci: bump Fedora image version to 33
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH userspace] ci: add new dependencies needed by selinux-testsuite
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow()
From
: Chen Zhou <chenzhou10@xxxxxxxxxx>
[PATCH v13 1/4] security: add inode_init_security_anon() LSM hook
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v13 4/4] userfaultfd: use secure anon inodes for userfaultfd
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH v13 0/4] SELinux support for anonymous inodes and UFFD
From
: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
[PATCH 1/1] libsepol: free memory when realloc() fails
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
Re: [PATCH userspace v2 3/3] selinux_config(5): add a note that runtime disable is deprecated
From
: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]