SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 2/5] mm: use vma_is_stack() and vma_is_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH] libsepol/fuzz: more strict fuzzing of binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: check for overflow in put_entry()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: free initial sid names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/utils: introduce getpolicyload
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v12 10/11] SELinux: Add selfattr hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH net-next 1/4] security: Constify sk in the sk_getsecid hook.
- From: Guillaume Nault <gnault@xxxxxxxxxx>
- [PATCH net-next 0/4] net: Mark the sk parameter of routing functions as 'const'.
- From: Guillaume Nault <gnault@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] restorecond: add check for strdup in strings_list_add
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH v2] selinux: introduce an initial SID for early boot processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: cleanup the policycap accessor functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/92] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] selinux: optimize major part with a kernel config in selinux_mmap_addr()
- From: Leesoo Ahn <lsahn@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] checkpolicy,libsepol: move transition to separate structure in avtab
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [apparmor] [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- RE: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 07/20] selinux: services: update type for umber of class permissions
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [apparmor] [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Seth Arnold <seth.arnold@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH] checkpolicy: free role identifier in define_role_dom()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2] checkpolicy: add round-trip tests
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2 91/92] selinux: convert to ctime accessor functions
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v2 4/4] semodule_unpackage: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] semodule_package: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/4] semodule_expand: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/4] semodule_link: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] setsebool: improve bash-completion script
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] setsebool: drop unnecessary linking against libsepol
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] libsepol/cil: support parallel neverallow checks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/fuzz: more strict fuzzing of binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: check for overflow in put_entry()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: free initial sid names
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: introduce getpolicyload
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] python: update python.pot
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] selinux: disable debug functions by default
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: implement avtab_search() via avtab_search_node()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 19/20] selinux: status: avoid implicit conversions regarding enforcing status
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 00/20] selinux: be more strict about integer conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 20/20] selinux: selinuxfs: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 18/20] selinux: nlmsgtab: implicit conversion
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 17/20] selinux: services: implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 16/20] selinux: symtab: implicit conversion
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 15/20] selinux: policydb: implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 14/20] selinux: use consistent type for AV rule specifier
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 13/20] selinux: selinuxfs: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 12/20] selinux: hooks: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 11/20] selinux: avc: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 08/20] selinux: services: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 09/20] selinux: status: consistently use u32 as sequence number type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 10/20] selinux: netif: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 05/20] selinux: hashtab: use identical iterator type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 04/20] selinux: ebitmap: use u32 as bit type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 06/20] selinux: mls: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 07/20] selinux: services: update type for umber of class permissions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 02/20] selinux: avtab: avoid implicit conversions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 03/20] selinux: avoid avtab overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 01/20] selinux: check for multiplication overflow in put_entry()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v2 07/92] fs: add ctime accessors infrastructure
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 91/92] selinux: convert to ctime accessor functions
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 07/92] fs: add ctime accessors infrastructure
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v5] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v5] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 00/79] fs: new accessors for inode->i_ctime
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [syzbot] [selinux?] [reiserfs?] KASAN: wild-memory-access Read in inode_doinit_with_dentry
- From: syzbot <syzbot+4cdfeccf2cf6f8ab36a4@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix get_os_version except clause
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libselinux: add check for calloc in check_booleans
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dismod: print the policy version only in interactive mode
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] checkpolicy: add option to skip checking neverallow rules
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] checkpolicy/dismod: misc improvements
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH userspace 1/2] libsepol: stop translating deprecated intial SIDs to strings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v12 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix get_os_version except clause
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/inet_socket: cover the MPTCP protocol
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: RFC: style/formatting changes for SELinux kernel code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libselinux: add check for calloc in check_booleans
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: fix inconsistent indentation in selinux_check_access
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: RFC: style/formatting changes for SELinux kernel code
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Add/remove user even when SELinux is disabled
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4 4/4] python: update python.pot
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: RFC: style/formatting changes for SELinux kernel code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v6.5
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- Re: [PATCH userspace 1/2] libsepol: stop translating deprecated intial SIDs to strings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 78/79] selinux: switch to new ctime accessors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/79] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Add/remove user even when SELinux is disabled
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 78/79] selinux: switch to new ctime accessors
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: multiple inconsistent perm_map files
- From: "Christopher J. PeBenito" <pebenito@xxxxxxxx>
- [PATCH v2] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 8/8] libsepol/cil: add support for prefix/suffix filename transtions to CIL
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 5/8] libsepol: implement new module binary format of avrule
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 6/8] checkpolicy,libsepol: add prefix/suffix support to kernel policy
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 7/8] checkpolicy,libsepol: add prefix/suffix support to module policy
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 4/8] libsepol: implement new kernel binary format for avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 3/8] checkpolicy,libsepol: move filename transition rules to avrule
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 2/8] checkpolicy,libsepol: move filename transitions to avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] checkpolicy,libsepol: move transition to separate structure in avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v2 0/8] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: introduce an initial SID for early boot processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/inet_socket: cover the MPTCP protocol
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] python/sepolicy: Fix get_os_version except clause
- From: Jeffery To <jeffery.to@xxxxxxxxx>
- [PATCH] libselinux: fix inconsistent indentation in selinux_check_access
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- [PATCH] libselinux: add check for calloc in check_booleans
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: cleanup the policycap accessor functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: introduce an initial SID for early boot processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v11 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/9] libselinux: deprecate matchpathcon and compute_user interfaces
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/9] libselinux: annotate interfaces with compiler attributes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dismod: print the policy version only in interactive mode
- From: James Carter <jwcart2@xxxxxxxxx>
- SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] dismod, dispol: reduce the messages in batch mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH v2 1/2] dismod: print the policy version only in interactive mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH 2/2] dismod, dispol: reduce the messages in batch mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v4 4/4] python: update python.pot
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v4 4/4] python: update python.pot
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [no subject]
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v4 1/4] python: improve format strings for proper localization
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v4 3/4] semanage: Drop unnecessary import from seobject
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v4 2/4] python: Drop hard formating from localized strings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 2/2] dismod, dispol: reduce the messages in batch mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/2] dismod: print the policy version only in interactive mode
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH v3 4/4] python: update python.pot
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v3 3/4] semanage: Drop unnecessary import from seobject
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [no subject]
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v3 2/4] python: Drop hard formating from localized strings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v3 1/4] python: improve format strings for proper localization
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 1/4] python: improve format strings for proper localization
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix template for confined user policy modules
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 4/4] python: update python.pot
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2 1/4] python: improve format strings for proper localization
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2 3/4] semanage: Drop unnecessary import from seobject
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [no subject]
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2 2/4] python: Drop hard formating from localized strings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH userspace 2/2] libsepol: add support for the new "init" initial SID
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/2] libsepol: stop translating deprecated intial SIDs to strings
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/2] Introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] semodule_package: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 4/4] semodule_unpackage: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] semodule_package: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] semodule_link: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/4] semodule_expand: update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RFC: style/formatting changes for SELinux kernel code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] checkpolicy/dismod: misc improvements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy: add option to skip checking neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] dispol: add --help option
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: clarify manual page of sepolicy interface
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/5] policycoreutils: Add examples to man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] dismod: add --help option
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/5] selinux: move filename transitions to avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dispol: add --help option
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/4] dispol: add --actions option for non-interactive use
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 3/4] dispol: handle EOF in user interaction
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/4] dispol: add --help option
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 2/4] dispol: delete an unnecessary empty line
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH 1/4] dismod: add --help option
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH] Makefile: expand ~ in DESTDIR
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- ANN: SELinux and stable kernel changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 7/8] checkpolicy, libsepol: add prefix/suffix support to module policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] dismod: add --help option
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 7/8] checkpolicy, libsepol: add prefix/suffix support to module policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/5] selinux: move filename transitions to avtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- multiple inconsistent perm_map files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] python/semanage: Drop hard formating from localized strings
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/4] python: improve format strings for proper localization
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2] semanage, sepolicy: list also ports not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Add CPPFLAGS to Makefile
- From: ChungSheng Wu <chungsheng@xxxxxxxxxx>
- Re: [PATCH v2 1/5] policycoreutils: Add examples to man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: avoid bool as identifier name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol: drop message for uncommon error cases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol: validate some object contexts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] checkpolicy: drop unused token CLONE
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] libselinux: migrating hashtab from policycoreutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolicy: Fix template for confined user policy modules
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] sepolicy: clarify manual page of sepolicy interface
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] semanage: list all nodes even if not attributed with node_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] sepolicy: clarify manual page of sepolicy interface
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v11 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol: drop message for uncommon error cases
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile for versions of make < v4.3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] semanage, sepolicy: list also ports not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux: don't use make's grouped targets feature yet
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] secilc: consider DESTDIR in tests
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Makefile: expand ~ in DESTDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [RFC PATCH] selinux: support name based type transitions in conditional policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: avoid bool as identifier name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] checkpolicy, libsepol: support name based type transitions in conditional policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] selinux: move filename transitions to avtab
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsemanage/tests: consider DESTDIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] secilc: consider DESTDIR in tests
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] libsepol: replace sepol_log_err() by ERR()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/4] libsepol: drop message for uncommon error cases
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/4] libsepol: drop duplicate newline in sepol_log_err() calls
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] libsepol: replace log_err() by ERR()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] Makefile: expand ~ in DESTDIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v6.4 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH PR#394] semanage: list all ports even if not attributed with port_type
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Makefile: expand ~ in DESTDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: don't use make's grouped targets feature yet
- From: Erwan Velu <e.velu@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for v6.4 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/8] checkpolicy, libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile for versions of make < v4.3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix Makefile for versions of make < v4.3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/8] checkpolicy, libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 8/8] libsepol/cil: add support for prefix/suffix filename transtions to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 7/8] checkpolicy, libsepol: add prefix/suffix support to module policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: don't use make's grouped targets feature yet
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: don't use make's grouped targets feature yet
- From: Luiz Capitulino <luizcap@xxxxxxxxxx>
- Re: [PATCH] selinux: don't use make's grouped targets feature yet
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: don't use make's grouped targets feature yet
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH] python/sepolicy: Fix template for confined user policy modules
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/4] libsepol: drop message for uncommon error cases
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 4/5] checkpolicy: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 3/5] sandbox: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 2/5] python/sepolicy: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 1/5] policycoreutils: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 5/5] libselinux: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 2/5] selinux: move filename transitions to avtab
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Infrastructure management of the sock
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Infrastructure management of the sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Infrastructure management of the sock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Jay Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 5/5] libselinux: Add examples to man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 4/5] checkpolicy: Add examples to man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/5] python/sepolicy: Improve man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] policycoreutils: Add examples to man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] LSM: Infrastructure management of the sock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 8/8] libsepol/cil: add support for prefix/suffix filename transtions to CIL
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 7/8] checkpolicy, libsepol: add prefix/suffix support to module policy
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 6/8] checkpolicy, libsepol: add prefix/suffix support to kernel policy
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 5/8] libsepol: implement new module binary format of avrule
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 2/8] checkpolicy, libsepol: move filename transitions to avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 4/8] libsepol: implement new kernel binary format for avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 3/8] checkpolicy, libsepol: move filename transition rules to avrule
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 1/8] checkpolicy, libsepol: move transition to separate structure in avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 0/8] checkpolicy, libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 5/5] selinux: add prefix/suffix matching support to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 4/5] selinux: filename transitions move tests
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 3/5] selinux: implement new binary format for filename transitions in avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 2/5] selinux: move filename transitions to avtab
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 1/5] selinux: move transition to separate structure in avtab_datum
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH] LSM: Infrastructure management of the sock
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 4/4] dismod: add --actions option for non-interactive use
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 3/4] dismod: handle EOF in user interaction
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 2/4] dismod: delete an unnecessary empty line
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH 1/4] dismod: add --help option
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- [PATCH] Makefile: expand ~ in DESTDIR
- From: Masatake YAMATO <yamato@xxxxxxxxxx>
- Re: [PATCH] security: keys: perform capable check only on privileged operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: cleanup exit_sel_fs() declaration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH PR#394] semanage: list all ports even if not attributed with port_type
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] python/sepolicy: Add/remove user even when SELinux is disabled
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] selinux: make labeled NFS work when mounted before policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: cleanup exit_sel_fs() declaration
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] security: keys: perform capable check only on privileged operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] libsepol: validate some object contexts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] checkpolicy: drop unused token CLONE
- From: James Carter <jwcart2@xxxxxxxxx>
- ANN: SELinux repository changes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] libselinux: migrating hashtab from policycoreutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] policycoreutils: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 4/5] checkpolicy: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 5/5] libselinux: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/5] sandbox: Add examples to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/5] python/sepolicy: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] selinux: deprecated fs ocon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: keys: perform capable check only on privileged operations
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] security: keys: perform capable check only on privileged operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: deprecated fs ocon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 9/9] net: use new capable_any functionality
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: keys: perform capable check only on privileged operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: deprecated fs ocon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: make header files self-including
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: deprecated fs ocon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: keep context struct members in sync
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/4] python: update python.pot
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 1/4] python: improve format strings for proper localization
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 2/4] python/semanage: Drop hard formating from localized strings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 3/4] semanage: Drop unnecessary import from seobject
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH RFC] selinux: TESTING ONLY, PLEASE IGNORE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: TESTING ONLY, PLEASE IGNORE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/9] bpf: use new capable_any functionality
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v4 3/9] capability: use new capable_any functionality
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/9] drivers: use new capable_any functionality
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 6/9] fs: use new capable_any functionality
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 7/9] kernel: use new capable_any functionality
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [RFC PATCH 4/4] semodule_unpackage: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] semodule_package: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] semodule_link: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] semodule_expand: update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 9/9] restorecond: drop last matchpathcon call
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 8/9] restorecond: check selinux_restorecon(3) for failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 6/9] libselinux: ignore internal use of deprecated interfaces
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 7/9] secon: check selinux_raw_to_trans_context(3) for failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/9] libselinux: annotate interfaces with compiler attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 5/9] libselinux: explicitly ignore return values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 4/9] mcstrans: check getcon(3) and context_range_set(3) for failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/9] libselinux: declare avc_open(3) options parameter const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/9] libselinux: deprecate matchpathcon and compute_user interfaces
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: drop message for uncommon error cases
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] libsepol: drop duplicate newline in sepol_log_err() calls
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] libsepol: replace sepol_log_err() by ERR()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] libsepol: replace log_err() by ERR()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] checkpolicy/dismod: misc improvements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] checkpolicy: add option to skip checking neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] libsepol: expand: skip invalid cat
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libsepol: validate: reject XEN policy with xperm rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] libsepol: validate: check low category is not bigger than high
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] libsepol: validate old style range trans classes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] libsepol: validate some object contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] libsepol: dump non-mls validatetrans rules as such
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] checkpolicy: only set declared permission bits for wildcards
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] checkpolicy: reject condition with bool and tunable in expression
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] checkpolicy: drop unused token CLONE
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: make header files self-including
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: make header files self-including
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 4/9] block: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/9] block: use new capable_any functionality
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RFC PATCH v2] fs/xattr: add *at family syscalls
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 6/9] fs: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 0/9] Introduce capable_any()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 5/9] drivers: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 7/9] kernel: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 9/9] net: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 8/9] bpf: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 4/9] block: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 2/9] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 3/9] capability: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] security: keys: perform capable check only on privileged operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: make header files self-including
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: deprecated fs ocon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: keep context struct members in sync
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] python/chcat: Improve man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] block: use block_admin_capable() for Persistent Reservations
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] capability: Introduce CAP_BLOCK_ADMIN
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not leave dangling pointer behind
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: small cleanups in selinux_audit_rule_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] selinux: declare read-only data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/6] selinux: retain const qualifier on string literal in avtab_hash_eval()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/6] selinux: drop return at end of void function avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/6] selinux: avc: drop unused function avc_disable()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] selinux: adjust typos in comments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not leave dangling pointer behind
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: more Makefile tweaks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove avc_disable() as it is no longer used
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: more Makefile tweaks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: remove avc_disable() as it is no longer used
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: small cleanups in selinux_audit_rule_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove avc_disable() as it is no longer used
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: more Makefile tweaks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next 1/2] Change notify_change() to take struct path argument
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH -next 2/2] lsm: Change inode_setattr hook to take struct path argument
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH -next 0/2] lsm: Change inode_setattr() to take struct
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH -next 1/2] fs: Change notify_change() to take struct path argument
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH] selinux: make cleanup on error consistent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] selinux: make cleanup on error consistent
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/4] python/chcat: Improve man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 4/4] python/audit2allow: Remove unused "debug" option
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 3/4] python/semanage: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 1/4] python/chcat: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 2/4] python/audit2allow: Add missing options to man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 0/4] python: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 3/3] python/semanage: Improve man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] python/audit2allow: Add missing options to man page
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] python/chcat: Improve man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy/dispol: add output functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] python/semanage: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] python/chcat: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] python/audit2allow: Add missing options to man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 0/3] python: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] checkpolicy/dismod: misc improvements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy/dispol: add output functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- policy for FFI
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v9 10/11] SELinux: Add selfattr hooks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v9 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [GIT PULL] SELinux patches for v6.4
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH LSM v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH] libselinux: set CFLAGS for pip installation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 5/6] libsepol: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] checkpolicy: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 6/6] libsemanage/tests: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/6] checkpolicy: update cond_expr_t struct member name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/6] libsepol/tests: rename bool indentifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/6] selinux: retain const qualifier on string literal in avtab_hash_eval()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/6] selinux: declare read-only data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/6] selinux: drop return at end of void function avc_insert()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/6] selinux: avc: drop unused function avc_disable()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/6] selinux: adjust typos in comments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/6] selinux: do not leave dangling pointer behind
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- [TESTSUITE PATCH] README.md: update dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/cil: Fix class permission verification in CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeed@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeed@xxxxxxxxxx>
- Re: [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: [PATCH v2] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 8/9 v3] secilc/test: Add deny rule tests
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 9/9 v3] secilc/docs: Add deny rule to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/9 v3] libsepol/cil: Process deny rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 7/9 v3] secilc/secil2tree: Add option to write CIL AST after post processing
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/9 v3] libsepol: Export the cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/9 v3] libsepol/cil: Add cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/9 v3] libsepol/cil: Add cil_tree_node_remove function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/9 v3] libsepol/cil: Parse and add deny rule to AST, but do not process
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/9 v3] libsepol/cil: Add cil_list_is_empty macro
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/9 v3] Add CIL Deny Rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 5/6] secilc/docs: Add notself and other keywords to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/6] secilc/test: Add notself and other tests
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/6] libsepol/cil: Add notself and other support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/6] libsepol: update CIL generation for trivial not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/6] libsepol/cil: Do not call ebitmap_init twice for an ebitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/6] libsepol: Changes to ebitmap.h to fix compiler warnings
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/6] Add support for notself and other to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: portcon tcp 80 change type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: portcon tcp 80 change type
- From: Etienne Champetier <champetier.etienne@xxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: portcon tcp 80 change type
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- portcon tcp 80 change type
- From: Etienne Champetier <champetier.etienne@xxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: stop returning node from avc_insert
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: stop returning node from avc_insert
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: sesearch --neverallow
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: sesearch --neverallow
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] make avc audit line only have one space
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: fix memory leak in semanage_user_roles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] make avc audit line only have one space
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: sesearch --neverallow
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sesearch --neverallow
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: sesearch --neverallow
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sesearch --neverallow
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] checkpolicy/dismod: misc improvements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] checkpolicy/dispol: add output functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: James Carter <jwcart2@xxxxxxxxx>
- Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking #adding (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- sesearch --neverallow
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 6/6] libsepol: update CIL generation for trivial not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 5/6] libsepol/tests: add tests for minus self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 4/6] libsepol/tests: add tests for not self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 3/6] checkpolicy: add not-self neverallow support
- From: James Carter <jwcart2@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]