SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy/dispol: add output functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] python/semanage: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/3] python/chcat: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/3] python/audit2allow: Add missing options to man page
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 0/3] python: Improve man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v10 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: set CFLAGS for pip installation
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] checkpolicy/dismod: misc improvements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] checkpolicy/dispol: add output functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- policy for FFI
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v9 10/11] SELinux: Add selfattr hooks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v9 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: rename struct member
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [GIT PULL] SELinux patches for v6.4
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH LSM v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH] libselinux: set CFLAGS for pip installation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 5/6] libsepol: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] checkpolicy: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 6/6] libsemanage/tests: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/6] checkpolicy: update cond_expr_t struct member name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/6] libsepol/tests: rename bool indentifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH RESEND] libsemanage: fix memory leak in semanage_user_roles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/6] selinux: retain const qualifier on string literal in avtab_hash_eval()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/6] selinux: declare read-only data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/6] selinux: drop return at end of void function avc_insert()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/6] selinux: avc: drop unused function avc_disable()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/6] selinux: adjust typos in comments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/6] selinux: do not leave dangling pointer behind
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] README.md: update dependencies
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: fix memory leak in semanage_user_roles
- From: James Carter <jwcart2@xxxxxxxxx>
- [TESTSUITE PATCH] README.md: update dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/cil: Fix class permission verification in CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeed@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeed@xxxxxxxxxx>
- Re: [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeedm@xxxxxxxxxx>
- Re: [PATCH v2] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 8/9 v3] secilc/test: Add deny rule tests
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 9/9 v3] secilc/docs: Add deny rule to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/9 v3] libsepol/cil: Process deny rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 7/9 v3] secilc/secil2tree: Add option to write CIL AST after post processing
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/9 v3] libsepol: Export the cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/9 v3] libsepol/cil: Add cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/9 v3] libsepol/cil: Add cil_tree_node_remove function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/9 v3] libsepol/cil: Parse and add deny rule to AST, but do not process
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/9 v3] libsepol/cil: Add cil_list_is_empty macro
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/9 v3] Add CIL Deny Rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 5/6] secilc/docs: Add notself and other keywords to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/6] secilc/test: Add notself and other tests
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/6] libsepol/cil: Add notself and other support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/6] libsepol: update CIL generation for trivial not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/6] libsepol/cil: Do not call ebitmap_init twice for an ebitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/6] libsepol: Changes to ebitmap.h to fix compiler warnings
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/6] Add support for notself and other to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: ensure av_permissions.h is built when needed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: portcon tcp 80 change type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: portcon tcp 80 change type
- From: Etienne Champetier <champetier.etienne@xxxxxxxxx>
- Re: [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: portcon tcp 80 change type
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: fix Makefile dependencies of flask.h
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- portcon tcp 80 change type
- From: Etienne Champetier <champetier.etienne@xxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: stop returning node from avc_insert
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: stop returning node from avc_insert
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: sesearch --neverallow
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: sesearch --neverallow
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] make avc audit line only have one space
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsemanage: fix memory leak in semanage_user_roles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] make avc audit line only have one space
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: sesearch --neverallow
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sesearch --neverallow
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: sesearch --neverallow
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sesearch --neverallow
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] checkpolicy/dismod: misc improvements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] checkpolicy/dispol: add output functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Possible bug in policy compilation
- From: James Carter <jwcart2@xxxxxxxxx>
- Possible bug in policy compilation
- From: "Jonathan Strauss" <john@xxxxxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: "Linux regression tracking #adding (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- sesearch --neverallow
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 6/6] libsepol: update CIL generation for trivial not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 5/6] libsepol/tests: add tests for minus self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 4/6] libsepol/tests: add tests for not self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 3/6] checkpolicy: add not-self neverallow support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 1/6] libsepol: Add not self support for neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Potential regression/bug in net/mlx5 driver
- From: Saeed Mahameed <saeed@xxxxxxxxxx>
- Re: selinux: Adjust implementation of security_get_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v9 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Potential regression/bug in net/mlx5 driver
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: Adjust implementation of security_get_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Adjust implementation of security_get_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Adjust implementation of security_get_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: clean up dead code after removing runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up dead code after removing runtime disable
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH v2] selinux: clean up dead code after removing runtime disable
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: clean up dead code after removing runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: clean up dead code after removing runtime disable
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Johannes Segitz <jsegitz@xxxxxxxx>
- Re: [PATCH 2/3] libselinux: improve performance with pcre matches
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] selinux: update the file list in MAINTAINERS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: update the file list in MAINTAINERS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 2/6] libsepol/cil: Add notself and minusself support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 2/6] libsepol/cil: Add notself and minusself support to CIL
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling question
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH userspace] scripts/ci: install rdma-core-devel for selinux-testsuite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: cgroup2 labeling question
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH userspace] scripts/ci: install rdma-core-devel for selinux-testsuite
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH userspace] libsemanage: include more parameters in the module checksum
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace] scripts/ci: install rdma-core-devel for selinux-testsuite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- cgroup2 labeling question
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the runtime disable functionality
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: remove the runtime disable functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] libsemanage: include more parameters in the module checksum
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: remove the 'checkreqprot' functionality
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/atsecure: avoid running bash under test domains
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 10/11] SELinux: Add selfattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: stop passing selinux_state pointers and their offspring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/atsecure: avoid running bash under test domains
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH v2] selinux: cache access vector decisions in the inode security blob
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH net-next v2] scm: fix MSG_CTRUNC setting condition for SO_PASSSEC
- From: Aleksandr Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2] scm: fix MSG_CTRUNC setting condition for SO_PASSSEC
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] defconfig: add FAT and GRE config options
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] selinux: cache access vector decisions in the inode security blob
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] defconfig: add FAT and GRE config options
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [RFC PATCH 8/9 v2] secilc/test: Add deny rule tests
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 9/9 v2] secilc/docs: Add deny rule to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 4/9 v2] libsepol/cil: Process deny rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 7/9 v2] secilc/secil2tree: Add option to write CIL AST after post processing
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 6/9 v2] libsepol: Export the cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 5/9 v2] libsepol/cil: Add cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 3/9 v2] libsepol/cil: Add cil_tree_node_remove function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 1/9 v2] libsepol/cil: Parse and add deny rule to AST, but do not process
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 2/9 v2] libsepol/cil: Add cil_list_is_empty macro
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 0/9 v2] Add CIL Deny Rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace] libsemanage: include more parameters in the module checksum
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: uninline unlikely parts of avc_has_perm_noaudit()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/3] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v3 1/3] libselinux: migrating hashtab from policycoreutils
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v3 0/3] Improve efficiency of detecting duplicate in libselinux
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v3 2/3] libselinux: adapting hashtab to libselinux
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: uninline unlikely parts of avc_has_perm_noaudit()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: uninline unlikely parts of avc_has_perm_noaudit()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: uninline unlikely parts of avc_has_perm_noaudit()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 16/28] security: Introduce file_post_open hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/3] Infiniband test fixes/improvements
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/28] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 24/28] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 25/28] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 16/28] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Georgia Garcia <georgia.garcia@xxxxxxxxxxxxx>
- Re: [PATCH v38 01/39] LSM: Identify modules by more than name
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 01/39] LSM: Identify modules by more than name
- From: Georgia Garcia <georgia.garcia@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/3] Infiniband test fixes/improvements
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 3/3] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/file: make the SIGIO tests work with CONFIG_LEGACY_TIOCSTI=n
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 3/3] tests/infiniband*: simplify test activation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/3] Infiniband test fixes/improvements
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/file: make the SIGIO tests work with CONFIG_LEGACY_TIOCSTI=n
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/6] libsepol/cil: Add notself and other support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 6/6] libsepol: update CIL generation for trivial not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 5/6] libsepol/tests: add tests for minus self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 4/6] libsepol/tests: add tests for not self neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 3/6] checkpolicy: add not-self neverallow support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 2/6] libsepol/cil: Add notself and minusself support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v4 1/6] libsepol: Add not self support for neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite] tests/file: make the SIGIO tests work with CONFIG_LEGACY_TIOCSTI=n
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite 3/3] tests/infiniband*: simplify test activation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/3] Infiniband test fixes/improvements
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 3/3] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [PATCH v2 3/3] libselinux: performance optimization for duplicate detection
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: What's wrong with this usage of semanage fcontext?
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.5 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: What's wrong with this usage of semanage fcontext?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- What's wrong with this usage of semanage fcontext?
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [UTIL-LINUX PATCH] mount: add rootcontext=@target
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Joseph Qi <joseph.qi@xxxxxxxxxxxxxxxxx>
- SELinux pull request for Linux v6.3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] security: Remove security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 3/3] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v2 2/3] libselinux: adapting hashtab to libselinux
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v2 1/3] libselinux: migrating hashtab from policycoreutils
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH v2 0/3] Improve efficiency of detecting duplicate in libselinux
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow to opt-out from skipping kernel sockets in sock_has_perm()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow to opt-out from skipping kernel sockets in sock_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: allow to opt-out from skipping kernel sockets in sock_has_perm()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: migrating hashtab from policycoreutils
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- ANN: SELinux userspace 3.5-rc3 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: getcon.3: add note about PID races
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: add getpidprevcon
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: drop obsolete optimization flag
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: performance optimization for duplicate detection
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: migrating hashtab from policycoreutils
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 9/9] secilc/docs: Add deny rule to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 8/9] secilc/test: Add a deny rule test
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libselinux: performance optimization for duplicate detection
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH 1/2] libselinux: migrating hashtab from policycoreutils
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- [PATCH 0/2] Improve efficiency of detecting duplicate in libselinux
- From: wanghuizhao <wanghuizhao1@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] libsepol/cil: Process deny rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/9] libsepol/cil: Add cil_tree_remove_node function
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: ANN: SETools 4.4.1
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: ANN: SETools 4.4.1
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- ANN: SETools 4.4.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Update translations
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: Cache conditional rule queries
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 9/9] secilc/docs: Add deny rule to CIL documentation
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 8/9] secilc/test: Add a deny rule test
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/9] libsepol/cil: Process deny rules
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/9] libsepol/cil: Add cil_tree_remove_node function
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] ci: bump to python 3.11 in GitHub Actions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: Cache conditional rule queries
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] mcstrans: preserve runtime directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [PATCH] mcstrans: preserve runtime directory
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] libselinux: add getpidprevcon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] libselinux: getcon.3: add note about PID races
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: restore: use fixed sized integer for hash index
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: restore: misc tweaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: drop obsolete optimization flag
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] python/sepolicy: Cache conditional rule queries
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Looking at profile data once again - avc lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Looking at profile data once again - avc lookup
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] Update translations
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 3/6] mm: replace vma->vm_flags direct modifications with modifier calls
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 6/6] mm: export dump_mm()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 5/6] mm: introduce mod_vm_flags_nolock and use it in untrack_pfn
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 3/6] mm: replace vma->vm_flags direct modifications with modifier calls
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 2/6] mm: replace VM_LOCKED_CLEAR_MASK with VM_LOCKED_MASK
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH net-next v6 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 3/4] binder: Add flags to relinquish ownership of fds
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] binder: Add flags to relinquish ownership of fds
- From: Carlos Llamas <cmllamas@xxxxxxxxxx>
- Re: [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 5/6] mm: introduce mod_vm_flags_nolock and use it in untrack_pfn
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 3/6] mm: replace vma->vm_flags direct modifications with modifier calls
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: selinux-testsuite broken pipe noise
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite broken pipe noise
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 6/6] mm: export dump_mm()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 5/6] mm: introduce mod_vm_flags_nolock and use it in untrack_pfn
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 3/6] mm: replace vma->vm_flags direct modifications with modifier calls
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: selinux-testsuite broken pipe noise
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] mm: replace VM_LOCKED_CLEAR_MASK with VM_LOCKED_MASK
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH v2 5/6] mm: introduce mod_vm_flags_nolock and use it in untrack_pfn
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 3/6] mm: replace vma->vm_flags direct modifications with modifier calls
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 4/6] mm: replace vma->vm_flags indirect modification in ksm_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 2/6] mm: replace VM_LOCKED_CLEAR_MASK with VM_LOCKED_MASK
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 6/6] mm: export dump_mm()
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 0/6] introduce vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/6] mm: introduce vma->vm_flags modifier functions
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] binder: Add flags to relinquish ownership of fds
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] python/sepolicy: Cache conditional rule queries
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- selinux-testsuite broken pipe noise
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH net-next v6 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH net-next v6 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH net-next v6 2/2] selftests/net: Cover the IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v6 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v6 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v5 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v5 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH net-next v5 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v5 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH net-next v5 2/2] selftests/net: Cover the IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v5 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v5 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] security: binder: Add binder object flags to selinux_binder_transfer_file
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 4/4] security: binder: Add binder object flags to selinux_binder_transfer_file
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] security: binder: Add binder object flags to selinux_binder_transfer_file
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH v2 3/4] binder: Add flags to relinquish ownership of fds
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH v2 2/4] dmabuf: Add cgroup charge transfer function
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH v2 1/4] memcg: Track exported dma-buffers
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH v2 0/4] Track exported dma-buffers with memcg
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH net-next v4 2/2] selftests/net: Cover the IP_LOCAL_PORT_RANGE socket option
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- [PATCH net-next v4 2/2] selftests/net: Cover the IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v4 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v4 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: use a static match_data if single threaded
- From: Carlo Marcelo Arenas Belón <carenas@xxxxxxxxx>
- [PATCH 2/3] libselinux: improve performance with pcre matches
- From: Carlo Marcelo Arenas Belón <carenas@xxxxxxxxx>
- [PATCH 1/3] scripts: respect an initial LD_LIBRARY_PATH with env_use_destdir
- From: Carlo Marcelo Arenas Belón <carenas@xxxxxxxxx>
- [PATCH 0/3] improve performance of pcre matches
- From: Carlo Marcelo Arenas Belón <carenas@xxxxxxxxx>
- [RFC PATCH] libselinux: improve performance with pcre matches
- From: Carlo Marcelo Arenas Belón <carenas@xxxxxxxxx>
- Re: [PATCH net-next v3 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit North Americ (LSS-NA) CfP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH net-next v3 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Neal Cardwell <ncardwell@xxxxxxxxxx>
- [PATCH net-next v3 2/2] selftests/net: Cover the IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v3 1/2] inet: Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net-next v3 0/2] Add IP_LOCAL_PORT_RANGE socket option
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH v2] policy: handle files_list_pids() renaming in Refpolicy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] mcstrans: preserve runtime directory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [TESTSUITE PATCH v2] policy: handle files_list_pids() renaming in Refpolicy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: David Ahern <dsahern@xxxxxxxxx>
- [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.5-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] ci: bump to python 3.11 in GitHub Actions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]