SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] mcstrans: preserve runtime directory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [TESTSUITE PATCH v2] policy: handle files_list_pids() renaming in Refpolicy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: David Ahern <dsahern@xxxxxxxxx>
- [TESTSUITE PATCH] policy: drop usage of files_list_pids()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.5-rc2 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] ci: bump to python 3.11 in GitHub Actions
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 RESEND] libselinux: Workaround for heap overhead of pcre
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolicy: add missing booleans to man pages
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net-next 06/10] cipso_ipv4: use iph_set_totlen in skbuff_setattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/filesystem: use native quota support for ext4
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/keys: remove extraneous zero byte from the DH prime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH v2 RESEND] libselinux: Workaround for heap overhead of pcre
- From: Inseob Kim <inseob@xxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH 1/2] libsepol: do not write empty class definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: Make generated boolean descriptions translatable
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: reject attributes in type av rules for kernel policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: fix a spelling mistake
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: fix potential NULL reference in load_checks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] checkpolicy: add simple round-trip test
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: do not write empty class definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: add getpidprevcon
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: add getpidprevcon
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: add getpidprevcon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/filesystem: use native quota support for ext4
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: add getpidprevcon
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] python/sepolicy: add missing booleans to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- Re: [PATCH 0/4] Track exported dma-buffers with memcg
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/4] Track exported dma-buffers with memcg
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH 4/4] security: binder: Add transfer_charge SElinux hook
- From: "T.J. Mercier" <tjmercier@xxxxxxxxxx>
- [PATCH testsuite] tests/keys: remove extraneous zero byte from the DH prime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libselinux: add getpidprevcon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] python/sepolicy: add missing booleans to man pages
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 1/1] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: do not write empty class definitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: add simple round-trip test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Correct misc typos
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] sepolicy: Make generated boolean descriptions translatable
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: reject attributes in type av rules for kernel policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: fix a spelling mistake
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] sepolicy: Make generated boolean descriptions translatable
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2] libselinux: Workaround for heap overhead of pcre
- From: Inseob Kim <inseob@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- ANN: SELinux userspace 3.5-rc1 release
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 2/2] python: Ignore installed when installing to DESTDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: Ignore installed when installing python bindings to DESTDIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: Ignore installed when installing python bindings to DESTDIR
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/2] python: Ignore installed when installing to DESTDIR
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Ignore installed when installing python bindings to DESTDIR
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH] libselinux: Workaround for heap overhead of pcre
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] libselinux: Workaround for heap overhead of pcre
- From: Inseob Kim <inseob@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: reject attributes in type av rules for kernel policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Workaround for heap overhead of pcre
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 1/2] audit: introduce a struct to represent an audit timestamp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND 2/2] selinux: provide matching audit timestamp in the AVC trace event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] audit: introduce a struct to represent an audit timestamp
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH RESEND 2/2] selinux: provide matching audit timestamp in the AVC trace event
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH RESEND 1/2] audit: introduce a struct to represent an audit timestamp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH RESEND 0/2] Provide matching audit timestamp in the SELinux AVC trace event
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] audit: introduce a struct to represent an audit timestamp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Provide matching audit timestamp in the SELinux AVC trace event
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH v2 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH v2 0/2] lsm: introduce and use security_mptcp_add_subflow()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] libselinux: Workaround for heap overhead of pcre
- From: Inseob Kim <inseob@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] Use `pip install` instead of `setup.py install`
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sepolicy: Switch main selection menu to GtkPopover
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux:add check for malloc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: Call os.makedirs() with exist_ok=True
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: Improve error message for type bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: fix some memory issues in db_init
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sepolicy: Switch main selection menu to GtkPopover
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: Call os.makedirs() with exist_ok=True
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 0/9] Add CIL Deny Rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 0/9] Add CIL Deny Rule
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- ANN: a new release of The SELinux Notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] notebook: make use of "allowlist" instead of "whitelist"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] notebook: fix broken sepgsql.googlecode.com URL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] policycoreutils: fix potential NULL reference in load_checks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: fix potential memory leak in common_copy_callback
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: fix potential NULL reference and memory leak in audit2why
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] sepolicy: fix a spelling mistake
- From: zhaoshuang <izhaoshuang@xxxxxxx>
- [PATCH] sepolicy: fix a spelling mistake
- From: zhaoshuang <izhaoshuang@xxxxxxx>
- Re: memory leak in inet_create
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH] libselinux:add check for malloc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: fix a spelling mistake
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: memory leak in inet_create
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: memory leak in inet_create
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: memory leak in inet_create
- From: Willy Tarreau <w@xxxxxx>
- [PATCH] sepolicy: fix a spelling mistake
- From: kkz <izhaoshuang@xxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: Improve error message for type bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 5/9] libsepol/cil: Add cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 8/9] secilc/test: Add a deny rule test
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 4/9] libsepol/cil: Process deny rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 7/9] secilc/secil2tree: Add option to write CIL AST after post processing
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 3/9] libsepol/cil: Add cil_tree_remove_node function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 9/9] secilc/docs: Add deny rule to CIL documentation
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 6/9] libsepol: Export the cil_write_post_ast function
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 1/9] libsepol/cil: Parse and add deny rule to AST, but do not process
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 2/9] libsepol/cil: Add cil_list_is_empty macro
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 0/9] Add CIL Deny Rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: Implement mptcp_add_subflow hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] lsm: introduce and use security_mptcp_add_subflow()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH 2/2] selinux: Implement mptcp_add_subflow hook
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH 1/2] security, lsm: Introduce security_mptcp_add_subflow()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH 0/2] lsm: introduce and use security_mptcp_add_subflow()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux patches for v6.2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 1/1] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1][RFC] SELINUX: Remove obsolete deferred inode security
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v6.2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] sepolicy: Call os.makedirs() with exist_ok=True
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH testsuite] policy: allow user_namespace::create where appropriate
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/4] Bump Fedora versions in CI
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy: allow user_namespace::create where appropriate
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: BUG: selinux-testsuite failures in tests/cap_userns
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] sepolgen: Update refparser to handle xperm
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- BUG: selinux-testsuite failures in tests/cap_userns
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] policy: allow user_namespace::create where appropriate
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] sepolicy: Switch main selection menu to GtkPopover
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 2/2] python: Fix detection of sepolicy.glade location
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH testsuite 2/4] tests: use correct type for context string variables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/4] tests: adapt style to new perltidy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 3/4] tests/execshare: remove special cases for arcane architectures
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 4/4] ci: bump Fedora versions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/4] Bump Fedora versions in CI
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH security-next] selinux: use sysfs_emit() to instead of scnprintf()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH security-next] selinux: use sysfs_emit() to instead of scnprintf()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Intent to release SELinux userspace 3.5-rc1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Intent to release SELinux userspace 3.5-rc1
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH 2/3] libsepol: fix potential memory leak in common_copy_callback
- From: Jie Lu <lujie54@xxxxxxxxxx>
- [PATCH 3/3] policycoreutils: fix potential NULL reference in load_checks
- From: Jie Lu <lujie54@xxxxxxxxxx>
- [PATCH 1/3] libselinux: fix potential NULL reference and memory leak in audit2why
- From: Jie Lu <lujie54@xxxxxxxxxx>
- [PATCH security-next] selinux: use sysfs_emit() to instead of scnprintf()
- From: <ye.xingchen@xxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Broken SELinux/LSM labeling with MPTCP and accept(2)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ANN/RFC: SELinux Reference Policy 3 pre-alpha
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] Use `pip install` instead of `setup.py install`
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] Use `pip install` instead of `setup.py install`
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] Use `pip install` instead of `setup.py install`
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux:add check for malloc
- From: Jie Lu <lujie54@xxxxxxxxxx>
- semanage export does not distinguish between --modify and --add
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [RFC PATCH] Use `pip install` instead of `setup.py install`
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH v4 2/6] libsepol/cil: Add notself and minusself support to CIL
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 5/6] libsepol/tests: add tests for minus self neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 6/6] libsepol: update CIL generation for trivial not-self rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 0/6] not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 3/6] checkpolicy: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 1/6] libsepol: Add not self support for neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v4 4/6] libsepol/tests: add tests for not self neverallow rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsemanage: Use more conscious language
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] checkpolicy: Improve error message for type bounds
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: secilc genfscon parsing error
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: secilc genfscon parsing error
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: secilc genfscon parsing error
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel Panic while accessing avtab_search_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: secilc genfscon parsing error
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: secilc genfscon parsing error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] Use `pip install` instead of `setup.py install`
- From: James Carter <jwcart2@xxxxxxxxx>
- secilc genfscon parsing error
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: fix some memory issues in db_init
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Fix E275 missing whitespace after keyword
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 3/3] libselinux: filter arguments with path separators
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Kernel Panic while accessing avtab_search_node
- From: "Jaihind Yadav (QUIC)" <quic_jaihindy@xxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Kernel Panic while accessing avtab_search_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] Use `pip install` instead of `setup.py install`
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Kernel Panic while accessing avtab_search_node
- From: "Jaihind Yadav (QUIC)" <quic_jaihindy@xxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] libselinux: fix some memory issues in db_init
- From: Jie Lu <lujie54@xxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] libselinux: filter arguments with path separators
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/tests: use more strict compiler options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: fix memory leaks on the audit2why module init
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: drop set but not used internal variable
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: simplify string copying
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] python: Fix typo in audit2allow.1 example
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix some memory issues in db_init
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux: fix some memory issues in db_init
- From: Jie Lu <lujie54@xxxxxxxxxx>
- Re: [PATCH v3 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Fix E275 missing whitespace after keyword
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] Fix E275 missing whitespace after keyword
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/3] python/sepolicy: Simplify generation of man pages
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v3 2/3] python/sepolicy: Use distro module to get os version
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v3 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/6] libsepol: rename struct member
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol/tests: add tests for neverallow assertions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/tests: use more strict compiler options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] python/sepolicy: Simplify generation of man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: fix memory leaks on the audit2why module init
- From: James Carter <jwcart2@xxxxxxxxx>
- New SELinux Notebook release?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 2/3] python/sepolicy: Use distro module to get os version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 3/3] python/sepolicy: Simplify generation of man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: fix memory leaks on the audit2why module init
- From: Jie Lu <lujie54@xxxxxxxxxx>
- [PATCH] libselinux: fix memory leaks on the audit2why module init
- From: Jie Lu <lujie54@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [RFC PATCH 4/6] checkpolicy: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 6/6] libsemanage/tests: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 5/6] libsepol: rename bool identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/6] libsepol: rename struct member
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/6] libsepol/tests: rename bool indentifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/6] checkpolicy: update cond_expr_t struct member name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol/tests: add tests for neverallow assertions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/tests: use more strict compiler options
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 3/3] libselinux: filter arguments with path separators
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
- From: Konstantin Meskhidze <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libselinux: filter arguments with path separators
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] libselinux: bail out on path truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop set but not used internal variable
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: simplify string copying
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 0/5] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: bail out on path truncations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux: drop set but not used internal variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: simplify string copying
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] checkpolicy: simplify string copying
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: simplify string copying
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: filter arguments with path separators
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: make use of strndup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: bail out on path truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] python: Fix typo in audit2allow.1 example
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Ignore missing directories when -i is used
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Harden tools against "rogue" modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python: Fix typo in audit2allow.1 example
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v1 2/2] selinux: add support for the io_uring setup permission
- From: Gil Cukierman <cukie@xxxxxxxxxx>
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Gil Cukierman <cukie@xxxxxxxxxx>
- Re: [PATCH] libselinux: Ignore missing directories when -i is used
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Constraints of policy identifiers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Constraints of policy identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Security context of root inode of in-memory filesystems
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Harden tools against "rogue" modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5 v3] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5 v3] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v3] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v3] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/5 v2] python: Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 4/5 v2] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5 v2] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5 v2] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v2] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v2] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v2] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- ANN: Reference Policy 2.20221101
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Ignore missing directories when -i is used
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove dependency on the Python module distutils
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: Adjust sepolgen grammar to support allowxperm, et. al.
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 135/530] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] python: Do not query the local database if the fcontext is non-local
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] gui: Fix export file chooser dialog
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4.14 080/210] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5.10 091/390] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 057/255] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 069/229] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 063/159] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH] libselinux: ignore invalid class name lookup
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.19 176/717] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] python: Hide error message when modifying non-local fcontext
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] python: Hide error message when modifying non-local fcontext
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python: Do not query the local database if the fcontext is non-local
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 6.0 202/862] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH] python: Harden tools against "rogue" modules
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH v5 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gui: Fix export file chooser dialog
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] docs: Add GPG fingerprints
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: Add GPG fingerprints
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] sandbox: Use temporary directory for XDG_RUNTIME_DIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 01/39] LSM: Identify modules by more than name
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 20/39] LSM: Specify which LSM to display
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 09/39] LSM: Add the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 08/39] LSM: Infrastructure management of the sock security
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: restore error on context rule conflicts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [DPKG PATCH] selinux: install log callback to filter messages
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tests/secretmem: add test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [DPKG PATCH] selinux: install log callback to filter messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] gui: Fix export file chooser dialog
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] tests/secretmem: add test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: systemd socket activation selinux context pr review
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- systemd socket activation selinux context pr review
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: SO_PEERSEC protections in sk_getsockopt()?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: SO_PEERSEC protections in sk_getsockopt()?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- RE: [PATCH] Fix race condition when exec'ing setuid files
- From: David Laight <David.Laight@xxxxxxxxxx>
- unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Fix race condition when exec'ing setuid files
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] Fix race condition when exec'ing setuid files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- RE: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/2] exec: Remove LSM_UNSAFE_SHARE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: add Paul Moore's GPG fingerprint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] secilc/doc: classmap is also allowed in permissionx
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] docs: add Paul Moore's GPG fingerprint
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux patches for v6.1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: update the README.md with a basic SELinux description
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] docs: provide a top level LICENSE file
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- bug report: semodule doesn't reject policices with duplicate fc's
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] secilc/doc: classmap is also allowed in permissionx
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [PATCH v3 10/29] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: James Carter <jwcart2@xxxxxxxxx>
- GREETIPNGS REAR BELOVED
- From: Mrs Aisha Gaddafi <aishagaddafiaisha20@xxxxxxxxx>
- Re: [PATCH v2 11/30] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 38/39] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 33/39] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 35/39] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 34/39] audit: multiple subject lsm values for netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 28/39] LSM: security_secid_to_secctx module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 31/39] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]