SELinux - Date Index
[Prev Page][Next Page]
- [PATCH] selinux: read and write sid under lock
- From: Edward Adam Davis <eadavis@xxxxxx>
- Re: [PATCH v2] libsemanage: create semanage_basename to ensure posix compliance
- From: "Rahul Sandhu" <nvraxn@xxxxxxxxx>
- SeLinux, Heal thyself.
- From: Darvond <xanthinzarda@xxxxxxxxx>
- Re: [PATCH v2 3/6] LSM: security_lsmblob_to_secctx module selection
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v6 bpf-next 2/2] selftests/bpf: Add a kernel flag test for LSM bpf hook
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 bpf-next 1/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 bpf-next 0/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [syzbot] [selinux?] KCSAN: data-race in selinux_socket_post_create / selinux_socket_sock_rcv_skb
- From: syzbot <syzbot+00c633585760c05507c3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 bpf-next 2/2] selftests/bpf: Add a kernel flag test for LSM bpf hook
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v16 1/3] lsm, selinux: Add setup_report permission to binder
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v5 bpf-next 2/2] selftests/bpf: Add a kernel flag test for LSM bpf hook
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 bpf-next 1/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 bpf-next 0/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard network interface names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Chain up tool resolving errors in install_policy.sh
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: warn on identical duplicate properties
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 1/6] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Audit: Records for multiple security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] Audit: multiple subject lsm values for netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] LSM: security_lsmblob_to_secctx module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: Chain up tool resolving errors in install_policy.sh
- From: Tim Schumacher <tim.schumacher1@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.8.1
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH 0/2] mm: introduce anon_vma flags, reduce kernel allocs
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] mm: introduce anon_vma flags, reduce kernel allocs
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [RFC PATCH 1/2] mm: introduce anon_vma flags and use wrapper functions
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- [RFC PATCH 2/2] mm/madvise: utilise anon_vma unfaulted flag on guard region install
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- [RFC PATCH 0/2] mm: introduce anon_vma flags, reduce kernel allocs
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 1/2] security: Propagate caller information in bpf hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v4 bpf-next 2/2] selftests/bpf: Add is_kernel parameter to LSM/bpf test programs
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 bpf-next 1/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 bpf-next 0/2] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate caller information in bpf hooks
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH 1/1] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1 v3] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 3/3] binder: generic netlink binder_features flag
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v16 2/3] binder: report txn errors via generic netlink
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v16 1/3] lsm, selinux: Add setup_report permission to binder
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v16 0/3] binder: report txn errors via generic netlink
- From: Li Li <dualli@xxxxxxxxxxxx>
- Re: [PATCH] libsemanage: improve performance of semanage store rebuild
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] selinux: support wildcard network interface names
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate caller information in bpf hooks
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH 1/1] security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] v2 security: Propagate caller information in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: Userspace: 3.8.1 release next week?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Userspace: 3.8.1 release next week?
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- [PATCH] Don't inject matchpathcon_filespec_add64() ifdef __x86_64__
- From: наб <nabijaczleweli@xxxxxxxxxxxxxxxxxx>
- [PATCH] Insert -I../../libselinux/include and -L../../libselinux/src into subprograms where needed
- From: наб <nabijaczleweli@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 2/3] binder: report txn errors via generic netlink
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add FILE__WATCH_MOUNTNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 2/3] binder: report txn errors via generic netlink
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux: add FILE__WATCH_MOUNTNS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for new permissions for loading files/data
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: add FILE__WATCH_MOUNTNS
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH] selinux: add FILE__WATCH_MOUNTNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 3/3] binder: generic netlink binder_features flag
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v15 2/3] binder: report txn errors via generic netlink
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v15 1/3] lsm, selinux: Add setup_report permission to binder
- From: Li Li <dualli@xxxxxxxxxxxx>
- [PATCH v15 0/3] binder: report txn errors via generic netlink
- From: Li Li <dualli@xxxxxxxxxxxx>
- Re: [PATCH 1/2] perf: Remove unnecessary parameter of security check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: support wildcard network interface names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: improve performance of semanage store rebuild
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] mcstrans: make use of context_to_str(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: introduce context_to_str(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: add restore option to modify user and role portions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] setfiles: add option to modify user and role portions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH 1/1] security: Propagate universal pointer data in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] security: Propagate universal pointer data in bpf hooks
- From: Blaise Boscaccy <bboscaccy@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH linux-next 1/2] perf: Remove unnecessary parameter of security check
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Lawrence <paullawrence@xxxxxxxxxx>
- [PATCH 3/3] checkpolicy: perform cleanup on error in define_filename_trans()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/3] checkpolicy: free left hand conditional expression on error
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/3] checkpolicy: abort on mismatched declarations
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsemanage: improve performance of semanage store rebuild
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] selinux: add FILE__WATCH_MOUNTNS
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH] checkpolicy: rework cleanup in define_te_avtab_xperms_helper()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add permission checks for loading other kinds of kernel files
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] libsemanage: create semanage_basename to ensure posix compliance
- From: Rahul Sandhu <nvraxn@xxxxxxxxx>
- Re: [PATCH] libsemanage: define basename macro for non-glibc systems
- From: "Rahul Sandhu" <nvraxn@xxxxxxxxx>
- Re: [PATCH] libsemanage: define basename macro for non-glibc systems
- From: "Rahul Sandhu" <nvraxn@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: define basename macro for non-glibc systems
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: define basename macro for non-glibc systems
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsemanage: define basename macro for non-glibc systems
- From: Rahul Sandhu <nvraxn@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: nfsd 6.14-rc1 __fh_verify NULL ptr deref
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: nfsd 6.14-rc1 __fh_verify NULL ptr deref
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: nfsd 6.14-rc1 __fh_verify NULL ptr deref
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: nfsd 6.14-rc1 __fh_verify NULL ptr deref
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- nfsd 6.14-rc1 __fh_verify NULL ptr deref
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20250213
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- [PATCH] libselinux: warn on identical duplicate properties
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH] Switch from bison name-prefix to api.prefix
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Support static-only builds
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Support static-only builds
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- Re: [PATCH v3] Support static-only builds
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- [PATCH v2] selinux: add permission checks for loading other kinds of kernel files
- From: kippndavis.work@xxxxxxx
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v5 1/3] fsnotify: add mount notification infrastructure
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v5 3/3] vfs: add notifications for mount attach and detach
- From: Jan Kara <jack@xxxxxxx>
- A duo of annoying SEalert checks.
- From: Darvond <xanthinzarda@xxxxxxxxx>
- Re: [PATCH v3 1/2] io_uring: refactor io_uring_allowed()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] io_uring: refactor io_uring_allowed()
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] io_uring: refactor io_uring_allowed()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add permission checks for loading other kinds of kernel files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: always check the file label in selinux_kernel_read_file()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/44] SELinux namespace support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/44] SELinux namespace support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: always check the file label in selinux_kernel_read_file()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/inet_socket: enable MPTCP if it's disabled via sysctl
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [PATCH testsuite] policy,tests: add tests for new permissions for loading files/data
- From: kippndavis.work@xxxxxxx
- [PATCH] selinux: add permission checks for loading other kinds of kernel files
- From: kippndavis.work@xxxxxxx
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix spelling error
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/4] libselinux: use local instead of global error buffer
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/4] libselinux: initialize regex arch string in a thread safe way
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/4] libselinux: limit fcontext regex path length
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/4] libselinux: constify global strings
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH testsuite] tests/inet_socket: enable MPTCP if it's disabled via sysctl
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH v5 0/3] mount notification
- From: Christian Brauner <brauner@xxxxxxxxxx>
- ANN: SELinux userspace 3.8
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v5 3/3] vfs: add notifications for mount attach and detach
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH v5 2/3] fanotify: notify on mount attach and detach
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH v5 1/3] fsnotify: add mount notification infrastructure
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH v5 0/3] mount notification
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: [RFC PATCH 0/2] Possible solution to possible regression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: ls from coreutils 9.6 doesn't show labels of some files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ls from coreutils 9.6 doesn't show labels of some files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- ls from coreutils 9.6 doesn't show labels of some files
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] Possible solution to possible regression
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] io_uring: refactor io_uring_allowed()
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 06/44] selinux: support per-task/cred selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Re: [RFC PATCH 05/44] netstate,selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: stsp <stsp2@xxxxxxxxx>
- Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check")
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 06/44] selinux: support per-task/cred selinux namespace
- Re: [RFC PATCH 05/44] netstate,selinux: create the selinux netlink socket per network namespace
- Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix spelling error
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Barry Song <21cnbao@xxxxxxxxx>
- 3.8 postponed to the next week
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [RFC PATCH 2/2] libsemanage: Set new restorecon handle before doing restorecon
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 1/2] libselinux: Close old selabel handle when setting a new one
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 0/2] Possible solution to possible regression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20250121
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] selinux/selinux-pr-20250121
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Possible regression by commit d96f27bf7cb9 ("libsemanage: Preserve file context and ownership in policy store")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH userspace] README: fix broken testsuite run status badge
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: Handle NULL return from selinux_inode in inode_security_rcu
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Handle NULL return from selinux_inode in inode_security_rcu
- From: Ingyu Jang <ingyujang25@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: fix typos
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: free nlmsg hashtable on error
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] CONTRIBUTING.md: Drop dependency and build instructions
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH userspace 1/4] ci: use Testing Farm for running the testsuite
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/5] libselinux: set errno in failure case
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH userspace] README: fix broken testsuite run status badge
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] libselinux: limit node depth while parsing compiled fcontexts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_DELNSID to nlmsg_write
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- ANN: SELinux userspace 3.8-rc4 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: 3.8-rc4 or 3.8 release next week
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: 3.8-rc4 or 3.8 release next week
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libselinux: set errno in failure case
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: map RTM_DELNSID to nlmsg_write
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace 1/4] ci: use Testing Farm for running the testsuite
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] CONTRIBUTING.md: Drop dependency and build instructions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: limit node depth while parsing compiled fcontexts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libselinux: set errno in failure case
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/5] checkpolicy: do not consume unmatched identifiers
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/5] checkpolicy: remove unneeded queue_head()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 5/5] checkpolicy: clear queue between parser passes
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/5] checkpolicy: check identifier before copying
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: avoid quadratic complexity for many regex specs validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] semanage: improve -e documentation and fix delete operation
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] CONTRIBUTING.md: Drop dependency and build instructions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Mikhail Ivanov <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux: limit node depth while parsing compiled fcontexts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_DELNSID to nlmsg_write
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH] libselinux: avoid quadratic complexity for many regex specs validation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RFC v2 19/22] selinux: validate symbols
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: 3.8-rc4 or 3.8 release next week
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: map RTM_DELNSID to nlmsg_write
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: fix typos
- From: James Carter <jwcart2@xxxxxxxxx>
- 3.8-rc4 or 3.8 release next week
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: free nlmsg hashtable on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semanage: improve -e documentation and fix delete operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libselinux/fuzz: handle inputs with trailing data
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: free nlmsg hashtable on error
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] semanage: improve -e documentation and fix delete operation
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH RFC v2 11/22] selinux: more strict policy parsing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 5/22] selinux: avoid nontransitive comparison
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 5/22] selinux: avoid nontransitive comparison
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 19/22] selinux: validate symbols
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 11/22] selinux: more strict policy parsing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 15/22] selinux: introduce ebitmap_highest_set_bit()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 12/22] selinux: check length fields in policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/22] selinux: use u16 for security classes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 9/22] selinux: make use of str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 8/22] selinux: avoid unnecessary indirection in struct level_datum
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 7/22] selinux: use known type instead of void pointer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 6/22] selinux: rename comparison functions for clarity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 5/22] selinux: avoid nontransitive comparison
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 3/22] selinux: align and constify functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 4/22] selinux: rework match_ipv6_addrmask()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 2/22] selinux: avoid using types indicating user space interaction
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/22] selinux: supply missing field initializers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20250107
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] selinux/selinux-pr-20250107
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/fuzz: readjust load_mmap() update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 44/44] selinux: fix inode initialization when no namespace is initialized
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: update max node depth
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: update max node depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: support wildcard network interface names
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 02/17] Makefile: use $(MAKE) to pass options
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 04/17] tests: port scripts to sh and please shellcheck
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 01/17] Fix typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 05/17] tests: enable strictness for perl scripts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 03/17] tools: quote command to prevent word splitting
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 00/17] testsuite: misc fixes and virtme-ng support
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 17/17] tests: drop headers from Makefile dependencies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 14/17] defconfig: enable CONFIG_NETFILTER_NETLINK_LOG
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 16/17] tests: fail on compiler warnings and enable Wextra
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 13/17] defconfig: enable CONFIG_XFRM_USER
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 12/17] tests/filesystem: improve fsnotify check and preload loop module
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 08/17] tests/notify: work with CONFIG_FANOTIFY disabled
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 11/17] tests/inet_socket: skip mptcp if not supported
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 10/17] tests/tun_tap: skip if not supported
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 06/17] Makefile: add PHONY targets
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 07/17] test: overlayfs related tweaks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 15/17] tests: test code tweaks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 09/17] tests/extended_socket_class: work with CONFIG_CRYPTO_USER_API disabled
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH linux-next 1/2] perf: Remove unnecessary parameter of security check
- From: Luo Gengkun <luogengkun@xxxxxxxxxxxxxxx>
- Re: [PATCH linux-next 2/2] perf: Return EACCESS when need perfmon capability
- From: Luo Gengkun <luogengkun@xxxxxxxxxxxxxxx>
- Re: [PATCH linux-next 2/2] perf: Return EACCESS when need perfmon capability
- From: James Clark <james.clark@xxxxxxxxxx>
- Re: [PATCH] libselinux/fuzz: readjust load_mmap() update
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] ioctl: add test for conditional xperms
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: Joe Nall <joenall@xxxxxxxxx>
- Re: [PATCH linux-next 1/2] perf: Remove unnecessary parameter of security check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: match extended permissions to their base permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 4/4] ci: fix pypy conditional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 3/4] ci: add missing libbz2-dev dependency
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/4] ci: use Testing Farm for running the testsuite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 2/4] ci: update Python versions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/4] ci: fix and migrate the testsuite part to Testing Farm
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [no subject]
- [RFC PATCH 44/44] selinux: fix inode initialization when no namespace is initialized
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 43/44] selinux: introduce a Kconfig option for SELinux namespaces
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 42/44] selinux: exempt creation of init SELinux namespace from limits
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 40/44] selinux: init inode from nearest initialized namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 41/44] selinux: allow userspace to detect non-init SELinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 39/44] selinux: defer inode init on current selinux state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 35/44] selinux: split cred_ssid_has_perm() into two cases
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 34/44] selinux: make open_perms namespace-aware
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 38/44] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 36/44] selinux: set initial SID context for init to "kernel" in global SID table
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 37/44] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 33/44] selinux: refactor selinux_state_create()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 32/44] selinux: limit selinux netlink notifications to init namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 30/44] selinux: add limits for SELinux namespaces
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 25/44] selinux: introduce selinux_state_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 28/44] selinux: convert xfrm and netlabel permission checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 31/44] selinux: fix namespace creation
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 29/44] selinux: switch selinux_lsm_setattr() checks to current namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 27/44] selinux: annotate process transition permission checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 23/44] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 24/44] selinux: convert additional checks to cred_ssid_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 26/44] selinux: annotate selinuxfs permission checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 21/44] selinux: add kerneldoc to new permission checking functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 22/44] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 11/44] selinux: wrap security server interfaces to use the global SID table
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 16/44] selinux: introduce cred_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 20/44] selinux: update bprm hooks for selinux namespaces
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 19/44] selinux: fix selinux_lsm_getattr() check
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 13/44] selinux: introduce cred_task_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 18/44] selinux: introduce task_obj_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 10/44] selinux: introduce a global SID table
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 15/44] selinux: introduce cred_self_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 17/44] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 12/44] selinux: update hook functions to use correct selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 14/44] selinux: introduce cred_has_extended_perms()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 01/44] selinux: restore passing of selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 07/44] selinux: introduce cred_selinux_state() and use it
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 09/44] selinuxfs: restrict write operations to the same selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 02/44] selinux: introduce current_selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 08/44] selinux: add a selinuxfs interface to unshare selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 06/44] selinux: support per-task/cred selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 03/44] selinux: support multiple selinuxfs instances
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 04/44] selinux: dynamically allocate selinux namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 05/44] netstate,selinux: create the selinux netlink socket per network namespace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 00/44] SELinux namespace support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] check-syntax: update arguments for astyle v3.2 (possibly earlier)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] python: fix typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: fix typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libselinux: avoid quadratic complexity for many regex specs validation
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] semanage: improve -e documentation and fix delete operation
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libselinux: update max node depth
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux/fuzz: readjust load_mmap() update
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH linux-next 2/2] perf: Return EACCESS when need perfmon capability
- From: Luo Gengkun <luogengkun@xxxxxxxxxxxxxxx>
- [PATCH linux-next 1/2] perf: Remove unnecessary parameter of security check
- From: Luo Gengkun <luogengkun@xxxxxxxxxxxxxxx>
- [PATCH linux-next 0/2] Fix perf security check problem
- From: Luo Gengkun <luogengkun@xxxxxxxxxxxxxxx>
- [PATCH v2] selinux: match extended permissions to their base permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] lsm: add LSM hooks for io_uring_setup()
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Jens Axboe <axboe@xxxxxxxxx>
- [PATCH] lsm,io_uring: add LSM hooks for io_uring_setup()
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- selinux@xxxxxxxxxxxxxxx CDIF Comprobante 15:02
- From: pago214@xxxxxxxxxxxxxxxxxxxxxx
- Re: kernel-secnext aarch64 builds missing?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20241217
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.8-rc3 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20241217
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- [PATCH 5/6] Audit: multiple subject lsm values for netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/6] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 6/6] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/6] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/6] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/6] Audit: Records for multiple security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/6] LSM: security_lsmblob_to_secctx module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux/fuzz: readjust load_mmap() update
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Mute error messages from selinux_restorecon
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2] libselinux: restore previous regex spec ordering
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/fuzz: update for lookup_all() change
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: add missing word separators in error message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2] libselinux: restore previous regex spec ordering
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: Mute error messages from selinux_restorecon
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel-secnext aarch64 builds missing?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] checkpolicy: add support for wildcard netifcon names
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] libsepol: update sort order for netifcon definitions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] secilc/test: add test for wildcard netifcon statement
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: support wildcard network interface names
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH v2] libselinux: restore previous regex spec ordering
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [syzbot] [selinux?] [mm?] [overlayfs?] INFO: rcu detected stall in sys_mkdirat (2)
- From: syzbot <syzbot+ea07f6744590acf5f48f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH v2 22/22] selinux: restrict policy strings
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 00/22] selinux: harden against malformed policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 20/22] selinux: more strict bounds check
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 21/22] selinux: check for simple types
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 18/22] selinux: beef up isvalid checks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 19/22] selinux: validate symbols
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 17/22] selinux: reorder policydb_index()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 15/22] selinux: introduce ebitmap_highest_set_bit()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 16/22] selinux: check type attr map overflows
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 14/22] selinux: pre-validate conditional expressions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 11/22] selinux: more strict policy parsing
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 13/22] selinux: validate constraints
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 12/22] selinux: check length fields in policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 09/22] selinux: make use of str_read()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 10/22] selinux: use u16 for security classes
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 08/22] selinux: avoid unnecessary indirection in struct level_datum
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 07/22] selinux: use known type instead of void pointer
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 06/22] selinux: rename comparison functions for clarity
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 03/22] selinux: align and constify functions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 01/22] selinux: supply missing field initializers
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 05/22] selinux: avoid nontransitive comparison
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 02/22] selinux: avoid using types indicating user space interaction
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH v2 04/22] selinux: rework match_ipv6_addrmask()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/22] selinux: restrict policy strings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 07/22] selinux: use known type instead of void pointer
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 06/22] selinux: rename comparison functions for clarity
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use native iterator types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: match extended permissions to their base permissions
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v2] selinux: ignore unknown extended permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: match extended permissions to their base permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add netlink nlmsg_type audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add netlink nlmsg_type audit message
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: use native iterator types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use native iterator types
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] selinux: use native iterator types
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 22/22] selinux: restrict policy strings
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add support for xperms in conditional policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add netlink nlmsg_type audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add netlink nlmsg_type audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Mikhail Ivanov <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Mikhail Ivanov <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2] libselinux: restore previous regex spec ordering
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsemanage: Mute error messages from selinux_restorecon
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] ioctl: add test for conditional xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Read sk->sk_family once in selinux_socket_bind()
- From: Mikhail Ivanov <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- 3.8-rc2 will become rc3
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] libselinux: restore previous regex spec ordering
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- The curious case of pidfs and pidfds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: Fix SCTP error inconsistency in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use native iterator types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add generated av_permissions.h to targets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] libselinux: restore previous regex spec ordering
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: KASAN; slab-out-of-bounds in avc_lookup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/9] Revert "libselinux/utils: drop reachable assert in sefcontext_compile"
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] libselinux: restore previous regex spec ordering
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 9/9] Revert "libselinux: rework selabel_file(5) database"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 8/9] Revert "libselinux: add selabel_file(5) fuzzer"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/9] Revert "libselinux: move functions out of header file"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 7/9] Revert "libselinux: support parallel selabel_lookup(3)"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/9] Revert "libselinux: avoid memory allocation in common file label lookup"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/9] Revert "libselinux: use vector instead of linked list for substitutions"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/9] Revert "libselinux/utils: use correct error handling"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/9] Revert "libselinux: simplify string formatting"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/9] Revert "libselinux/utils: drop reachable assert in sefcontext_compile"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Incompatible file_contexts precedence in 3.8-rc1
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Incompatible file_contexts precedence in 3.8-rc1
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: Incompatible file_contexts precedence in 3.8-rc1
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [RFC] genfscon wildcard support for faster sysfs labeling
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Incompatible file_contexts precedence in 3.8-rc1
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- [PATCH] selinux: KASAN; slab-out-of-bounds in avc_lookup
- From: Joey Jiao <quic_jiangenj@xxxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/fuzz: update for lookup_all() change
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Kees Bakker <kees@xxxxxxxxxxxx>
- Re: [RFC] genfscon wildcard support for faster sysfs labeling
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: Systemd socket labeling issue
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux/fuzz: update for lookup_all() change
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: ignore unknown extended permissions
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [RFC] genfscon wildcard support for faster sysfs labeling
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC] genfscon wildcard support for faster sysfs labeling
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- [PATCH] selinux: match extended permissions to their base permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v2] selinux: add netlink nlmsg_type audit message
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v2] selinux: ignore unknown extended permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: ignore unknown extended permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: add missing word separators in error message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1 1/2] libsepol: allow specifying SUBDIRS when building
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] libselinux: make use of calloc(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: drop reachable assert in sefcontext_compile
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: drop host bits in IPv6 CIDR address
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: avoid unnecessary memset(3) calls in hashtab
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/utils: use correct error handling
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] libselinux: avoid memory allocation in common file label lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: harden availability check against user CFLAGS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] Introduce POLICYDB_VERSION_KERNEL_MAX
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: add missing word separators in error message
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH] selinux: ignore unknown extended permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: drop reachable assert in sefcontext_compile
- From: James Carter <jwcart2@xxxxxxxxx>
- Systemd socket labeling issue
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: drop reachable assert in sefcontext_compile
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: drop reachable assert in sefcontext_compile
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2] libselinux/utils: drop reachable assert in sefcontext_compile
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: Regression in 92306daf5219 ("libselinux: rework selabel_file(5) database")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Regression in 92306daf5219 ("libselinux: rework selabel_file(5) database")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] selinux: add support for xperms in conditional policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 11/22] selinux: more strict policy parsing
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: drop host bits in IPv6 CIDR address
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: avoid unnecessary memset(3) calls in hashtab
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/utils: use correct error handling
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] libselinux: avoid memory allocation in common file label lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] Introduce POLICYDB_VERSION_KERNEL_MAX
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] Introduce POLICYDB_VERSION_KERNEL_MAX
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: drop host bits in IPv6 CIDR address
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH] Always build for LFS mode on 32-bit archs.
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: avoid unnecessary memset(3) calls in hashtab
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libselinux/utils: use correct error handling
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH] ioctl: add test for conditional xperms
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add generated av_permissions.h to targets
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- ANN: SELinux userspace 3.8-rc1 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 9/9] libsemanage: respect shell paths with /usr prefix
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 2/3] libselinux: use vector instead of linked list for substitutions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] libselinux: use vector instead of linked list for substitutions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] libsemanage: respect shell paths with /usr prefix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] libselinux: use vector instead of linked list for substitutions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] selinux: add generated av_permissions.h to targets
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH] selinux: explicitly clean generated av_permissions.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output()
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [syzbot] [selinux?] KASAN: slab-out-of-bounds Read in selinux_ip_output
- From: syzbot <syzbot+2d9f5f948c31dcb7745e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] libselinux: simplify string formatting
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 2/3] libselinux: use vector instead of linked list for substitutions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/3] libselinux: avoid memory allocation in common file label lookup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] bpf, lsm: Remove getlsmprop hooks BTF IDs
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v2] bpf, lsm: Remove getlsmprop hooks BTF IDs
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [RFC PATCH 00/22] selinux: harden against malformed policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/9] libsemanage: set O_CLOEXEC flag for file descriptors
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 1/3] libselinux: avoid memory allocation in common file label lookup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 3/3] libselinux: simplify string formatting
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 2/3] libselinux: use vector instead of linked list for substitutions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] selinux: use native iterator types
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 8/9] libsemanage/man: add documentation for command overrides
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 9/9] libsemanage: respect shell paths with /usr prefix
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 7/9] libsemanage: optimize policy by default
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 6/9] libsemanage: simplify file deletion
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 4/9] libsemanage: drop duplicate newlines and error descriptions in error messages
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 3/9] libsemanage: handle shell allocation failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 5/9] libsemanage: check closing written files
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 2/9] libsemanage: handle cil_set_handle_unknown() failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- [PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: harden availability check against user CFLAGS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] libselinux: make use of calloc(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/47] libsemanage: white space cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libselinux: avoid memory allocation in common file label lookup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: use vector instead of linked list for substitutions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH 01/47] libsemanage: white space cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: explicitly clean generated av_permissions.h
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [PATCH] mm/kmemleak: Fix sleeping function called from invalid context in kmemleak_seq_show
- From: Alessandro Carminati <acarmina@xxxxxxxxxx>
- [PATCH 2/2] libselinux: harden availability check against user CFLAGS
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: harden availability check against user CFLAGS
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_sctp.te: add missing corenet_inout_generic_if() calls
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 2/3] libselinux: avoid dynamic allocation in openattr()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 3/3] libselinux: move functions out of header file
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 1/3] libselinux: make use of calloc(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 2/3] libselinux: avoid dynamic allocation in openattr()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: explicitly clean generated av_permissions.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH] selinux: explicitly clean generated av_permissions.h
- From: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20241112
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] fixfiles: use `grep -F` when search in mounts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: open lock_file with O_RDWR
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 1/6] libsepol: misc assertion cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid leak of identifier on required attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid memory leaks on redeclarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/9] policycoreutils: introduce unsetfiles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Optionally allow duplicate role declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] restorecond: Set GLib IO channels to binary mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 00/22] selinux: harden against malformed policies
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/17] tests: enable strictness for perl scripts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 17/17] tests: drop headers from Makefile dependencies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 01/17] Fix typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 11/17] tests/inet_socket: skip mptcp if not supported
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 09/17] tests/extended_socket_class: work with CONFIG_CRYPTO_USER_API disabled
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 00/17] testsuite: misc fixes and virtme-ng support
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 10/17] tests/tun_tap: skip if not supported
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 16/17] tests: fail on compiler warnings and enable Wextra
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 15/17] tests: test code tweaks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 14/17] defconfig: enable CONFIG_NETFILTER_NETLINK_LOG
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 13/17] defconfig: enable CONFIG_XFRM_USER
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 07/17] test: overlayfs related tweaks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 12/17] tests/filesystem: improve fsnotify check and preload loop module
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 08/17] tests/notify: work with CONFIG_FANOTIFY disabled
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 06/17] Makefile: add PHONY targets
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]