SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] gettext: handle unsupported languages properly
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] gettext: handle unsupported languages properly
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] gettext: handle unsupported languages properly
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Cleanup the enum SEL_COMPAT_NET
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: error out if required permission would exceed limit
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH -next] selinux: Cleanup the enum SEL_COMPAT_NET
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH RESEND -next] selinux: Let the caller free the momory in *mnt_opts on error
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python: remove IOError in certain cases
- From: Elijah Conners <business@xxxxxxxxxxxxxx>
- Re: [PATCH] python: remove IOError in certain cases
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH RESEND -next] selinux: Let the caller free the momory in *mnt_opts on error
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.19 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v5.19 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.19 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- PHP-FPM restriction bug
- From: Father Vlasie <fv@xxxxxxxxx>
- Re: [PATCH -next] selinux: Let the caller free the momory in *mnt_opts on error
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- [RFC PATCH 4/4] checkpolicy: add front-end support for segregate attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] libsepol: refactor ebitmap conversion in link.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] libsepol: add ebitmap iterator wrapper with startnode
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] libsepol: add compile-time constraint for mutual exclusive attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: Let the caller free the momory in *mnt_opts on error
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH 1/4] support Dash as default shell
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] python: remove IOError in certain cases
- From: Elijah Conners <business@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/8] block: use new capable_any functionality
- From: Bart Van Assche <bvanassche@xxxxxxx>
- Re: [PATCH] selinux: free contexts previously transferred in selinux_add_opt()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- hack
- From: Mikhail <nytimes@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: error out if required permission would exceed limit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: error out if required permission would exceed limit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: fix validation of user declarations in non-base modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] drivers: use new capable_any functionality
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: free contexts previously transferred in selinux_add_opt()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 3/8] block: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 2/8] capability: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] [RFC PATCH] sched: only perform capability check on privileged operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 5/8] fs: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 8/8] net: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 4/8] drivers: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 7/8] bpf: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 6/8] kernel: use new capable_any functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] support Dash as default shell
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Drop unused assignment
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/audit2allow: close file stream on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libselinux: add man page redirections
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: fix validation of user declarations in modules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 3/4] filesystem: allow getfilecon(3) to pass test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] filesystem: allow getfilecon(3) to pass test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/4] support perf_event_paranoid=3
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] watchkey: skip if CONFIG_WATCH_QUEUE not set
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/4] support Dash as default shell
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix potential memory leak in selinux_add_opt
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Add boundary check in put_entry()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix potential memory leak in selinux_add_opt
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_state_kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/4] support Dash as default shell
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_state_kernel
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH 4/4] watchkey: skip if CONFIG_WATCH_QUEUE not set
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH -next] selinux: Fix memleak in security_read_policy
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH 3/4] filesystem: allow getfilecon(3) to pass test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] support perf_event_paranoid=3
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_state_kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/4] support Dash as default shell
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] filesystem: allow getfilecon(3) to pass test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] watchkey: skip if CONFIG_WATCH_QUEUE not set
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] support perf_event_paranoid=3
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH -next] selinux: Add boundary check in put_entry()
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix potential memory leak in selinux_add_opt
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix memleak in security_read_state_kernel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Fix potential memory leak in selinux_add_opt
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH -next] selinux: Fix memleak in security_read_state_kernel
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH -next] selinux: Fix potential memory leak in selinux_add_opt
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v36 27/33] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix typos in comments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy: error out if required permission would exceed limit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: avoid potential NULL dereference on optional parameter
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v36 04/33] LSM: provide lsm name and id slot mappings
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v36 33/33] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 29/33] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 27/33] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 25/33] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 24/33] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 21/33] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 14/33] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 05/33] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 03/33] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 04/33] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 02/33] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 00/33] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] checkpolicy: rework initial SID handling
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/3] libsepol: export initial SIDs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] libsepol: fix validation of user declarations in modules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: fix validation of user declarations in non-base modules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] selinux: fix typos in comments
- From: Jonas Lindner <jolindner@xxxxxx>
- Re: [PATCH] libsepol: fix validation of user declarations in modules
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: fix validation of user declarations in modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Drop unused assignment
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/audit2allow: close file stream on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libselinux: add man page redirections
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH userspace 1/2] libsemanage: always write kernel policy when check_ext_changes is specified
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 2/2] semodule: rename --rebuild-if-modules-changed to --refresh
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/2] Refine semantics of libsemanage's check_ext_changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] libselinux: simplify policy path logic to avoid uninitialized read
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- why arent we checking MS_BIND?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] selinux: add __randomize_layout to selinux_audit_data
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 1/3] libsepol: export initial SIDs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/3] checkpolicy: rework initial SID handling
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] libsepol: validate initial SIDs
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] libselinux: name parameters in context.h
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] libselinux: check for truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: restorecon: avoid printing NULL pointer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: fix validation of user declarations in modules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: temporarily disable ASCONF tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: Drop unused assignment
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python: Split "semanage import" into two transactions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux: do not return the cached prev_current value when using getpidcon()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Split "semanage import" into two transactions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/sctp: temporarily disable ASCONF tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: do not return the cached prev_current value when using getpidcon()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Revert "libselinux: restorecon: pin file to avoid TOCTOU issues"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semodule: avoid toctou on output module
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: declare return value of context_str(3) const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Revert "libselinux: restorecon: pin file to avoid TOCTOU issues"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Makefile: always include and link with DESTDIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Bug in SELinux SCTP ASCONF handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Bug in SELinux SCTP ASCONF handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] Revert "libselinux: restorecon: pin file to avoid TOCTOU issues"
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] python: Split "semanage import" into two transactions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] semodule: avoid toctou on output module
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: declare return value of context_str(3) const
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Makefile: always include and link with DESTDIR
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: Prevent cached context giving wrong results
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux: do not return the cached prev_current value when using getpidcon()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] cred: Propagate security_prepare_creds() error code
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] cred: Propagate security_prepare_creds() error code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] network_support.md: clarify local port range and name_bind
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] network_support.md: clarify local port range and name_bind
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] network_support.md: clarify local port range and name_bind
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] network_support.md: clarify local port range and name_bind
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] cred: Propagate security_prepare_creds() error code
- From: Jeff Moyer <jmoyer@xxxxxxxxxx>
- [PATCH v2] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.19
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] cred: Propagate security_prepare_creds() error code
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] cred: Propagate security_prepare_creds() error code
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.19
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [SELinux-notebook PATCH] network_support.md: clarify local port range and name_bind
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2 8/8] net: use new capable_or functionality
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] cred: Propagate security_prepare_creds() error code
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20220520
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] semodule: avoid toctou on output module
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: declare return value of context_str(3) const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] libselinux: name parameters in context.h
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] libselinux: declare parameter of security_load_policy(3) const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] libselinux: enclose macro definition in parenthesis
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] libselinux: add man page redirections
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Makefile: always include and link with DESTDIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] python/audit2allow: close file stream on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: restorecon: avoid printing NULL pointer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 4/4] libselinux: check for truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.18 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- ANN: SELinux userspace 3.4 release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.18 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add __randomize_layout to selinux_audit_data
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2022
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 1/4] libselinux: simplify policy path logic to avoid uninitialized read
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: restorecon: add fallback for pre 3.6 Linux
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: restorecon: avoid printing NULL pointer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: update man page of setfilecon(3) family about context parameter
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] ci: declare git repository a safe directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: add __randomize_layout to selinux_audit_data
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH] selinux: add __randomize_layout to selinux_audit_data
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: add __randomize_layout to selinux_audit_data
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix bad cleanup on error in hashtab_duplicate()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ci: declare git repository a safe directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [RFC PATCH v2 4/4] libselinux: check for truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: restorecon: add fallback for pre 3.6 Linux
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: restorecon: avoid printing NULL pointer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] ci: declare git repository a safe directory
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] selinux: fix bad cleanup on error in hashtab_duplicate()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: update man page of setfilecon(3) family about context parameter
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] libselinux: restorecon: pin file to avoid TOCTOU issues
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 4/4] libselinux: restorecon: pin file to avoid TOCTOU issues
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: preserve errno in selinux_log()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: free memory in error branch
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 4/4] libselinux: restorecon: pin file to avoid TOCTOU issues
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/4] libselinux: restorecon: forward error if not ENOENT
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] libselinux: restorecon: misc tweaks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace v4 0/2] Support the 'self' keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] gettext: set _ on module level instead of builtins namespace
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/utils: print errno on failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v4 0/2] Support the 'self' keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH userspace v4 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v4 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/32] Introduce flexible array struct memcpy() helpers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] libselinux/utils: print errno on failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] gettext: set _ on module level instead of builtins namespace
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: preserve errno in selinux_log()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 4/4] libselinux: restorecon: pin file to avoid TOCTOU issues
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/4] libselinux: restorecon: forward error if not ENOENT
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] libselinux: restorecon: misc tweaks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace v3 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] libselinux: check for truncations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: free memory in error branch
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 4/4] libselinux: restorecon: pin file to avoid TOCTOU issues
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] libselinux: restorecon: forward error if not ENOENT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] libselinux: restorecon: misc tweaks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: preserve errno in selinux_log()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v3 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 4/4] libselinux: check for truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] libselinux: introduce strlcpy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] libselinux: add header guard for internal header
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] libselinux: simplify policy path logic to avoid uninitialized read
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: free memory in error branch
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils: print errno on failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH userspace v3 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/8] capability: add capable_or to test for multiple caps with exactly one audit message
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 8/8] net: use new capable_or functionality
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] libselinux/utils: print errno on failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/8] drivers: use new capable_or functionality
- From: Hans Verkuil <hverkuil-cisco@xxxxxxxxx>
- Re: [PATCH v2 4/8] drivers: use new capable_or functionality
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] gettext: set _ on module level instead of builtins namespace
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: ANN: SELinux userspace 3.4-rc3 release candidate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: print errno on failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: update man page of setfilecon(3) family about context parameter
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Daniel Latypov <dlatypov@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Jan Kara <jack@xxxxxxx>
- ANN: SELinux userspace 3.4-rc3 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: mention class name on invalid permission
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: mention class name on invalid permission
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] [RFC PATCH] sched: only perform capability check on privileged operation
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] gui: Make sure sepolicy calls are translated properly
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] Update missing sandbox translations
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: David Gow <davidgow@xxxxxxxxxx>
- [PATCH 30/32] usb: gadget: f_fs: Use mem_to_flex_dup() with struct ffs_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/32] esas2r: Use __mem_to_flex() with struct atto_ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 31/32] xenbus: Use mem_to_flex_dup() with struct read_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 24/32] IB/hfi1: Use mem_to_flex_dup() for struct tid_rb_node
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 27/32] KEYS: Use mem_to_flex_dup() with struct user_key_payload
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 22/32] atags_proc: Use mem_to_flex_dup() with struct buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/32] p54: Use mem_to_flex_dup() with struct p54_cal_database
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/32] mac80211: Use mem_to_flex_dup() with several structs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 17/32] net/flow_offload: Use mem_to_flex_dup() with struct flow_action_cookie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 18/32] firewire: Use __mem_to_flex_dup() with struct iso_interrupt_event
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 15/32] 802/garp: Use mem_to_flex_dup() with struct garp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 25/32] Drivers: hv: utils: Use mem_to_flex_dup() with struct cn_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 21/32] soc: qcom: apr: Use mem_to_flex_dup() with struct apr_rx_buf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 14/32] af_unix: Use mem_to_flex_dup() with struct unix_address
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/32] 802/mrp: Use mem_to_flex_dup() with struct mrp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 26/32] ima: Use mem_to_flex_dup() with struct modsig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/32] iwlwifi: mvm: Use mem_to_flex_dup() with struct ieee80211_key_conf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/32] nl80211: Use mem_to_flex_dup() with struct cfg80211_cqm_config
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/32] iwlwifi: calib: Prepare to use mem_to_flex_dup()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/32] Bluetooth: Use mem_to_flex_dup() with struct hci_op_configure_data_path
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/32] brcmfmac: Use mem_to_flex_dup() with struct brcmf_fweh_queue_item
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/32] iwlwifi: calib: Use mem_to_flex_dup() with struct iwl_calib_result
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux: use unsigned char for boolean values
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] firmware_loader: use kernel credentials when reading firmware
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Jan Kara <jack@xxxxxxx>
- [PATCH] fsnotify: add generic perm check for unlink/rmdir
- From: Guowei Du <duguoweisz@xxxxxxxxx>
- Re: [PATCH] selinux: fix indentation level of mls_ops block
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include necessary headers in headers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid extra semicolon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: update parameter documentation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: resolve checkpatch errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] firmware_loader: use kernel credentials when reading firmware
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] gui: Make sure sepolicy calls are translated properly
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 5/5] setfiles: introduce the -C option for distinguishing file tree walk errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 3/5] setfiles: remove useless "iamrestorecon" checks in option parsing
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 1/5] setfiles: fix up inconsistent indentation
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 2/5] setfiles: remove useless assignment and comment (after RHBZ#1926386)
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v2 1/8] capability: add capable_or to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 8/8] net: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 7/8] kernel/bpf: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 6/8] kernel: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/8] drivers: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/8] capability: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 5/8] fs: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/8] block: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] [RFC PATCH] sched: only perform capability check on privileged operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] Update missing sandbox translations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: include necessary headers in headers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: avoid extra semicolon
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix indentation level of mls_ops block
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: update parameter documentation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: use unsigned char for boolean values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: resolve checkpatch errors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v4] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Update missing sandbox translations
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH for-3.5 3/5] setfiles: remove useless "iamrestorecon" checks in option parsing
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH for-3.5 5/5] setfiles: introduce the -C option for distinguishing file tree walk errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 2/5] setfiles: remove useless assignment and comment (after RHBZ#1926386)
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 3/5] setfiles: remove useless "iamrestorecon" checks in option parsing
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH for-3.5 1/5] setfiles: fix up inconsistent indentation
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH v3] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Qian Cai <quic_qiancai@xxxxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 03/29] LSM: Add the lsmblob data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] checkpolicy: mention class name on invalid permission
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH userspace v2 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace 2/2] libsepol,checkpolicy: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/2] Support the 'self' keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/2] libsepol/cil: add support for self keyword in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/2] FIOQSIZE followup fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: John Stultz <jstultz@xxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- SELinux userspace 3.4-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH testsuite 0/2] FIOQSIZE followup fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/2] tests/ioctl: adjust size of variable passed to ioctl(2)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] policy/test_ioctl_xperms.te: add ioctl numbers for other arches
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/ioctl: Update ioctl tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 0/2] Make SCTP and Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v4] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v35 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 7/7] SELINUXNS: Fixing concurrency issues
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 6/7] SELINUXNS: Fixing superblock security structure memory leakage
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 5/7] SELINUXNS: Migrate all open files and all vma to new namespace
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 4/7] SELINUXNS: Namespacing for xattrs
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 2/7] selinux: support per-namespace superblock security structures
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 3/7] SELINUXNS: Fix initilization of the superblock security under spinlock
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 1/7] LSM: Infrastructure management of the superblock
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- [RFC PATCH 0/7] SELinux-namespace
- From: Alexander Kozhevnikov <alexander.kozhevnikov@xxxxxxxxxx>
- Re: [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort"
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- [PATCH 2/5] libsepol/test: Include paired headers for prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] libsepol/test: Declare file local functions as static
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5] libsemanage/tests: Remove unused functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5] libsemanage/tests: Declare file local functions as static
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite 2/2] tests: check more thoroughly for SCTP support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/2] tests/extended_socket_class: make Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/2] Make SCTP and Bluetooth support optional
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/tests: adjust IPv6 netmasks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: correct parameter type in selabel_open(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: free memory on selabel_open(3) failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: correctly hash specfiles larger than 4G
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH testsuite v4] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [HEADS UP MISSING PATCH] Update python library and binding versions to 3.4-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 6/6] Enable missing prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Correct misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/5] libselinux: limit has buffer size
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libselinux: limit has buffer size
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] libsepol: drop unnecessary const discarding casts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] libsepol: check correct pointer for oom
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] libsepol/cil: declare file local function pointer static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] libsemanage: avoid double fclose
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] Correct misc typos
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]