SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 2/3] libsepol/cil: Create function cil_add_decl_to_symtab() and refactor
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Refactor helper function for cil_gen_node()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Allow permission expressions when using map classes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Allow permission expressions when using map classes
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH V2] libsepol/cil: Exit with an error if declaration name is a reserved word
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH userspace] policycoreutils/setfiles: do not create useless setfiles.8.man file
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: vsock: Set SID for socket returned by accept()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] libsepol/cil: Exit with an error if declaration name is a reserved word
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error if declaration name is a reserved word
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: clarify task subjective and objective credentials
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v2 1/3] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy classperms list when resetting classpermission
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: vsock: Set SID for socket returned by accept()
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- [PATCH v2] selinux: vsock: Set SID for socket returned by accept()
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- Re: [PATCH] selinux: vsock: Set SID for socket returned by accept()
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- Re: Weird bug in NFS/SELinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] selinux: policy load fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Exit with an error if declaration name is a reserved word
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy classperms list when resetting classpermission
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3 3/3] selinuxfs: unify policy load error reporting
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 1/3] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 2/3] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/3] selinux: policy load fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/3] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] smack: differentiate between subjective and objective task credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] selinux: clarify task subjective and objective credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 0/3] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: More strict verification of constraint leaf expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Exit with an error if declaration name is a reserved word
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: deadlock bug related to bpf,audit subsystems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: deadlock bug related to bpf,audit subsystems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for duplicate blocks, optionals, and macros
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Allow lists in constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: Write "NO_IDENTIFIER" for empty constraint expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make num_* unsigned int in module_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Weird bug in NFS/SELinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/cil: Set class field to NULL when resetting struct cil_classperms
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: cil_reset_classperms_set() should not reset classpermission
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Weird bug in NFS/SELinux
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Weird bug in NFS/SELinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Destroy classperm list when resetting map perms
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: vsock: Set SID for socket returned by accept()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Destroy classperms list when resetting classpermission
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: vsock: Set SID for socket returned by accept()
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make num_* unsigned int in module_to_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/4] libsepol: Write "NO_IDENTIFIER" for empty CIL constraint expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Allow lists in constraint expressions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libsepol: Write "NO_IDENTIFIER" for empty constraint expression
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- libsepol/cil: use after free with optional classpermissionset
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/6] libsepol/cil: make cil_post_fc_fill_data static
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2 v2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsepol: make num_* unsigned int in module_to_cil
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 4/4] libsepol: Write "NO_IDENTIFIER" for empty CIL constraint expression
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check for duplicate blocks, optionals, and macros
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/4] secilc/docs: Lists are now allowed in constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] libsepol: Enclose identifier lists in CIL constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/4] libsepol: Write "NO_IDENTIFIER" for empty CIL constraint expression
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4] libsepol/cil: Allow lists in constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol: Enclose identifier lists in constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol: Write "NO_IDENTIFIER" for empty constraint expression
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol/cil: Check for duplicate blocks, optionals, and macros
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] perf/core: fix unconditional security_locked_down() call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] perf/core: fix unconditional security_locked_down() call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] perf/core: fix unconditional security_locked_down() call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol/cil: type confusion between macro and optional leads to heap-buffer-overflow in cil_copy_macro
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- libsepol/cil: type confusion between macro and optional leads to heap-buffer-overflow in cil_copy_macro
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2 v2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/checkpolicy: Set user roles using role value instead of dominance
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Remove unnecessary copying of declarations from link.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Properly handle types associated to role attributes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Expand role attributes in constraint expressions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 6/6] libsepol/cil: do not leak avrulex_ioctl_table memory when an error occurs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 5/6] libsepol/cil: fix NULL pointer dereference in __cil_insert_name
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/6] libsepol/cil: replace printf with proper cil_tree_log
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/6] libsepol/cil: remove stray printf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/6] libsepol/cil: make cil_post_fc_fill_data static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH 1/2 v2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2 v2] libsepol: Check kernel to CIL and Conf functions for supported versions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 6/6] libsepol/cil: do not leak avrulex_ioctl_table memory when an error occurs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/6] libsepol/cil: make cil_post_fc_fill_data static
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/6] libsepol/cil: fix NULL pointer dereference in __cil_insert_name
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/6] libsepol/cil: replace printf with proper cil_tree_log
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/6] libsepol/cil: remove stray printf
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Expand role attributes in constraint expressions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/checkpolicy: Set user roles using role value instead of dominance
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Remove unnecessary copying of declarations from link.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsepol: Check kernel to CIL and Conf functions for supported versions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Properly handle types associated to role attributes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v6 02/40] fs: add id translation helpers
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v25 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Anna Schumaker <anna.schumaker@xxxxxxxxxx>
- Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
- From: Anna Schumaker <anna.schumaker@xxxxxxxxxx>
- [PATCH] libsepol: Remove unnecessary copying of declarations from link.c
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] checkpolicy: Do not automatically upgrade when using "-b" flag
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol: Check kernel to CIL and Conf functions for supported versions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Expand role attributes in constraint expressions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Expand role attributes in constraint expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Role attributes in traditional language constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Role attributes in traditional language constraints
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Properly handle types associated to role attributes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH] LSM: audit_sig_lsm can be static
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v25 21/25] audit: add support for non-syscall auxiliary records
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] object_classes_permissions.md: Add anon_inode class
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v25 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 23/25] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 21/25] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 16/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 14/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 09/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 08/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 07/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 06/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 03/25] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 02/25] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v25 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security/selinux/include/: fix misspellings using codespell tool
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/selinux/ss: fix misspellings using codespell tool
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/checkpolicy: Set user roles using role value instead of dominance
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] security/selinux/include/: fix misspellings using codespell tool
- From: menglong8.dong@xxxxxxxxx
- [PATCH] security/selinux/ss: fix misspellings using codespell tool
- From: menglong8.dong@xxxxxxxxx
- ANN: SPAN docker images
- From: Karl MacMillan <karl@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Quick announcement on the selinux/next and audit/next branches
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Quick announcement on the selinux/next and audit/next branches
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Hildenbrand <david@xxxxxxxxxx>
- ANN: SETools 4.4.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Quick announcement on the selinux/next and audit/next branches
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Quick announcement on the selinux/next and audit/next branches
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 0/3] perf_event: fixes and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- ANN: SELinux userspace release 3.2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH testsuite 0/3] perf_event: fixes and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] lockdown: use debugfs/tracefs to test lockdown permissions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: invalidate local_lock_fd properly when closing it
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: invalidate the pointer to the policydb if policydb_init fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Anna Schumaker <anna.schumaker@xxxxxxxxxx>
- [PATCH testsuite 3/3] perf_event: fix CAP_SYS_ADMIN references
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/3] perf_event: measure CPU 0 rather than CPU 1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/3] perf_event: fix wrong use of perf_event_open(2) API
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/3] perf_event: fixes and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] lockdown: use debugfs/tracefs to test lockdown permissions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: invalidate the pointer to the policydb if policydb_init fails
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 09/11] pragma once: convert scripts/selinux/genheaders/genheaders.c
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 09/11] pragma once: convert scripts/selinux/genheaders/genheaders.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 09/11] pragma once: convert scripts/selinux/genheaders/genheaders.c
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- [PATCH] libsepol: invalidate the pointer to the policydb if policydb_init fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] restorecond: invalidate local_lock_fd properly when closing it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: fix NULL pointer dereference in cil_fill_ipaddr
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] sepolicy: Do not try to load policy on import
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Rename 'master' branch to 'main'
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v4 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix NULL pointer dereference in cil_fill_ipaddr
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: fix NULL pointer dereference in cil_fill_ipaddr
- From: lutianxiong <lutianxiong@xxxxxxxxxx>
- [PATCH] perf/core: fix unconditional security_locked_down() call
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Rename 'master' branch to 'main'
- From: James Carter <jwcart2@xxxxxxxxx>
- Rename 'master' branch to 'main'
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: ANN: SELinux userspace 3.2-rc3 release candidate - the last one
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ANN: SELinux userspace 3.2-rc3 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] gui: fix "file type" selection in fcontextPage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: handle SID without assigned context when writing policy.conf
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: fix segfault in add_xattr_entry()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] policycoreutils: sestatus belongs to bin not sbin
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [BUG] Race between policy reload sidtab conversion and live conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [BUG] Race between policy reload sidtab conversion and live conversion
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] libsepol/cil: handle SID without assigned context when writing policy.conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] sepolicy: Do not try to load policy on import
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] libsepol/cil: handle SID without assigned context when writing policy.conf
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc/perf: Fix handling of privilege level checks in perf interrupt context
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.12
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] chcat: allow usage if binary policy is inaccessible
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: handle SID without assigned context when writing policy.conf
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] chcat: allow usage if binary policy is inaccessible
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux patches for v5.12
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] apparmor: differentiate between subjective and objective task credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] policycoreutils: sestatus belongs to bin not sbin
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] libselinux: fix segfault in add_xattr_entry()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3] policycoreutils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils: sestatus belongs to bin not sbin
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH 4/4] apparmor: differentiate between subjective and objective task credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: handle SID without assigned context when writing policy.conf
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: James Morris <jmorris@xxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 4/4] apparmor: differentiate between subjective and objective task credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v3 3/3] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v3 2/3] [NFS] cleanup: remove unneeded null check in nfs_fill_super()
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v3 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Trond Myklebust <trondmy@xxxxxxxxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v3 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v3 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH v2 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol: Validate policydb values when reading binary
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] secilc: fixes cil_role_statements.md example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: rename gettid() to something which never conflicts with the libc
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux(8,5): Describe fcontext regular expressions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] gui: fix "file type" selection in fcontextPage
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: security_task_getsecid() and subjective vs objective task creds
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v2 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- security_task_getsecid() and subjective vs objective task creds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] policycoreutils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] libsepol: Eliminate gaps in the policydb role arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: rename gettid() to something which never conflicts with the libc
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] libsepol: Validate policydb values when reading binary
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol: Eliminate gaps in the policydb role arrays
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] chcat: allow usage if binary policy is inaccessible
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- Re: [PATCH] selinux(8,5): Describe fcontext regular expressions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux/getconlist: report failures
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] gui: fix "file type" selection in fcontextPage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] secilc: fixes cil_role_statements.md example
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] secilc: fixes cil_role_statements.md example
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libselinux: rename gettid() to something which never conflicts with the libc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH] gui: fix "file type" selection in fcontextPage
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] policycoreutils: Resolve path in restorecon_xattr
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] libselinux: fix segfault in add_xattr_entry()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.12
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite failures with selinux-policy-3.14.8-1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- selinux-testsuite failures with selinux-policy-3.14.8-1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] policycoretuils: sestatus belongs to bin not sbin
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] NFSv4 account for selinux security context when deciding to share superblock
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH 1/2] [security] Add new hook to compare new mount to an existing mount
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] selinux: policy load fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Defining SELinux users, "Unable to get valid context...". Help!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Defining SELinux users, "Unable to get valid context...". Help!
- From: Peter Whittaker <peterwhittaker@xxxxxxxxxxxxxxxxxxx>
- [PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- alternative to glblub defaultrange
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux(8,5): Describe fcontext regular expressions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3 3/3] secilc/docs: add custom color theme
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: Allow context mounts for unpriviliged overlayfs
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Recommended value in CONFIG_LSM option on SELinux system?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Recommended value in CONFIG_LSM option on SELinux system?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] secilc/docs: add custom color theme
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Destroy disabled optional blocks after pass is complete
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol/cil: use-after-free with optional+class common
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: fix variable scope issue in live sidtab conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/3] secilc/docs: add custom color theme
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol: Create function ebitmap_highest_set_bit()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: Validate policydb values when reading binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2] libsepol: Validate policydb values when reading binary
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Eliminate gaps in the policydb role arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol/cil: be more robust when encountering <src_info>
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libsepol: remove unused files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix integer overflow in the handling of hll line marks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] secilc/docs: use fenced code blocks for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: remove unused files
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/2] keys: request_key() interception in containers
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH RESEND v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- From: Stephen Brennan <stephen.s.brennan@xxxxxxxxxx>
- [PATCH 2/2] secilc/docs: add syntax highlighting for secil
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2] secilc/docs: add syntax highlighting for cil examples
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux/getconlist: report failures
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20210203
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- ANN: SELinux userspace 3.2-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libsepol: include header files in source files when matching declarations
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] libsepol: remove unused files
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- libsepol/cil: use-after-free with optional+class common
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH testsuite] ci: run testsuite also against the secnext kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- libsepol: signed integer overflow in the HLL line counter of CIL compiler
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/1] libsepol/cil: unlink blockinherit->block link when destroying a block
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2 1/1] scripts/release: make the script more robust, and release a source repository snapshot
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setfiles: drop now unused static variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] setfiles: drop now unused static variable
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: Drop unused nerr variable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix heap-use-after-free when using optional blockinherit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol/cil: fix memory leak when a constraint expression is too deep
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/cil: fix heap-use-after-free when using optional blockinherit
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] scripts/release: make the script more robust and direct
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/release: Release also tarball with everything
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] scripts/release: Release also tarball with everything
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsemanage: sync filesystem with sandbox
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Fix document links
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] python/sepolgen: allow any policy statement in if(n)def
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux-notebook: Add policy version 33 requirements
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH v24 23/25] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 02/25] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]