SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 053/141] selinux: Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] mls_mcs.md: Convert section to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: David Sterba <dave@xxxxxxxx>
- Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Jonathan Corbet <corbet@xxxxxxx>
- [pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces)
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 5/6] libsepol/cil: Use the macro NODE() whenever possible
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/6] libsepol/cil: Remove unnecessary assignment in cil_resolve_name_keep_aliases()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/6] libsepol/cil: Remove unused field from struct cil_args_resolve
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 6/6] libspepol/cil: Use the macro FLAVOR() whenever possible
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/6] libsepol/cil: Git rid of unnecessary check in cil_gen_node()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/6] libsepol/cil: cil_tree_walk() helpers should use CIL_TREE_SKIP_*
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/6] libsepol/cil: Various CIL cleanups
- From: James Carter <jwcart2@xxxxxxxxx>
- Rebased selinux/working-selinuxns on top of selinux/next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 21/39] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 27/39] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 34/39] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 26/39] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 23/39] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 30/39] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 20/39] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 22/39] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 25/39] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 28/39] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 32/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 24/39] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 33/39] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 15/39] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 13/39] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 18/39] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 17/39] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 12/39] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 11/39] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 05/39] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 08/39] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 06/39] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 04/39] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.10 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.10 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] python/sepolicy: allow to override manpage date
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop super_block backpointer from superblock_security_struct
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 3/3] selinux_config(5): add a note that runtime disable is deprecated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace] ci: add new dependencies needed by selinux-testsuite
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol: free memory when realloc() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol: free memory when realloc() fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow()
- From: Chen Zhou <chenzhou10@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow()
- From: chenzhou <chenzhou10@xxxxxxxxxx>
- Re: [PATCH userspace] ci: bump Fedora image version to 33
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace] ci: add new dependencies needed by selinux-testsuite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow()
- From: Chen Zhou <chenzhou10@xxxxxxxxxx>
- [PATCH v13 1/4] security: add inode_init_security_anon() LSM hook
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v13 4/4] userfaultfd: use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v13 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH 1/1] libsepol: free memory when realloc() fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace v2 3/3] selinux_config(5): add a note that runtime disable is deprecated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace] ci: bump Fedora image version to 33
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH userspace v2 3/3] selinux_config(5): add a note that runtime disable is deprecated
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/3] selinux(8): explain that runtime disable is deprecated
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/3] selinux(8): mark up SELINUX values
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/3] Update manpages to reflect that runtime SELinux disable is deprecated
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] selinux(8): explain that runtime disable is deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] selinux(8): explain that runtime disable is deprecated
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] selinux(8): explain that runtime disable is deprecated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH userspace] selinux(8): explain that runtime disable is deprecated
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- SElinux bug with docker custom path
- From: Louis MILCENT <louis@xxxxxxxxxx>
- Re: [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: Bug (?) report for secilc and CIL semantics: some unexpected behaviours
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] libsemanage/genhomedircon: check usepasswd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Bug (?) report for secilc and CIL semantics: some unexpected behaviours
- From: Lorenzo Ceragioli <lorenzo.ceragioli@xxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH testsuite] tests/overlay: replace Python script with a C program
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/Makefile: silence modprobe output
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: Inputs for error " libselinux.so.1: cannot open shared object file: No such file or directory "
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Inputs for error " libselinux.so.1: cannot open shared object file: No such file or directory "
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Inputs for error " libselinux.so.1: cannot open shared object file: No such file or directory "
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v12 2/4] fs: add LSM-supporting anon-inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: add inode_init_security_anon() LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v12 1/4] security: add inode_init_security_anon() LSM hook
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v12 4/4] userfaultfd: use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v12 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v12 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v11 2/4] fs: add LSM-supporting anon-inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v11 1/4] security: add inode_init_security_anon() LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH v11 2/4] fs: add LSM-supporting anon-inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v11 3/4] selinux: teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v11 4/4] userfaultfd: use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v11 1/4] security: add inode_init_security_anon() LSM hook
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v11 0/4] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Trond Myklebust <trondmy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
- From: Olga Kornievskaia <olga.kornievskaia@xxxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Changes to Travis Usage
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Possibly unwanted rootcontext= behavior?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: homedir file context definitions
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Possibly unwanted rootcontext= behavior?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Reduce sctp test runtime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling
- From: Sven Schnelle <svens@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v22 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 17/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 18/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 3/3] Use secure anon inodes for userfaultfd
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Reduce sctp test runtime
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Reduce sctp test runtime
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Changes to Travis Usage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Changes to Travis Usage
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- [PATCH] selinux: drop super_block backpointer from superblock_security_struct
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: handle the case of multiple rawhide images
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: fix kernel update check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/overlay: replace Python script with a C program
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/Makefile: silence modprobe output
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Sven Schnelle <svens@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v10 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Sven Schnelle <svens@xxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Sven Schnelle <svens@xxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 1/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 0/4] Test all filesystems by default
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: bump stable fedora version to 33
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: homedir file context definitions
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- homedir file context definitions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH testsuite v2 1/4] README,travis: add e2fsprogs, jfsutils, and dosfstools to deps
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v2 0/4] Test all filesystems by default
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 1/4] README,travis: add e2fsprogs, jfsutils, and dosfstools to deps
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] ci: bump Fedora image version to 33
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] travis: handle the case of multiple rawhide images
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] travis: fix kernel update check
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] ci: bump Fedora image version to 33
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH userspace] ci: bump Fedora image version to 33
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 4/4] tests/[fs_]filesystem: test all filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 3/4] tests/[fs_]filesystem: fix unwanted error output when testing vfat
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 2/4] tests/filesystem: pipe "yes" to mkfs.* to fix jfs test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 1/4] README,travis: add e2fsprogs, jfsutils, and dosfstools to deps
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 0/4] Test all filesystems by default
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite 3/3] tests/[fs_]filesystem: test all filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 3/3] tests/[fs_]filesystem: test all filesystems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2] ci: use parallel build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] test_sctp.te: avoid use of corenet_sctp_bind_generic_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: LABEL_BACKEND_ANDROID add option to enable, rebased
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH testsuite] travis: bump stable fedora version to 33
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 3/3] tests/[fs_]filesystem: test all filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/3] Test all filesystems by default
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/3] tests/filesystem: pipe "yes" to mkfs.* to fix jfs test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/3] README,travis: add e2fsprogs, jfsutils, and dosfstools to deps
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: LABEL_BACKEND_ANDROID add option to enable, rebased
- From: Björn Bidar <bjorn.bidar@xxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2] ci: use parallel build
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] python/sepolicy: allow to override manpage date
- From: "Bernhard M. Wiedemann" <bwiedemann@xxxxxxx>
- [PATCH testsuite] travis: skip kernel update+reboot if it's not necessary
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2] ci: use parallel build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace] ci: use parallel build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] libsemanage/genhomedircon: check usepasswd
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] libsemanage/genhomedircon: check usepasswd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime
- From: Hou Tao <houtao1@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- [PATCH] libsemanage/genhomedircon: check usepasswd
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsemanage/genhomedircon: check usepasswd
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v21 00/23] LSM: Module stacking for AppArmor
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] libsemanage/genhomedircon: check usepasswd in add_user
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] test_sctp.te: avoid use of corenet_sctp_bind_generic_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime
- From: Chen Jun <chenjun102@xxxxxxxxxx>
- Re: [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 09/34] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 08/34] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 15/34] stat: add mapped_generic_fillattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 12/34] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 14/34] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 30/34] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 26/34] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 29/34] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 34/34] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 21/34] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 10/34] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 27/34] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 32/34] overlayfs: handle idmapped lower directories
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 17/34] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 28/34] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 20/34] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 23/34] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 24/34] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 18/34] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 25/34] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 31/34] expfs: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 22/34] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 11/34] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 04/34] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][selinux-notebook] Link to Reference policy
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow dontauditx and auditallowx rules to take effect without allowx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux_file_permission() on pipes/pseudo-files - performance issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsemanage/genhomedircon: check usepasswd in add_user
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] libsemanage/genhomedircon: check usepasswd in add_user
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- selinux_file_permission() on pipes/pseudo-files - performance issue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsemanage/genhomedircon: check usepasswd in add_user
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- [PATCH AUTOSEL 5.9 068/147] selinux: access policycaps with READ_ONCE/WRITE_ONCE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.8 060/132] selinux: access policycaps with READ_ONCE/WRITE_ONCE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Give error for more than one true or false block
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: Ian M <merinian@xxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: Ian M <merinian@xxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: How to avoid relabeling rootfs at every boot
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] tests/sctp: set up a GRE tunnel to activate ASCONF tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: update the kernel and reboot before running the suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/1] tests/keys: fix the KEYCTL_DH_COMPUTE parameter values
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add build option to disable X11 backend
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: Add build option to disable X11 backend
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- How to avoid relabeling rootfs at every boot
- From: Ian M <merinian@xxxxxxxxx>
- Re: [PATCH v17 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tests/sctp: set up a GRE tunnel to activate ASCONF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tests/sctp: fix a race condition in the new ASCONF test
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [RESEND PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] tests/sctp: set up a GRE tunnel to activate ASCONF tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] tests/sctp: fix a race condition in the new ASCONF test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Fix ASCONF test and ensure it can be always run
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: libsepol, libsemanage: drop duplicate and deprecated symbols
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH testsuite] travis: update the kernel and reboot before running the suite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RESEND PATCH v18 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [RESEND PATCH v18 3/4] overlayfs: override_creds=off option bypass creator_cred
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [RESEND PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH v18 3/4] overlayfs: override_creds=off option bypass creator_cred
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH v18 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v17 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v17 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v17 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] libsepol/cil: Give error for more than one true or false block
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V2] libsepol/cil: Give error for more than one true or false block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give error for more than one true or false block
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux: Add build option to disable X11 backend
- From: Björn Bidar <bjorn.bidar@xxxxxxxxx>
- [PATCH] libselinux: LABEL_BACKEND_ANDROID add option to enable it
- From: Björn Bidar <bjorn.bidar@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give error for more than one true or false block
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: drop confusing BUG_ON macro
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] libsepol: silence potential NULL pointer dereference warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: libsepol, libsemanage: drop duplicate and deprecated symbols
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v5.4 v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 v2 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 v2 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 v2 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5.4 1/3] selinux: Create function for selinuxfs directory cleanup
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5.4 3/3] selinux: Create new booleans and class dirs out of tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] libsepol/cil: Give error for more than one true or false block
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v5.4 2/3] selinux: Refactor selinuxfs directory populating functions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 3/3] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 1/3] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: libsepol, libsemanage: drop duplicate and deprecated symbols
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 6/6] libsemanage: Bump libsemanage.so version
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 5/6] libsemanage: Drop deprecated functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/6] libsemanage: Remove legacy and duplicate symbols
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/6] libsepol: Drop deprecated functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 3/6] libsepol: Bump libsepol.so version
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol: Get rid of the old and duplicated symbols
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace] libsepol/cil: fix signed overflow caused by using (1 << 31) - 1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: silence potential NULL pointer dereference warning
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: drop confusing BUG_ON macro
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] lsm_selinux: Convert to Markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] libsepol/cil: fix signed overflow caused by using (1 << 31) - 1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: convert matchpathcon to selabel_lookup()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite 0/1]
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 1/1] tests/keys: fix the KEYCTL_DH_COMPUTE parameter values
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/1]
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 3/3] selinux: Add SELinux GTP support
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: Add SELinux GTP support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add btrfs support for filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: convert matchpathcon to selabel_lookup()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] selinux: Add SELinux GTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.10
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/22] sid_statement: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 00/22] SELinux Notebook: Convert batch 3 to markdown/tidy up
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v21 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 20/23] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 19/23] audit: add support for non-syscall auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 18/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 17/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 16/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 15/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 14/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 07/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 06/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 05/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/13] policy_store_config_files: Add TOC and tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: Add SELinux GTP support
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: Add SELinux GTP support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 17/22] users: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH 05/22] policy_validation_example: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Chuck Lever <chucklever@xxxxxxxxx>
- [PATCH v2 6/6] libsemanage: Bump libsemanage.so version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 4/6] libsemanage: Remove legacy and duplicate symbols
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 5/6] libsemanage: Drop deprecated functions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 2/6] libsepol: Drop deprecated functions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 3/6] libsepol: Bump libsepol.so version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/6] libsepol: Get rid of the old and duplicated symbols
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- libsepol, libsemanage: drop duplicate and deprecated symbols
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] selinux: allow dontauditx and auditallowx rules to take effect without allowx
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [PATCH v9 3/3] Wire UFFD up to SELinux
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 1/3] Add a new LSM-supporting anonymous inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/1] fix error initialization in inode_doinit_with_dentry()
- From: rentianyue@xxxxxxxxxxxxx
- [PATCH v3 1/1] selinux: fix error initialization in inode_doinit_with_dentry()
- From: rentianyue@xxxxxxxxxxxxx
- Re: selinux: how to query if selinux is enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/3] SELinux support for anonymous inodes and UFFD
- From: James Morris <jmorris@xxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [PATCH 4/4] libsemanage: Bump libsemanage.so version
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: selinux: how to query if selinux is enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH 4/4] libsemanage: Bump libsemanage.so version
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 4/4] libsemanage: Bump libsemanage.so version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 14/22] type_statements: Add toc, tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/16] module: Call security_kernel_post_load_data()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/1] libselinux: convert matchpathcon to selabel_lookup()
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/2] libsepol: silence potential NULL pointer dereference warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] libsepol: drop confusing BUG_ON macro
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH userspace] libsepol/cil: fix signed overflow caused by using (1 << 31) - 1
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v4] cil_access_vector_rules: allowx, auditallowx and dontauditx fixes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] cil_network_labeling_statements: fixes nodecon examples
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v5 16/16] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 02/16] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 00/16] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 12/16] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]