SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 09/13] policy_languages: Tidy up
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 04/13] network_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 08/13] policy_config_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux: Fix selabel_lookup() for the root dir.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] socket.7,unix.7: add initial description for SO_PEERSEC
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH] socket.7,ip.7: Document SO_PEERSEC for AF_INET sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 06/13] objects: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: Change userspace AVC setenforce and policy load messages to audit format.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: Change userspace AVC setenforce and policy load messages to audit format.
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix neverallow checking involving classmaps
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: Add additional log callback details in man page for auditing.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 11/13] polyinstantiation: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 12/13] rbac: Minor format fix
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: classmapping with empty permissionset and neverallow leads to invalid policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix neverallow checking involving classmaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4] selinux: Add helper functions to get and set checkreqprot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Add additional log callback details in man page for auditing.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: Change userspace AVC setenforce and policy load messages to audit format.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 1/1] libselinux: Revise userspace AVC avc_log() for auditable events.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/13] modular_policy_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] socket.7,unix.7: add initial description for SO_PEERSEC
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- secilc compiles invalid policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] selinux: allow dontauditx rules to take effect without allowx
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v2] socket.7,unix.7: add initial description for SO_PEERSEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: allow dontauditx rules to take effect without allowx
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] selinux: Add helper functions to get and set checkreqprot
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add helper functions to get and set checkreqprot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add helper functions to get and set checkreqprot
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 02/13] mac: Tidy formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: allow dontauditx rules to take effect without allowx
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Behavior of extended permissions
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH v4] cil_access_vector_rules: allowx, auditallowx and dontauditx fixes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- classmapping with empty permissionset and neverallow leads to invalid policy
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux: Fix selabel_lookup() for the root dir.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/1] libselinux: Fix selabel_lookup() for the root dir.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Fix selabel_lookup() for the root dir.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] libselinux: Fix selabel_lookup() for the root dir.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] socket.7,unix.7: add initial description for SO_PEERSEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/22] SELinux Notebook: Convert batch 3 to markdown/tidy up
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] reference_policy: Tidy up formatting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: access policycaps with READ_ONCE/WRITE_ONCE
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH V2] network_support: Update LibreSwan configuration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] socket.7,unix.7: add initial description for SO_PEERSEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] socket.7,unix.7: add initial description for SO_PEERSEC
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- [PATCH 04/22] policy_config_files: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 02/22] mls_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Behavior of extended permissions
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] socket.7,unix.7: add initial description for SO_PEERSEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 07/22] security_context: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 13/22] type_enforcement: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 12/22] toc: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 06/22] postgresql: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 01/22] kernel_policy_language: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 19/22] vm_support: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 21/22] xen_statements: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 18/22] userspace_libraries: Tidy up formatting, add toc
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 22/22] xperm_rules: Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: access policycaps with READ_ONCE/WRITE_ONCE
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 15/22] types_of_policy: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v3] cil_access_vector_rules: allowx, auditallowx and dontauditx fixes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH 09/22] selinux_overview: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] cil_access_vector_rules: fixes a typo, clarifies auditallowx/dontauditx
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] cil_access_vector_rules: fixes a typo
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH 08/22] selinux_cmds: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 03/22] object_classes_permissions: : Tidy up formatting
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 11/22] subjects: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add helper functions to get and set checkreqprot
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Validate conditional expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Validate constraint expressions before adding to binary policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: Add helper functions to get and set checkreqprot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] newrole: support cross-compilation with PAM and audit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] sched: only issue an audit on privileged operation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v20 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC PATCH] sched: only issue an audit on privileged operation
- From: peterz@xxxxxxxxxxxxx
- [PATCH v2] cil_network_labeling_statements: fixes nodecon examples
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH V2] network_support: Update LibreSwan configuration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] network_support: Update LibreSwan configuration
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] cil_network_labeling_statements: fixes nodecon examples
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] network_support: Update LibreSwan configuration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v8 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] network_support: Update LibreSwan configuration
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v20 20/23] Audit: Add new record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] network_support: Update LibreSwan configuration
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] xperm_rules: add two notes
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v20 19/23] LSM: Verify LSM display sanity in binder
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 14/23] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 02/23] LSM: Create and manage the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v20 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] xperm_rules: add two notes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] sched: only issue an audit on privileged operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v20 20/23] Audit: Add new record for multiple process LSM attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] SELinux Notebook: Convert batch 2 to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Give an error when constraint expressions exceed max depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Invalid output by secilc with constraints containing 4 nested OR and a single AND
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v20 20/23] Audit: Add new record for multiple process LSM attributes
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v20 20/23] Audit: Add new record for multiple process LSM attributes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 00/13] SELinux Notebook: Convert batch 2 to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/Makefile: add kernel version check for watchkey
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: add nftables to dependencies to run more tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: bump connect timeout to 4 seconds
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/13] SELinux Notebook: Convert batch 2 to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/Makefile: add kernel version check for watchkey
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] newrole: support cross-compilation with PAM and audit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] tests/Makefile: add kernel version check for watchkey
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] sched: do not issue an audit on unprivileged operation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Options to audit2allow and manpage phrasing
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Options to audit2allow and manpage phrasing
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] sched: do not issue an audit on unprivileged operation
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Re: [PATCH] Optimize the calculation of security.sehash
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 00/13] SELinux Notebook: Convert batch 2 to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 01/13] libselinux_functions: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] sched: do not issue an audit on unprivileged operation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] Optimize the calculation of security.sehash
- From: liwugang <liwugang@xxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 00/18] SELinux Notebook: Convert batch 1 to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] newrole: support cross-compilation with PAM and audit
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] newrole: do not rely on hard-coded audith and pamh paths
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] newrole: do not rely on hard-coded audith and pamh paths
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v8 1/3] Add a new LSM-supporting anonymous inode interface
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] Optimize the calculation of security.sehash
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] Optimize the calculation of security.sehash
- From: liwugang <liwugang@xxxxxxx>
- Re: [PATCH 1/1] libselinux: Add new log callback levels for enforcing and policy load notices.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- RE: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Robert Judy <rjudy@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: initialize last_policyload in selinux_status_open()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: add nftables to dependencies to run more tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: bump connect timeout to 4 seconds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: simplify away security_policydb_len()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Hiding names of unreadable files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Hiding names of unreadable files
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH v2 1/3] IMA: Generalize early boot measurement of asymmetric keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] IMA: Support measurement of generic data during early boot
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] IMA: Support early boot measurement of critical data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] IMA: Generalize early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/6] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Add new log callback levels for enforcing and policy load notices.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: simplify away security_policydb_len()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3] selinux: simplify away security_policydb_len()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: simplify away security_policydb_len()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: simplify away security_policydb_len()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selinux: remove the 'initialized' flag from selinux_state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: move policy mutex to selinux_state, use in lockdep checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selinux: remove the 'initialized' flag from selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 3/3] selinux: remove the 'initialized' flag from selinux_state
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: Add new log callback levels for enforcing and policy load notices.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH testsuite] travis: add nftables to dependencies to run more tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/sctp: bump connect timeout to 4 seconds
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: eliminate the redundant policycap array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: move policy mutex to selinux_state, use in lockdep checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v8 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v8 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v8 3/3] Wire UFFD up to SELinux
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v8 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux: Remove trailing slash on selabel_file lookups.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: use full argument specifiers for security_check_context in man page
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] sepolgen: sort extended rules like normal ones
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2] selinux: move policy mutex to selinux_state, use in lockdep checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v20 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 20/23] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH v20 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v20 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix error handling bugs in security_load_policy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 3/3] selinux: remove the 'initialized' flag from selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: eliminate the redundant policycap array
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: simplify away security_policydb_len()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/3] selinux: simplify away security_policydb_len()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 3/3] selinux: remove the 'initialized' flag from selinux_state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/3] selinux: eliminate the redundant policycap array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/3] selinux: RCU conversion follow-ups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: move policy mutex to selinux_state, use in lockdep checks
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Userspace AVC auditing on policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Userspace AVC auditing on policy load
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] libselinux: initialize last_policyload in selinux_status_open()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] libselinux: safely access shared memory in selinux_status_updated()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: fix error handling bugs in security_load_policy()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC V2 PATCH 1/2] selinux-testsuite: Run tests using remote server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V2 PATCH 2/2] selinux-testsuite: Run SCTP tests using remote server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V2 PATCH 0/2] selinux-testsuite: Run tests using remote server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Update SCTP asconf client/server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix error handling bugs in security_load_policy()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: drop symbol versioning from libsepol and libsemanage?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v7 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [bug report] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] selinux: remove the 'initialized' flag from selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] selinux: remove the 'initialized' flag from selinux_state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] selinux: simplify away security_policydb_len()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] selinux: remove the 'initialized' flag from selinux_state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/3] selinux: simplify away security_policydb_len()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Handle early boot data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/2] selinux_status_ changes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] libselinux: initialize last_policyload in selinux_status_open()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] libselinux: safely access shared memory in selinux_status_updated()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/3] selinux: track policy lifetime with refcount
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 2/3] selinux: remove the 'initialized' flag from selinux_state
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 1/3] selinux: simplify away security_policydb_len()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 0/3] selinux: RCU conversion follow-ups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [bug report] selinux: encapsulate policy state, refactor policy load
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [bug report] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [bug report] selinux: encapsulate policy state, refactor policy load
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: fix a race condition in security_read_policy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [bug report] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix a race condition in security_read_policy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4] selinux: convert policy read-write lock to RCU
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [bug report] selinux: encapsulate policy state, refactor policy load
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 12/18] core_components: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 11/18] constraint_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 17/18] implementing_seaware_apps: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 08/18] computing_security_contexts: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 16/18] global_config_files: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 06/18] class_permission_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 18/18] infiniband_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 15/18] file_labeling_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 10/18] configuration_files: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 07/18] computing_access_decisions: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 09/18] conditional_statements: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 13/18] default_rules: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 14/18] domain_object_transitions: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 05/18] cil_overview: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 04/18] bounds_rules: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 03/18] avc_rules: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 01/18] apache_support: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 02/18] auditing: Convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 00/18] SELinux Notebook: Convert batch 1 to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2 0/2] selinux: Clean up GFP flag usage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/2] selinux: drop the gfp_t argument from str_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7 1/3] Add a new LSM-supporting anonymous inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [net PATCH] netlabel: fix problems with mapping removal
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] selinux: Clean up GFP flag usage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] selinux: drop the gfp_t argument from str_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: switch unnecessary GFP_ATOMIC allocs to GFP_KERNEL
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Convert terminology.md to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Convert terminology.md to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] libselinux: Remove trailing slash on selabel_file lookups.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: refactor wrapper in sestatus.c for safe shared memory access
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: drop symbol versioning from libsepol and libsemanage?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] sepolgen: sort extended rules like normal ones
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/1] libselinux: Remove trailing slash on selabel_file lookups.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] sepolgen: print extended permissions in hexadecimal
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] libselinux: Remove trailing slash on selabel_file lookups.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: Convert terminology.md to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: use full argument specifiers for security_check_context in man page
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: policy_config_files.md convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: Add denied trace with permssion filter
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- [no subject]
- From: Peter Enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux-notebook: kernel_policy_language.md convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: safely access shared memory in selinux_status_updated()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libselinux: initialize last_policyload in selinux_status_open()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: refactor wrapper in sestatus.c for safe shared memory access
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v3 2/2] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security: selinux: delete repeated words in comments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix a race condition in security_read_policy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix a race condition in security_read_policy()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: fix a race condition in security_read_policy()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: fix a race condition in security_read_policy()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 2/2] selinux: fix a race condition in sel_open_policy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: fix a race condition in security_read_policy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Fix race conditions when reading out policy data
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix a race condition in security_read_policy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: add tracepoint on audited events
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v6] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] libselinux: use kernel status page by default
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Administrivia
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: add basic filtering for audit trace events
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: add tracepoint on audited events
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [net-next PATCH] netlabel: fix problems with mapping removal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [net PATCH] netlabel: fix problems with mapping removal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v7 3/3] Wire UFFD up to SELinux
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [net-next PATCH] netlabel: fix problems with mapping removal
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH v2 3/3] IMA: define IMA hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a race condition in security_read_policy()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: fix a race condition in security_read_policy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selinux: add basic filtering for audit trace events
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 1/2] selinux: add tracepoint on audited events
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 2/2] selinux: add basic filtering for audit trace events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v4 1/2] selinux: add tracepoint on audited events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v4 0/2] selinux: add detailed tracepoint on audited events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] selinux: Create new booleans and class dirs out of tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v6 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: permit removing security.selinux xattr before policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [net-next PATCH] netlabel: fix problems with mapping removal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v6 0/3] SELinux support for anonymous inodes and UFFD
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: permit removing security.selinux xattr before policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] libselinux: Remove trailing slash on selabel_file lookups.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite v3 2/2] travis: run the full testsuite on a Fedora VM
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v3 1/2] README: add perl-lib as a dependency
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/4] selinux: Create new booleans and class dirs out of tree
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux: use full argument specifiers for security_check_context in man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v4] selinux: convert policy read-write lock to RCU
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] selinux: enable proper lockdep checking for policy rcu access
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: fix memdup.cocci warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix memdup.cocci warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: fix memdup.cocci warnings
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- [PATCH testsuite v3 0/2] Run full testsuite on Fedora in Travis CI
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3 2/2] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3 1/2] README: add perl-lib as a dependency
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: avoid dereferencing the policy prior to initialization
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: working-selinuxns rebase
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid dereferencing the policy prior to initialization
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v3] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH v3] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 1/2] sepolgen: print extended permissions in hexadecimal
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] sepolgen: sort extended rules like normal ones
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: Working to enable SELinux on OpenWrt
- From: "W. Michael Petullo" <mike@xxxxxxxx>
- Re: [PATCH] selinux: avoid dereferencing the policy prior to initialization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: avoid dereferencing the policy prior to initialization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH][next] selinux: fix allocation failure check on newpolicy->sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Working to enable SELinux on OpenWrt
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH][next] selinux: fix allocation failure check on newpolicy->sidtab
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH][next] selinux: fix allocation failure check on newpolicy->sidtab
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Linux-next: Kernel panic - not syncing: Fatal exception in interrupt - RIP: 0010:security_port_sid
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH] selinux: Use call_rcu for policydb and booleans
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH] selinux: convert policy read-write lock to RCU
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [RFC PATCH v2] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Working to enable SELinux on OpenWrt
- From: "W. Michael Petullo" <mike@xxxxxxxx>
- Re: [RFC PATCH] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux: convert policy read-write lock to RCU
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Working to enable SELinux on OpenWrt
- From: "W. Michael Petullo" <mike@xxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] selinux: add basic filtering for audit trace events
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 1/3] selinux: add tracepoint on audited events
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20200818
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: drop symbol versioning from libsepol and libsemanage?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- working-selinuxns rebase
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: refactor changing booleans
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] selinux: move policy commit after updating selinuxfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux,selinux: update mdp to enable policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/3] selinux: add permission names to trace event
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Resource usage of CIL compared to HLL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH v2] fixfiles: correctly restore context of mountpoints
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: fix build order
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Resource usage of CIL compared to HLL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Resource usage of CIL compared to HLL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 1/3] selinux: add tracepoint on audited events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v3 0/3] selinux: add detailed tracepoint on audited events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v3 3/3] selinux: add permission names to trace event
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v3 2/3] selinux: add basic filtering for audit trace events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v5] secilc/docs: document expandtypeattribute
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Resource usage of CIL compared to HLL
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- httpd blocked from http_cache_port_t
- From: Robert Nichols <RNichols42@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Creation of repo for Linear Assured Pipeline work
- From: Peter Whittaker <pww@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- Re: potential memory leak in netlbl_mgmt_add_common
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: drop symbol versioning from libsepol and libsemanage?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: drop symbol versioning from libsepol and libsemanage?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH 0/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- potential memory leak in netlbl_mgmt_add_common
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: add basic filtering for audit trace events
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: add tracepoint on denials
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]