SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH v2 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] IMA: define IMA hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 4/4] selinux: Create new booleans and class dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Update SELinuxfs out of tree and then swapover
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v2 1/2] README: add perl-lib as a dependency
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 1/2] README: add perl-lib as a dependency
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 4/4] selinux: Create new booleans, class and policycap dirs out of tree
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] selinux: Refactor selinuxfs directory populating functions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] selinux: Standardize string literal usage for selinuxfs directory names
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] selinux: Create function for selinuxfs directory cleanup
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Update SELinuxfs out of tree and then swapover
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 2/2] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ci: fix stall on git log -1
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] ci: fix stall on git log -1
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] ci: fix stall on git log -1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] ci: fix stall on git log -1
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2] selinux: refactor changing booleans
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v2 2/2] travis: run the full testsuite on a Fedora VM
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux: refactor changing booleans
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [RFC PATCH] selinux: refactor changing booleans
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2 1/2] README: add perl-lib as a dependency
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v5] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v6] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v2 1/2] README: add perl-lib as a dependency
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 2/2] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 1/2] README: add perl-lib as a dependency
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2 0/2] Run full testsuite on Fedora in Travis CI
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] Improve network_support.md
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: Convert terminology.md to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: policy_config_files.md convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v4] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH AUTOSEL 5.8 55/72] scripts/selinux/mdp: fix initial SID handling
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.7 47/58] scripts/selinux/mdp: fix initial SID handling
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v6 1/3] Add a new LSM-supporting anonymous inode interface
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/3] Add a new LSM-supporting anonymous inode interface
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 3/3] Wire UFFD up to SELinux
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 2/3] Teach SELinux about anonymous inodes
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 0/3] SELinux support for anonymous inodes and UFFD
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- drop symbol versioning from libsepol and libsemanage?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: selinux: delete repeated words in comments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] security: selinux: delete repeated words in comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux-notebook: kernel_policy_language.md convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fixfiles: correctly restore context of mountpoints
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5 2/2] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5 1/2] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] travis: run the full testsuite on a Fedora VM
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] scripts/ci: license as MIT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] scripts/selinux,selinux: update mdp to enable policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux_notebook: seandroid.md convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 05/18] xperm_rules: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux_notebook: reference_policy.md convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] scripts/selinux,selinux: update mdp to enable policy capabilities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: move policy commit after updating selinuxfs
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v6 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH v2] fixfiles: correctly restore context of mountpoints
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] libselinux: fix build order
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux_notebook: seandroid.md convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 05/18] xperm_rules: fully convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] selinux: add attributes to avc tracepoint
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 1/2] selinux: add tracepoint on denials
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v3] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v6] type_statements: document expandattribute
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 05/18] xperm_rules: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 00/18] markdown conversions and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v6] type_statements: document expandattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 2/2] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v3] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v3] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v6] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- [SELinux-notebook PATCH v6] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v5] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH v3] selinux: encapsulate policy state, refactor policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v3] selinux: encapsulate policy state, refactor policy load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v6 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 3/3] Wire UFFD up to SELinux
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Label files under HOME_DIR with a range by default
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Label files under HOME_DIR with a range by default
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 05/18] xperm_rules: fully convert to markdown
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] scripts/ci: license as MIT
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] scripts/ci: license as MIT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] selinux: move policy commit after updating selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC,selinux-notebook PATCH 00/18] markdown conversions and cleanups
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- mcstransd does not translate raw to trans context unless in cache
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [SELinux-notebook PATCH v5] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 18/18] x_windows: don't call table 12 a table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 17/18] title: assorted updates
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 16/18] kernel_policy_language: convert the footnotes to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 15/18] all: consolidate multiple blank lines into one
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 13/18] all: unify example formatting (scripts, code, policy, etc) in markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 12/18] all: remove all the <br> tags we haven't gotten to yet
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 11/18] postgresql: update PostgreSQL SELinux Support section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 10/18] type_statements: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 09/18] userspace_libraries: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 08/18] user_statements: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 07/18] vm_support: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 06/18] xen_statements: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 05/18] xperm_rules: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 04/18] x_windows: fully convert to markdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 03/18] css: style improvements
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 02/18] css: identify table layout hacks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 01/18] build: explicitly enable pandoc pipe_tables
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC,selinux-notebook PATCH 00/18] markdown conversions and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.9
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v4] type_statements: document expandattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH v3] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] scripts/ci: license as MIT
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] scripts/ci: license as MIT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] scripts/ci: license as MIT
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] scripts/ci: license as Apache 2.0
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v4] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Label files under HOME_DIR with a range by default
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v3] type_statements: document expandattribute
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] scripts/ci: license as Apache 2.0
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] scripts/ci: license as Apache 2.0
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] scripts/ci: license as Apache 2.0
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v5] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: lnk_file read permission
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: License of userspace CI scripts?
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- License of userspace CI scripts?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: lnk_file read permission
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v6 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- lnk_file read permission
- From: Gionatan Danti <g.danti@xxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] selinux: encapsulate policy state, refactor policy load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] secilc/docs: document expandtypeattribute
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] selinux: encapsulate policy state, refactor policy load
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux avc trace
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] RFC: selinux avc trace
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH] selinux: encapsulate policy-dependent state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v2] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v3] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 23/23] AppArmor: Remove the exclusive flag
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [SELinux-notebook PATCH v2] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] secilc/docs: document expandtypeattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH] type_statements: document expandattribute
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Invalid output by secilc with constraints containing 4 nested OR and a single AND
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Invalid output by secilc with constraints containing 4 nested OR and a single AND
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 17/17] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 03/17] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 02/17] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 05/17] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 16/17] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 14/17] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 15/17] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 13/17] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 00/17] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/17] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 13/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 05/23] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selinux: encapsulate policy-dependent state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Joel Fernandes <joelaf@xxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] selinux: add tracepoint on denials
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Review and update SCTP tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v9] objects.md: some clarifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v19 13/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v19 21/23] Audit: Add a new record for multiple object LSM attributes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v19 13/23] LSM: Specify which LSM to display
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v2] Improve network_support.md
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v9] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] Improve getcon man page
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH v2] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: File context rule not working
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: File context rule not working
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: File context rule not working
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: File context rule not working
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] Improve network_support.md
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- File context rule not working
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Improve network_support.md
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 19/19] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 13/19] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v19 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] Improve getcon man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] selinux: add tracepoint on denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: getcon family: returning success while context is NULL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- getcon family: returning success while context is NULL
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] libselinux: use kernel status page by default
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: add tracepoint on denials
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- [PATCH v3] libselinux: use kernel status page by default
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v9] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v9] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v2] lsm_selinux: document genfs_seclabel_symlinks policy capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v2] lsm_selinux: document genfs_seclabel_symlinks policy capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [RESEND] [PATCHv4 2/2] fuse: Call security hooks on new inodes
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- [RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v5] adds CIL policy with makefile
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] object_classes_permissions: describe bpf and perfmon capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v8] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v2] lsm_selinux: document genfs_seclabel_symlinks policy capability
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v7] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] lsm_selinux: document genfs_seclabel_symlinks policy capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v5] adds CIL policy with makefile
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH] object_classes_permissions: describe bpf and perfmon capabilities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v6] objects.md: some clarifications
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v5] adds CIL policy with makefile
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v5] adds CIL policy with makefile
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] Porting glibc away from deprecated libselinux APIs
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: fix inaccurate description in sestatus
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC] Porting glibc away from deprecated libselinux APIs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix inaccurate description in sestatus
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [RFC] Porting glibc away from deprecated libselinux APIs
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC] Porting glibc away from deprecated libselinux APIs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC] Porting glibc away from deprecated libselinux APIs
- From: Arjun Shankar <arjun.is@xxxxxxxxx>
- Re: [PATCH] policycoreutils: fix inaccurate description in sestatus
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] policycoreutils: fix inaccurate description in sestatus
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [SELinux-notebook PATCH] lsm_selinux: document genfs_seclabel_symlinks policy capability
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Re: [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
- From: David Laight <David.Laight@xxxxxxxxxx>
- [SELinux-notebook PATCH] object_classes_permissions: describe bpf and perfmon capabilities
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [SELinux-notebook PATCH v5] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] selinux: make use of variables when defining libdir and includedir
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v5 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 2/7] pid: use checkpoint_restore_ns_capable() for set_tid
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 1/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [SELinux-notebook PATCH v6] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v4 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [SELinux-notebook PATCH v4] adds CIL policy with makefile
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH] LSM: security_read_selinux_policy() can be static
- From: kernel test robot <lkp@xxxxxxxxx>
- [SELinux-notebook PATCH v4] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v5] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 05/13] fs/kernel_read_file: Split into separate source file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/13] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/13] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/13] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Reporting a use-after-free read bug in userfaultfd_release()
- From: Peilin Ye <yepeilin.cs@xxxxxxxxx>
- Re: [SELinux-notebook PATCH v4] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [SELinux-notebook PATCH v4] objects.md: some clarifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- [PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
- From: "W. Michael Petullo" <mike@xxxxxxxx>
- [PATCH] selinux: make use of variables when defining libdir and includedir
- From: "W. Michael Petullo" <mike@xxxxxxxx>
- [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 5/5] keys: Implement a 'container' keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [SELinux-notebook PATCH v3] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v2] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [SELinux-notebook PATCH] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [SELinux-notebook PATCH] adds CIL policy with makefile
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [SELinux-notebook PATCH v4] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH v3] objects.md: some clarifications
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [SELinux-notebook PATCH] adds CIL policy with makefile
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: ANN: The SELinux Notebook in markdown on GitHub
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Use sestatus if open
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- RE: [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
- From: Nicolas Viennot <Nicolas.Viennot@xxxxxxxxxxxx>
- [PATCH v1 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: RedHat 8 Default Context mismatch
- From: Jason Strauss <jpstrauss1201@xxxxxxxxx>
- Re: RedHat 8 Default Context mismatch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
- From: Adrian Reber <areber@xxxxxxxxxx>
- Fwd: RedHat 8 Default Context mismatch
- From: Jason Strauss <jpstrauss1201@xxxxxxxxx>
- [SELinux-notebook RFC v3] cil-policy is a simple CIL policy with Makefile to get started with
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]