SELinux - Date Index
[Prev Page][Next Page]
- Re: Wrong processes in AVC denials
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Wrong processes in AVC denials
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] secilc/docs: fix use of TMPDIR
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v2] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Wrong processes in AVC denials
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] secilc/docs: fix use of TMPDIR #240
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v17 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v17 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v17 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v17 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fedora VM On Travis for Testing
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Fedora VM On Travis for Testing
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: fsync final files before rename
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] keys: Move permissions checking decisions into the checking code
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] keys: Move permissions checking decisions into the checking code
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux: add note to avoid permissions with _perms suffix
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: Configuring MLS with a daemon operating at multiple sensitivities
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Configuring MLS with a daemon operating at multiple sensitivities
- From: Paul Tagliamonte <paultag@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: drop broken warning on duplicate filename transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] libsemanage: fsync final files before rename
- From: Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsemanage: fsync before rename
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsemanage: fsync before rename
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsemanage: fsync before rename
- From: Smalley <stephen.smalley.work@xxxxxxxxx>
- The selinux/working-selinuxns branch has been rebased on top of selinux/next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] secilc: Fix policy optimization test
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] mcstransd: fix memory leak in new_context_str
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 1/3] fs: unexport kernel_read_file()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] python/sepolicy: silence new flake8 warnings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] mcstransd: fix memory leak in new_context_str
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] secilc: Fix policy optimization test
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: netlabel: Remove unused inline function selinux_netlbl_conn_setsid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolicy: silence new flake8 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] python/sepolicy: silence new flake8 warnings
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] run-flake8: Filter out ./.git/ directory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] python/sepolicy: silence new flake8 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: [PATCH] mcstransd: fix memory leak in new_context_str
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] mcstransd: fix memory leak in new_context_str
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5 testsuite 07/15] test_policy.if: use term_use_all_ptys() instead of unconfined_devpts_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 testsuite 07/15] test_policy.if: use term_use_all_ptys() instead of unconfined_devpts_t
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 07/15] test_policy.if: use ptynode instead of unconfined_devpts_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] run-flake8: Filter out ./.git/ directory
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] chcat: don't crash if access to binary policy is prohibited
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] chcat: don't crash if access to binary policy is prohibited
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: netlabel: Remove unused inline function selinux_netlbl_conn_setsid
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] tests/filesystem: fix quotas_test
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 10/15] policy: Add defaultrange rules for overlay tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 05/15] test_inet_socket.te: switch from generic_port to _all_unreserved_ports()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 03/15] test_ibendport.te: use dev_rw_infiniband_mgmt_dev()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 04/15] test_global.te: allow test domains to statfs selinuxfs
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 06/15] test_sctp.te: make netlabel_peer_t a MCS-constrained type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 12/15] policy/Makefile: conditionalize setting of allow_domain_fd_use
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 15/15] README.md: Add instructions for Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 13/15] tests/cap_userns: set /proc/sys/kernel/unprivileged_userns_clone if needed
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 14/15] tests/mmap: skip /dev/zero tests if /dev is noexec
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 11/15] test_filesystem.te,tests/{fs_}filesystem: do not force user identity to system_u
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 09/15] policy: Add MCS constraint on peer recv
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 07/15] test_policy.if: use ptynode instead of unconfined_devpts_t
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 08/15] test_overlayfs.te: allow test_overlay_mounter_t to read user tmp files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 02/15] test_execute_no_trans.te: stop using mmap_file_perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 01/15] test_capable_net.te: remove corenet_tcp/udp_sendrecv_all_ports()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 testsuite 00/15] Update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v2] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Chirantan Ekbote <chirantan@xxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2020
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Fwd: [PATCH] selinux-testsuite: update to work on Debian
- From: Dac Override <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add missing errno setup
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux-testsuite: update to work on Debian
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] sepolgen: parse gen_tunable as bool
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Intent to release 3.1-rc1
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Intent to release 3.1-rc1
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3] tree-wide: introduce PYTHON_SETUP_ARGS to customize setup.py calls on Debian
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 2/3] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 3/3] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/3] selinux: specialize symtab insert and search functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/3] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add missing errno setup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] libselinux: Add missing errno setup
- From: Richard Filo <rfilo@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add missing errno setup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/tests: drop ncurses dependency
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libselinux: Add missing errno setup
- From: Richard Filo <rfilo@xxxxxxxxxx>
- Re: [PATCH v2] sepolicy: fix some typos and port definitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix return value on error in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: fix return value on error in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/4] selinux: simplify range_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: fuse doesn't use security_inode_init_security?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] README: add much useful information
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: drop ncurses dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] tree-wide: introduce PYTON_SETUP_ARGS to customize setup.py calls on Debian
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] scripts/env_use_destdir: propagate PREFIX, LIBDIR, BINDIR, etc.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] scripts/env_use_destdir: fix Fedora support
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] README: add much useful information
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] libsepol/tests: drop ncurses dependency
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] sepolicy: fix some typos and port definitions
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: properly handle multiple messages in selinux_netlink_send()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.7 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: properly handle multiple messages in selinux_netlink_send()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] sepolicy: fix some typos and port definitions
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolicy: fix some typos and port definitions #230
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] sepolicy-gui: fix columns in transitions view #232
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 2/2] restorecond: Use pkg-config to get locations for systemd units
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] restorecond: Rename restorecond-user.service to restorecond_user.service
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH 2/2] SELinux: Introduce hash3() as alternative to shift-xor
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 1/2] SELinux: Add median to debug output of hash table stats
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 0/2] SELinux: Improve hashing
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH] sepolicy-gui: fix columns in transitions view #232
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Daemon cannot execute python
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Daemon cannot execute python
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in policydb_read()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] sepolicy: fix some typos and port definitions #230
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH -next] selinux: fix error return code in policydb_read()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [v4] Annotate Deprecated Functions in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Race condition during policy load in kernel
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 3/4] selinux: prepare for inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/4] selinux: do not allocate hashtabs dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 4/4] selinux: complete the inlining of hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/4] selinux: simplify range_write()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/4] Inline some hashtab functions to improve performance
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] libselinux: mount selinuxfs noexec and nosuid
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setsebool: report errors from commit phase
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] restorecond/user: handle SIGTERM properly
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Race condition during policy load in kernel
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4 18/18] Makefile: swig build allow deprecated functions
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 17/18] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 12/18] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 16/18] matchpathcon: allow use of deprecated routines
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 15/18] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 14/18] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 13/18] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 11/18] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 10/18] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 09/18] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 08/18] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 07/18] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 06/18] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 05/18] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 04/18] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 03/18] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 02/18] security_load_booleans: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 01/18] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- [v4] Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] python/semanage: Use ipaddress module instead of IPy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V2 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH -next] selinux: fix error return code in cond_read_list()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] setsebool: report errors from commit phase
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 13/19] avc: create internal avc_init interface
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] setsebool: report errors from commit phase
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v3 13/19] avc: create internal avc_init interface
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: selinux_netlink_send changes program behavior
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] python/semanage: Use ipaddress module instead of IPy
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- selinux_netlink_send changes program behavior
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] Convert README to README.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] Convert README to README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Convert README to README.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: ebitmap_node ate over 40GB of memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH 1/1] python/semanage: check rc after getting it
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: don't produce incorrect filename_trans_count
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2 4/4] perf docs: introduce security.txt file to document related issues
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 0/4] perf: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [tip: perf/core] drivers/oprofile: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] drivers/perf: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] drm/i915/perf: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] parisc/perf: open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf tools: Support CAP_PERFMON capability
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] trace/bpf_trace: Open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf/core: Open access to the core for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] perf/core: open access to probes for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] capabilities: Introduce CAP_PERFMON to kernel and user space
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- [tip: perf/core] powerpc/perf: open access for CAP_PERFMON privileged process
- From: "tip-bot2 for Alexey Budankov" <tip-bot2@xxxxxxxxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] python/semanage: check rc after getting it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v3 19/19] Makefile: swig build allow deprecated functions
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 18/19] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 15/19] matchpathcon: create internal matchpathcon interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 17/19] matchpathcon: allow use of deprecated routines
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 16/19] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 14/19] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 13/19] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 12/19] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 11/19] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 10/19] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 09/19] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 08/19] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 07/19] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 06/19] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 05/19] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 04/19] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 03/19] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 02/19] security_load_booleans: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 01/19] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- [v3] Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- RE: Annotate Deprecated Functions in libselinux
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: Deprecated Annotations in libselinux
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] python/semanage: check rc after getting it
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] selinux: don't produce incorrect filename_trans_count
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Run tests using remote server
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 16/60] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 14/60] drivers/oprofile: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 13/60] drivers/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 12/60] parisc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 11/60] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 10/60] trace/bpf_trace: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 08/60] perf tools: Support CAP_PERFMON capability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 07/60] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 2/2] semodule: mention ignoredirs setting in genhomedircon man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: mark security_context_t typedef as deprecated
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/1] python/semanage: check rc after getting it
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux,libsemanage: remove double blank lines
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Deprecated Annotations in libselinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2] selinux: implement new format of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] selinux: move context hashing under sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: hash context structure directly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: store role transitions in a hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] selinux: hash context structure directly
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v3 2/2] selinux: move context hashing under sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/2] Hash context structures directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.7 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.7 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: implement new format of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] tree-wide: use python module importlib instead of the deprecated imp
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: implement new format of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 17/18] utils: matchpathcon to use interal interfaces
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 18/18] utils: matchpathcon add deprecated warning
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 16/18] selinux_check_passwd_access: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 15/18] matchpathcon: create internal matchpathcon interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 14/18] matchpathcon: create internal matchpathcon_fini interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 13/18] avc: create internal avc_init interface
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 09/18] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 12/18] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 11/18] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 10/18] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 07/18] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 08/18] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 06/18] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 05/18] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 04/18] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 02/18] security_load_booleans: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 03/18] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 01/18] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v2 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: hash context structure directly
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: implement new format of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: store role transitions in a hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: move context hashing under sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] Hash context structures directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: implement new format of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: store role transitions in a hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: implement new format of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: store role transitions in a hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: hash context structure directly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: drop unnecessary smp_load_acquire() call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Deprecated Annotations in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] libsemanage: fix linker script symbol versions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: ebitmap_node ate over 40GB of memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- ebitmap_node ate over 40GB of memory
- From: 郭彬 <anole1949@xxxxxxxxx>
- Re: [PATCH -next] selinux: fix warning Comparison to bool
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tree-wide: use python module importlib instead of the deprecated imp
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 0/2] setfiles: Add -E option to treat conflicting specifications as errors.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: free str on error in str_read()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] selinux: free str on error in str_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 8/9] SELinux: Replace custom hash with generic lookup3 in symtab
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] SELinux: Replace custom hash in avtab with generic lookup3 from the library
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/9] SELinux: Expose filename_tr hash table sizing via Kconfig
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] SELinux: Replace custom hash with generic lookup3 in symtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 4/9] SELinux: Replace custom hash in avtab with generic lookup3 from the library
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 7/9] SELinux: Expose filename_tr hash table sizing via Kconfig
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH v2] tree-wide: use python module importlib instead of the deprecated imp
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: fix warning Comparison to bool
- From: Zou Wei <zou_wei@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- semodule -i and load_policy coredumps on version 3.0 - not latest GIT
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: Siarhei Liakh <siarhei.liakh@xxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Coverity: filename_trans_read_one(): Resource leaks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] libsemanage: fix linker script symbol versions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsemanage: fix linker script symbol versions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 12/26] parisc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 11/26] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 13/26] drivers/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 16/26] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 14/26] drivers/oprofile: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 08/26] perf tools: Support CAP_PERFMON capability
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 10/26] trace/bpf_trace: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 07/26] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- [PATCH 3/3] restorecond/user: handle SIGTERM properly
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] restorecond: add systemd user service
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/3] restorecond: migrate to GDbus API provided by glib-gio
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH 1/2] libsemanage: fix linker script symbol versions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2 2/2] libsemanage: rm semanage_module_upgrade_info from map
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 1/2] libsemanage: fix linker script symbol versions
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 1/2] libsemanage: fix linker script symbol versions
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] libsemanage: fix linker script symbol versions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/2] setfiles: Add -E option to treat conflicting specifications as errors.
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: fix linker script symbol versions
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: fix linker script symbol versions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Duplicate versions of libsemanage symbols
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libsemanage: fix linker script symbol versions
- From: bill.c.roberts@xxxxxxxxx
- Re: Duplicate versions of libsemanage symbols
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Duplicate versions of libsemanage symbols
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] tree-wide: use python module importlib instead of the deprecated imp
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/3] libselinux: make context_*_set() return -1 when an error occurs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/3] libselinux: copy the reason why selinux_status_open() returns 1
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH 1/1] fix building against musl and uClibc libc libraries.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] selinux: move context hashing under sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: hash context structure directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Hash context structures directly
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 9/9] SELinux: Expose netport hash table sizing via Kconfig
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 8/9] SELinux: Replace custom hash with generic lookup3 in symtab
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 7/9] SELinux: Expose filename_tr hash table sizing via Kconfig
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 5/9] SELinux: Expose AVTab sizing tunables via Kconfig
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 6/9] SELinux: Replace custom hash with generic lookup3 in policydb
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 4/9] SELinux: Replace custom hash in avtab with generic lookup3 from the library
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 3/9] SELinux: Expose AVC sizing tunables via Kconfig
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 2/9] SELinux: Use Bob Jenkins' lookup3 hash in AVC
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- [PATCH 1/9] SELinux: Introduce "Advanced Hashing" Kconfig option
- From: siarhei.liakh@xxxxxxxxxxxxxxxxx
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: drop unnecessary smp_load_acquire() call
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Question about shell_exec_t
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v2 1/1] fix building against musl and uClibc libc libraries.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v2 1/1] fix building against musl and uClibc libc libraries.
- Re: [PATCH 1/1] fix building against musl and uClibc libc libraries.
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/1] fix building against musl and uClibc libc libraries.
- From: Adam Duskett <aduskett@xxxxxxxxx>
- Re: [PATCH 1/1] fix building against musl and uClibc libc libraries.
- From: Adam Duskett <aduskett@xxxxxxxxx>
- RE: [PATCH 1/1] fix building against musl and uClibc libc libraries.
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add notify gitignore file
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/1] fix building against musl and uClibc libc libraries.
- Re: [PATCH v16 19/23] LSM: Verify LSM display sanity in binder
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 13/23] LSM: Specify which LSM to display
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2] selinux: store role transitions in a hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Question about shell_exec_t
- From: Joe Nall <joe@xxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH] tree-wide: install python libraries on Debian with appropriate option
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] tree-wide: use python module importlib instead of the deprecated imp
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] tree-wide: install python libraries on Debian with appropriate option
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: libsepol releases
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v16 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 21/23] Audit: Add a new record for multiple object LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]