SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v16 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: store role transitions in a hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: store role transitions in a hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing errno setup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: store role transitions in a hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libselinux: Add missing errno setup
- From: Richard Filo <rfilo@xxxxxxxxxx>
- Re: [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- libsepol releases
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCH 0/2] setfiles: Add -E option to treat conflicting specifications as errors.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] setfiles: Add -E option to treat conflicting specifications as errors.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Add selinux_restorecon option to treat conflicting specifications as an error.
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add notify gitignore file
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux-testsuite: Add notify gitignore file
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 09/12] drivers/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 08/12] parisc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 07/12] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 03/12] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v5 3/3] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix all those pesky denials breaking my computer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Fix all those pesky denials breaking my computer
- From: Sultan Alsawaf <sultan@xxxxxxxxxxxxxxx>
- ANN: SETools 4.3.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
- From: Yuehaibing <yuehaibing@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux patches for v5.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [GIT PULL] SELinux patches for v5.7
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
- From: syzbot <syzbot+9bc8c4f42b3e1d0274fe@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v2 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: clean up indentation issue with assignment statement
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: clean up indentation issue with assignment statement
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol,checkpolicy: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] userspace: Implement new format of filename trans rules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: implement new format of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v4 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v4 3/3] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v3 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3 3/3] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v3 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v3 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: PR 193 sitting for uClibC fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: PR 193 sitting for uClibC fix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] cil: drop remaining dso.h include
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: PR 193 sitting for uClibC fix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] cil: drop remaining dso.h include
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: PR 193 sitting for uClibC fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: PR 193 sitting for uClibC fix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- PR 193 sitting for uClibC fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 2/2] cil: re-enable DISABLE_SYMVER define
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 1/2] cil: rm dead dso.h file
- From: bill.c.roberts@xxxxxxxxx
- cil: Fix DISABLE_SYMVER support and drop last dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] cil: drop remaining dso.h include
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] cil: drop remaining dso.h include
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] Wire UFFD up to SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] tree-wide: replace last occurrences of security_context_t
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: add missing forward declaration
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 4/4] libsemanage: cleanup linker map file
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH V2 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: testing for disable-dontaudit in C code
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: testing for disable-dontaudit in C code
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- testing for disable-dontaudit in C code
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 4/4] libsemanage: cleanup linker map file
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- RE: [PATCH] tree-wide: replace last occurrences of security_context_t
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH] checkpolicy: add missing forward declaration
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- [PATCH] tree-wide: replace last occurrences of security_context_t
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy: add missing forward declaration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] libsemanage: cleanup linker map file
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 3/4] libsemanage: update linker script
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 2/4] libsemanage/Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 1/4] libsemanage: drop hidden
- From: bill.c.roberts@xxxxxxxxx
- libsemanage: drop dso infrastructure
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] cil: drop remaining dso.h include
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsepol: set correct second argument of (t1 == t2) constraint
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/bpf: ask for unlimited RLIMIT_MEMLOCK
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] Add tests for default_range glblub
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] cil: drop remaining dso.h include
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] cil: drop remaining dso.h include
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol: speed up policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: optimize inner loop in build_type_map()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: skip unnecessary check in build_type_map()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Arnaldo Carvalho de Melo <arnaldo.melo@xxxxxxxxx>
- Re: [PATCH] libsepol: set correct second argument of (t1 == t2) constraint
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH v4] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH v3] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] libsepol: set correct second argument of (t1 == t2) constraint
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: set correct second argument of (t1 == t2) constraint
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] secilc: add basic test for policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Looking for help testing patch attestation
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: Looking for help testing patch attestation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looking for help testing patch attestation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Looking for help testing patch attestation
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- checkpolicy does not forward (t1 == t2) constraint correctly
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] libsepol: speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: optimize inner loop in build_type_map()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: skip unnecessary check in build_type_map()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Policy module to allow a domain transition
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: Policy module to allow a domain transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Policy module to allow a domain transition
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] secilc: add basic test for policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] secilc: add basic test for policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] secilc: add basic test for policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 5/5] selinux-testsuite: add testing for unprivileged sandboxing capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 4/5] selinux-testsuite: add tests/sandbox/rxdir_rx_allow.cil
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 3/5] selinux-testsuite: add tests/sandbox/rxdir_no_allow.cil
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 2/5] selinux-testsuite: add tests/sandbox/nodir_rx_allow.cil
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH 1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] selinux: add unprivileged sandboxing capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] secilc: add basic test for policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] libsepol,secilc,policycoreutils: add unprivileged sandboxing capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] selinux: add unprivileged sandboxing capability
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] secilc: add basic test for policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update my email address
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH testsuite] tests/bpf: ask for unlimited RLIMIT_MEMLOCK
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/bpf: ask for unlimited RLIMIT_MEMLOCK
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Add tests for default_range glblub
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/bpf: ask for unlimited RLIMIT_MEMLOCK
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] libsepol, checkpolicy: remove use of hardcoded security class values
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Update my email address
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Treat invalid characters as an error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not check flavor when checking for duplicate parameters
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check if name is a macro parameter first
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 3/3] lbespol: remove wild cards in mapfile
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 1/3] libsepol/dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 2/3] libsepol/Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- V2 libsepol drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH 1/2] libsepol/dso: drop hidden_proto and hidden_def
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/dso: drop hidden_proto and hidden_def
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Treat invalid characters as an error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [RFC V3 PATCH 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V3 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V3 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] checkpolicy: Treat invalid characters as an error
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v15 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol/Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 1/2] libsepol/dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- libsepol drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] Revert "libsepol: cache ebitmap cardinality value"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not check flavor when checking for duplicate parameters
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check if name is a macro parameter first
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 13/23] LSM: Specify which LSM to display
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 05/23] net: Prepare UDS for security module stacking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH v15 01/23] LSM: Infrastructure management of the sock security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol: drop dso question on CFLAGS (package maintainers weigh in please)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: avtab_init() and cond_policydb_init() return void
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: libsepol: drop dso question on CFLAGS (package maintainers weigh in please)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: James Carter <jwcart2@xxxxxxxxx>
- libsepol: drop dso question on CFLAGS (package maintainers weigh in please)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: avtab_init() and cond_policydb_init() return void
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avtab_init() and cond_policydb_init() return void
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: avtab_init() and cond_policydb_init() return void
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up error path in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] checkpolicy: Add --werror flag to checkmodule and checkpolicy to treat warnings as errors.
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [RFC PATCH v2] libsepol/cil: raise default attrs_expand_size to 2
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] libsepol/cil: raise default attrs_expand_size to 2
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Do not check flavor when checking for duplicate parameters
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Check if name is a macro parameter first
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Fwd: strange issue with name-base type trans
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Fwd: strange issue with name-base type trans
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Fwd: strange issue with name-base type trans
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: strange pam selinux issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: strange pam selinux issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: clean up error path in policydb_init()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: strange pam selinux issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] NFS: Ensure security label is set for root inode
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] libsepol/cil: raise default attrs_expand_size to 2
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: clean up error path in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- strange pam selinux issue
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] NFS: Ensure security label is set for root inode
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH testsuite] tests: add test for default_range glblub support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] Revert "libsepol: cache ebitmap cardinality value"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: clean up error path in policydb_init()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [V4] libselinux: drop dso.h
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: clean up error path in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] Revert "libsepol: cache ebitmap cardinality value"
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests: add test for default_range glblub support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: target context of security:setbool permission check
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 4/4] libselinux: drop symbols from map
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 3/4] Makefile: add linker script to minimize exports
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 1/4] dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v4 2/4] Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- [V4] libselinux: drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: target context of security:setbool permission check
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: optimize inner loop in build_type_map()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- target context of security:setbool permission check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: optimize inner loop in build_type_map()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH V2] libsepol: Create the macro ebitmap_is_empty() and use it where needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Serge Hallyn <serge@xxxxxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsepol: make ebitmap_cardinality() of linear complexity
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] Makefile: add -fno-semantic-interposition
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v3 3/4] Makefile: add linker script to minimize exports
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: check libsepol version
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- ANN: Reference Policy 2.20200229
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH testsuite v2] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] Makefile: add linker script to minimize exports
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 0/3] libsepol: Speed up policy optimization
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: wrong secmark labels for ipsec packets from local service
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3 4/4] libselinux: drop symbols from map
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 3/4] Makefile: add linker script to minimize exports
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 1/4] dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v3 2/4] Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- [V3] libselinux: drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH v2 4/4] libselinux: drop symbols from map
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Please revert SELinux/keys patches from the keys linux-next branch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] libselinux: drop symbols from map
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Please revert SELinux/keys patches from the keys linux-next branch
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: wrong secmark labels for ipsec packets from local service
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] libselinux: drop symbols from map
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 1/4] dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 3/4] Makefile: add linker script to minimize exports
- From: bill.c.roberts@xxxxxxxxx
- [PATCH v2 2/4] Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- [V2] libselinux: drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH 2/3] Makefile: add -fno-semantic-interposition
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] Makefile: add -fno-semantic-interposition
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 3/3] Makefile: add linker script to minimize exports
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 3/3] Makefile: add linker script to minimize exports
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsemanage: check libsepol version
- From: bill.c.roberts@xxxxxxxxx
- Re: [PATCH testsuite v2] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemange: add missing header sepol/policydb.h
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsemange: add missing header sepol/policydb.h
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] selinux: remove unused initial SIDs and improve handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Please revert SELinux/keys patches from the keys linux-next branch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 3/3] Makefile: add linker script to minimize exports
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 1/3] dso: drop hidden_proto and hidden_def
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 2/3] Makefile: add -fno-semantic-interposition
- From: bill.c.roberts@xxxxxxxxx
- libselinux: drop dso.h
- From: bill.c.roberts@xxxxxxxxx
- [PATCH] libsemange: add missing header sepol/policydb.h
- From: bill.c.roberts@xxxxxxxxx
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Ulrich Drepper <drepper@xxxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Ulrich Drepper <drepper@xxxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Fwd: strange issue with name-base type trans
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: wrong secmark labels for ipsec packets from local service
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Fwd: strange issue with name-base type trans
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Allow nfs test script to close cleanly
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH 3/3] libsepol: speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/3] libsepol: skip unnecessary check in build_type_map()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/3] libsepol: optimize inner loop in build_type_map()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/3] libsepol: Speed up policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- wrong secmark labels for ipsec packets from local service
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: make ebitmap_cardinality() of linear complexity
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] libsepol: Create the macro ebitmap_is_empty() and use it where needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V2] libsepol: Create the macro ebitmap_is_empty() and use it where needed
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/1] libsepol: make ebitmap_cardinality() of linear complexity
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 08/17] checkPasswdAccess: annotate deprecated
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Annotate Deprecated Functions in libselinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 17/17] utils/matchpathcon: allow use of deprecated funcs
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 16/17] src/matchpathcon: allow use of deprecated funcs
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 15/17] avc_open: mark allowed use of avc_init
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 14/17] selinux_internal.h: disable warnings on deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 13/17] src/selinux_internal.h: fix hidden_proto indents
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 12/17] avc_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 11/17] matchpathcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 10/17] matchpathcon_fini: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 09/17] matchpathcon_init: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 08/17] checkPasswdAccess: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 07/17] sidput: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 06/17] sidget: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 04/17] selinux_users_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 05/17] rpm_execcon: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 03/17] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 02/17] selinux_booleans_path: annotate deprecated
- From: bill.c.roberts@xxxxxxxxx
- [PATCH 01/17] security_load_booleans: update return comment
- From: bill.c.roberts@xxxxxxxxx
- Annotate Deprecated Functions in libselinux
- From: bill.c.roberts@xxxxxxxxx
- Re: How to see SELinux denials late at shutdown
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/getconlist: add verbose switch to print more information
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH V2] selinux-testsuite: Allow nfs test script to close cleanly
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH testsuite v2] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Fwd: [PATCH v4] selinux: remove unused initial SIDs and improve handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v15 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- strange issue with name-base type trans
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC V2 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V2 PATCH 2/2] selinux-testsuite: Use native filesystem for tests - Part 2
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V2 PATCH 1/2] selinux-testsuite: Use native filesystem for tests - Part 1
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC V2 PATCH 0/2] selinux-testsuite: Use native filesystem for tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/sctp: fix setting of the SCTP_EVENTS sockopt
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: ❌ FAIL: Test report for kernel 5.4.22-rc2-b0b4130.cki (stable)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: reduce the use of hard-coded hash sizes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Add xfs quota command types
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reduce the use of hard-coded hash sizes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: optimize storage of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH V2] selinux-testsuite: Allow nfs test script to close cleanly
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix Ru translation of failsafe context
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.5 190/542] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux: Add xfs quota command types
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Add xfs quota command types
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Allow nfs test script to close cleanly
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux: Add xfs quota command types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux: Add xfs quota command types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Create the macro ebitmap_is_empty() and use it where needed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] testsuite: add further nfs tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux/getconlist: add verbose switch to print more information
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Test to trace NFS unlabeled bug
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: Test to trace NFS unlabeled bug
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Test to trace NFS unlabeled bug
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux support in virtio-fs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux support in virtio-fs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Create the macro ebitmap_is_empty() and use it where needed
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [selinux-internal] SELinux support in virtio-fs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/2] libsepol: grow hashtab dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] libsepol,newrole: remove unused hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] libsepol: Grow hashtab dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: grow hashtab dynamically
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: grow hashtab dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol, newrole: remove unused hashtab functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: grow hashtab dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] libsepol,newrole: remove unused hashtab functions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] libsepol: Grow hashtab dynamically
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [RFC PATCH] libselinux: deprecate security_compute_user(), update man pages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Use ebitmap_length() to check for an empty ebitmap
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 09/12] drivers/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 08/12] parisc/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 07/12] powerpc/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 03/12] perf/core: open access to probes for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v15 23/23] AppArmor: Remove the exclusive flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v15 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: optimize storage of filename transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled documentation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix Ru translation of failsafe context
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Use native filesystem for fs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Use native filesystem for fs tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Duplicate hashtab code in libsepol vs. policycoreutils/newrole?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: optimize storage of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Fix Ru translation of failsafe context
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH v6] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: reduce the use of hard-coded hash sizes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 09/12] drivers/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 08/12] parisc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 07/12] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 03/12] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Duplicate hashtab code in libsepol vs. policycoreutils/newrole?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v15 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 21/23] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 20/23] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]