SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] Add a concept of a "secure" anonymous file
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled documentation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Use native filesystem for fs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: drop error return from is_selinux_enabled documentation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.5 182/542] selinux: fall back to ref-walk if audit is required
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.5 181/542] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.5 190/542] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.5 249/542] selinux: ensure we cleanup the internal AVC counters on error in avc_update()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.5 417/542] selinux: fix regression introduced by move_mount(2) syscall
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.4 157/459] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 158/459] selinux: fall back to ref-walk if audit is required
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 216/459] selinux: ensure we cleanup the internal AVC counters on error in avc_update()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.5 190/542] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.4 357/459] selinux: fix regression introduced by move_mount(2) syscall
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 080/252] selinux: fall back to ref-walk if audit is required
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 085/252] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 115/252] selinux: ensure we cleanup the internal AVC counters on error in avc_update()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.4 166/459] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 3/3] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH 0/3] SELinux support for anonymous inodes and UFFD
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH 1/3] Add a new LSM-supporting anonymous inode interface
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH 2/3] Teach SELinux about anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: optimize storage of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: factor out loop body from filename_trans_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Use native filesystem for fs tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] testsuite: add further nfs tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Use native filesystem for fs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Use native filesystem for fs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Use native filesystem for fs tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH userspace v2] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace] libsepol/cil: remove unnecessary hash tables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Andrea Arcangeli <aarcange@xxxxxxxxxx>
- FYI: selinux/working-selinuxns branch has been updated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: factor out loop body from filename_trans_read()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: optimize storage of filename transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Andrea Arcangeli <aarcange@xxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: [PATCH v2 1/6] Add a new flags-accepting interface for anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 2/6] Add a concept of a "secure" anonymous file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] Add a new flags-accepting interface for anonymous inodes
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH userspace] libsepol: cache ebitmap cardinality value
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/2] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: factor out loop body from filename_trans_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/2] Optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] security: selinux: allow per-file labeling for bpffs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] selinux: generalize evaluate_cond_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] selinux: convert cond_expr to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] selinux: convert cond_av_list to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] selinux: convert cond_list to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] selinux: simplify evaluate_cond_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add the quota package to the list of deps in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Binder goto brexit fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Harden userfaultfd
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] Add a concept of a "secure" anonymous file
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 5/6] Let userfaultfd opt out of handling kernel-mode faults
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 4/6] Wire UFFD up to SELinux
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 6/6] Add a new sysctl for limiting userfaultfd to user mode faults
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 3/6] Teach SELinux about a new userfaultfd class
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 1/6] Add a new flags-accepting interface for anonymous inodes
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- [PATCH v2 0/6] Harden userfaultfd
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: optimize storage of filename transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add the quota package to the list of deps in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled.3
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: factor out loop body from filename_trans_read()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] Optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add the quota package to the list of deps in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: add the quota package to the list of deps in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace] libsepol/cil: remove unnecessary hash tables
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] label_file.c: Fix MAC build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.6 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.6 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] label_file.c: Fix MAC build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: Eliminate use of security_compute_user()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Travis-CI: test that DEBUG build works
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: Test to trace kernel bug in fsconfig(2) with nfs
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v3] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] label_file.c: Fix MAC build
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH 2/2] Travis-CI: test that DEBUG build works
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace] libsepol/cil: remove unnecessary hash tables
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v3] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] security: selinux: allow per-file labeling for bpffs
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: drop error return from is_selinux_enabled.3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH userspace] libsepol/cil: remove unnecessary hash tables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libselinux: drop error return from is_selinux_enabled.3
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2] security: selinux: allow per-file labeling for bpffs
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security/selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] security: selinux: allow per-file labeling for bpffs
- From: Steven Moreland <smoreland@xxxxxxxxxx>
- Re: [PATCH v3 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add additional key permission tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: security/selinux: Add support for new key permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add watch_sb and watch_mount checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/2] userspace: Fix DEBUG=1 build
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] Travis-CI: test that DEBUG build works
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] libsemanage: preserve parent Makefile's flags in debug mode
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 2/2] semodule: support changing policyvers via command line
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 1/2] libsemanage: support changing policy version via API
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 0/2] userspace: Allow changing version of kernel policy built by semodule
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Test to trace kernel bug in fsconfig(2) with nfs
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Test to trace kernel bug in fsconfig(2) with btrfs
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix typo in filesystem name
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [PATCH] selinux: fix sidtab string cache locking
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix typo in filesystem name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: sel_avc_get_stat_idx should increase position index
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Binder goto brexit fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IPv6 netmask in nodecon statement
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- IPv6 netmask in nodecon statement
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] testsuite: enable running over labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: sel_avc_get_stat_idx should increase position index
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] selinux-testsuite: Test all mount option context types
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Test all mount option context types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Test all mount option context types
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add watch_sb and watch_mount checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2020
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] rangetranstion in cil fails and doesn't produce explanatory output
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security/selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] libsepol: Add 'key_perms' policy capability
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: security/selinux: Add support for new key permissions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- security/selinux: Add support for new key permissions
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sidtab string cache locking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix typo in filesystem name
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- rangetranstion in cil fails and doesn't produce explanatory output
- From: Denis Obrezkov <denisobrezkov@xxxxxxxxx>
- [PATCH v3 5/5] selinux: generalize evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 2/5] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 4/5] selinux: convert cond_expr to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 3/5] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 1/5] selinux: simplify evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3 0/5] selinux: Assorted simplifications and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: fix sidtab string cache locking
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH] libsepol: Add 'key_perms' policy capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add additional key permission tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add additional key permission tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] selinux: Fix typo in filesystem name
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- [PATCH v2] selinux: sel_avc_get_stat_idx should increase position index
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Binder goto brexit fix
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow kernfs symlinks to inherit parent directory context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] sel_avc_get_stat_idx should increase position index
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selinux: generalize evaluate_cond_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: convert cond_expr to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] selinux: convert cond_av_list to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] selinux: convert cond_list to array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move status variables out of selinux_ss
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3 1/2] testsuite: provide support for testing labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2 2/2] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2 1/2] testsuite: provide support for testing labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] testsuite: provide support for testing labeled NFS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] testsuite: add further nfs tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] testsuite: add further nfs tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add watch_sb and watch_mount checks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add watch_sb and watch_mount checks
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] testsuite: provide support for testing labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] testsuite: enable running over labeled NFS
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] testsuite/policy: fixes for running on a labeled NFS mount
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] testsuite/policy: fixes for running on a labeled NFS mount
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow kernfs symlinks to inherit parent directory context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: allow kernfs symlinks to inherit parent directory context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v4] libsepol, checkpolicy: remove use of hardcoded security class values
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy: support omitting unused initial sid contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol, checkpolicy: support omitting unused initial sid contexts
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH v2] selinux: allow kernfs symlinks to inherit parent directory context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol,checkpolicy: support omitting unused initial sid contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CIL: another segfault producer
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: syzbot <syzbot+61cba5033e2072d61806@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: CIL: another segfault producer
- From: "Lawrence, Stephen" <slawrence@xxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: possible deadlock in sidtab_sid2str_put
- From: syzbot <syzbot+61cba5033e2072d61806@xxxxxxxxxxxxxxxxxxxxxxxxx>
- CIL: another segfault producer
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH userspace v2 4/4] Makefile: always build with -fno-common
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- possible deadlock in sidtab_sid2str_put
- From: syzbot <syzbot+61cba5033e2072d61806@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.6
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove unused initial SIDs and improve handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace v2 0/4] Fix build with -fno-common
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: question about fs sid
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v4] libsepol, checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: question about fs sid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- question about fs sid
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH V2 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Problems with the selinux-testsuite and GCC v10?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow kernfs symlinks to inherit parent directory context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow kernfs symlinks to inherit parent directory context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: move variable definitions out of binder_common.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow kernfs symlinks to inherit parent directory context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: allow kernfs symlinks to inherit parent directory context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: move variable definitions out of binder_common.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: export flush_class_cache(), call it on policyload
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2 0/4] Fix build with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2 0/4] Fix build with -fno-common
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/1] sel_avc_get_stat_idx should increase position index
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH] selinux: seq_file .next functions should increase position index
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH v14 23/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 21/23] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 13/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 05/23] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 01/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: move variable definitions out of binder_common.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Problems with the selinux-testsuite and GCC v10?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Problems with the selinux-testsuite and GCC v10?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: any reason why a class mapping is not able to solve permissionx?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [Non-DoD Source] Re: any reason why a class mapping is not able to solve permissionx?
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] testsuite/policy: fixes for running on a labeled NFS mount
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace v2 4/4] Makefile: always build with -fno-common
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: SELinux: How to split permissions for keys?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux: How to split permissions for keys?
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH userspace v2 0/4] Fix build with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 4/4] Makefile: always build with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/4] libsepol: remove leftovers of cil_mem_error_handler
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 3/4] checkpolicy: remove unused te_assertions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/4] libsepol: fix CIL_KEY_* build errors with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH userspace 3/4] checkpolicy: remove unused te_assertions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/4] Fix build with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 4/4] Makefile: always build with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 3/4] checkpolicy: remove unused te_assertions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/4] libsepol: fix CIL_KEY_* build errors with -fno-common
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Anju T Sudhakar <anju@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: update man pages for userspace policy enforcers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: any reason why a class mapping is not able to solve permissionx?
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] libselinux: export flush_class_cache(), call it on policyload
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V7 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v5 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 09/10] drivers/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 08/10] parisc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH V7 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V7 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move status variables out of selinux_ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selinux: generalize evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] selinux: convert cond_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: any reason why a class mapping is not able to solve permissionx?
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: any reason why a class mapping is not able to solve permissionx?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- any reason why a class mapping is not able to solve permissionx?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: update man pages for userspace policy enforcers
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: update man pages for userspace policy enforcers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] selinux: move status variables out of selinux_ss
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v3] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v2 3/5] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 4/5] selinux: convert cond_expr to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 5/5] selinux: generalize evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/5] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/5] selinux: Assorted simplifications and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Lucas Stach <dev@xxxxxxxxxx>
- [PATCH v2] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix wrong buffer types in policydb.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V6 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: fix wrong buffer types in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/6] selinux: convert cond_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] selinux: generalize evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] selinux: convert cond_expr to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] selinux: convert cond_av_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] selinux: fix sparse warnings in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 4/6] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 6/6] selinux: generalize evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 5/6] selinux: convert cond_expr to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/6] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: implement move_mount hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V5 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: implement move_mount hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V4 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: implement move_mount hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- RE: [External] Re: [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- RE: [External] Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: make default_noexec read-only after init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] libselinux: add policy capability test binary
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/3] libselinux: add policy capability test binary
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/3] libsepol: add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 0/3] Add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]