SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: use scnprintf to get real length in sel_read_class
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- RE: [External] Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: make default_noexec read-only after init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4.19 011/115] afs: Fix SELinux setting security label on /afs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 020/191] afs: Fix SELinux setting security label on /afs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 13/25] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] LSM: Drop security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinuxfs: use scnprinft to get real length for inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinuxfs: use scnprinft to get real length for inode
- From: liuyang34 <yangliuxm34@xxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: use scnprinft to get real length in sel_read_class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- [PATCH] selinuxfs: use scnprinft to get real length in sel_read_class
- From: liuyang34 <yangliuxm34@xxxxxxxxx>
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v13 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: remove set but not used variable 'sidtab'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: remove set but not used variable 'sidtab'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: hui yang <yanghui.def@xxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: hui yang <yanghui.def@xxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- RE: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Lionel Landwerlin <lionel.g.landwerlin@xxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- incorrect sysfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 6/8] core: add support for MAC checks on unit install operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 8/8] core: add notes to D-Bus interfaces about adding SELinux checks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 7/8] core: implement the sd-bus generic callback for SELinux
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 5/8] core: make SELinux access permissions more distinct
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/8] core: bookkeeping withdrawal path of masked units
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/8] selinux-access: log warning on context acquisition failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/8] selinux-util: increase log severity
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 0/8] systemd: improve SELinux support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 9/9] drivers/oprofile: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 8/9] drivers/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 6/9] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 5/9] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 3/9] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Lionel Landwerlin <lionel.g.landwerlin@xxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: James Morris <jmorris@xxxxxxxxx>
- mcstrans doesn't translate for s0 level (thus, doesn't work in mcs policy)
- From: Denis Obrezkov <denisobrezkov@xxxxxxxxx>
- Re: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: "Lubashev, Igor" <ilubashe@xxxxxxxxxx>
- Re: [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "watch" - Problem when using kernel >= 5.4
- From: Alexander Wetzel <alexander@xxxxxxxxxxxxxx>
- [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- [PATCH v2 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Connor Kuehl <cipkuehl@xxxxxxxxx>
- Re: "watch" - Problem when using kernel >= 5.4
- From: Dominick Grift <dac.override@xxxxxxxxx>
- "watch" - Problem when using kernel >= 5.4
- From: Alexander Wetzel <alexander@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Dan Aloni <dan@xxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Dan Aloni <dan@xxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: James Morris <jamorris@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary selinux cred request
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary selinux cred request
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux namespaces working branch rebased
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: remove unnecessary selinux cred request
- From: Shaokun Zhang <zhangshaokun@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Stephane Eranian <eranian@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] python/semanage: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH 2/8] afs: Fix SELinux setting security label on /afs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] python/semanage: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [pcmoore-selinux:next 3/6] lsm_audit.c:undefined reference to `lockdown_reasons'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fall back to ref-walk if audit is required
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/4] afs: Fix SELinux setting security label on /afs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: check variable type of port before trying to split
- From: Joshua Schmidlkofer <joshland@xxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux_testsuite: Add socketpair test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 3/3] perf tool: extend Perf tool with CAP_SYS_PERFMON support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v1 2/3] perf/core: apply CAP_SYS_PERFMON to CPUs and kernel monitoring
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v1 1/3] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Will Deacon <will@xxxxxxxxxx>
- Re: perf and cap_syslog
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- perf and cap_syslog
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [V3 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [V3 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GitHub] An email address was added to your account.
- From: GitHub <noreply@xxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] selinux_testsuite: Add socketpair test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [V2 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V2] selinux_testsuite: Add socketpair test
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux_testsuite: Add socketpair test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux_testsuite: Add socketpair test
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [V2 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- ANN: SELinux userspace release 2019-12-04 / 3.0
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [GIT PULL] SELinux patches for v5.5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v6] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] travis: improve selinuxfs mocking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v6] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.5
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH testsuite v6] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH v3] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH v2] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] travis: improve selinuxfs mocking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: update the dependencies in README.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] travis: improve selinuxfs mocking
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v5] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.5
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v4] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite v4] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v5] selinux: cache the SID -> context string translation
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v3] policy: use the kernel_request_load_module() interface
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: general protection fault in selinux_socket_sendmsg (2)
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- general protection fault in selinux_socket_sendmsg (2)
- From: syzbot <syzbot+314db21f0d5c1f53856c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy: check for module_request support for key_socket
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH testsuite] policy: check for module_request support for key_socket
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC 3/3] cil: qualify roles from symtable when resolving userprefix
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 2/3] semanage: do not default prefix to "user"
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC 1/3] libsemanage: fall back to valid "object_r" role instead of "user" prefix string
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: fall back to ref-walk if audit is required
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V5] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 3.0-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 25/25] AppArmor: Remove the exclusive flag
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 05/25] net: Prepare UDS for security module stacking
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v11 01/25] LSM: Infrastructure management of the sock security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] Fix: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Fix: check variable type of port before trying to split
- From: Joshua Schmidlkofer <joshua@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Travis-CI: Drop Python 2 from matrix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite v4 3/3] travis: test building the test policy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v8] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v8] selinux: sidtab: reverse lookup hash table
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712
- From: Dominick Grift <dac.override@xxxxxxxxx>
- RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] Travis-CI: Drop Python 2 from matrix
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 0/2] Avoid blocking in selinux inode callbacks on RCU walk
- From: Will Deacon <will@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]