SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH V7 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V7 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: move status variables out of selinux_ss
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selinux: generalize evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] selinux: convert cond_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: any reason why a class mapping is not able to solve permissionx?
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: any reason why a class mapping is not able to solve permissionx?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- any reason why a class mapping is not able to solve permissionx?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: update man pages for userspace policy enforcers
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: update man pages for userspace policy enforcers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] selinux: move status variables out of selinux_ss
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v3] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH v2 3/5] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 4/5] selinux: convert cond_expr to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 5/5] selinux: generalize evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/5] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/5] selinux: Assorted simplifications and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
- From: Lucas Stach <dev@xxxxxxxxxx>
- [PATCH v2] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix wrong buffer types in policydb.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V6 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V6 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: fix wrong buffer types in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/6] selinux: convert cond_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] selinux: generalize evaluate_cond_node()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] selinux: convert cond_expr to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] selinux: convert cond_av_list to array
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix sparse warnings in policydb.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: map RTM_GETLINK to a privileged permission
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] selinux: fix sparse warnings in policydb.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 4/6] selinux: convert cond_av_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 6/6] selinux: generalize evaluate_cond_node()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 5/6] selinux: convert cond_expr to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/6] selinux: convert cond_list to array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/6] selinux: simplify security_preserve_bools()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/6] selinux: Assorted simplifications and cleanups
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: remove flask.h and av_permissions.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: implement move_mount hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Perf Data on LSM in v5.3
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH V5 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V5 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: implement move_mount hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V4 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: implement move_mount hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- RE: [External] Re: [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V3 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- RE: [External] Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- [PATCH] selinux: remove redundant selinux_nlmsg_perm
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH] selinux: remove redundant allocation and helper functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: make default_noexec read-only after init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/prlimit: avoid invalid limit combinations
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] libselinux: add policy capability test binary
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/3] libselinux: add policy capability test binary
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] libselinux: add security_is_policy_capabilty_enabled()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/3] libsepol: add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 0/3] Add policy capability for systemd overhaul
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove redundant msg_msg_alloc_security
- From: Huaisheng Ye <yehs2007@xxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: use scnprintf to get real length in sel_read_class
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- RE: [External] Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race
- From: Huaisheng HS1 Ye <yehs1@xxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: make default_noexec read-only after init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4.19 011/115] afs: Fix SELinux setting security label on /afs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 020/191] afs: Fix SELinux setting security label on /afs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] selinux: deprecate setting checkreqprot to 1
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 13/25] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Documentation,selinux: fix references to old selinuxfs mount point
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] selinux: treat atomic flags more carefully
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] LSM: Drop security_delete_hooks()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinuxfs: use scnprinft to get real length for inode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinuxfs: use scnprinft to get real length for inode
- From: liuyang34 <yangliuxm34@xxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinuxfs: use scnprinft to get real length in sel_read_class
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] security: selinux: allow per-file labelling for binderfs
- From: Hridya Valsaraju <hridya@xxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- [PATCH] selinuxfs: use scnprinft to get real length in sel_read_class
- From: liuyang34 <yangliuxm34@xxxxxxxxx>
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v13 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v13 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: remove set but not used variable 'sidtab'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: remove set but not used variable 'sidtab'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: hui yang <yanghui.def@xxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel
- From: Ravi Kumar Siddojigari <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] netnode.c : fix sel_netnode_hash be destroyed
- From: hui yang <yanghui.def@xxxxxxxxx>
- Re: [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] systemd: improve SELinux support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- RE: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Lionel Landwerlin <lionel.g.landwerlin@xxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: incorrect sysfs contexts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- incorrect sysfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 6/8] core: add support for MAC checks on unit install operations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 8/8] core: add notes to D-Bus interfaces about adding SELinux checks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 7/8] core: implement the sd-bus generic callback for SELinux
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 5/8] core: make SELinux access permissions more distinct
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/8] core: bookkeeping withdrawal path of masked units
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/8] selinux-access: log warning on context acquisition failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/8] selinux-util: increase log severity
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 0/8] systemd: improve SELinux support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4 9/9] drivers/oprofile: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 8/9] drivers/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 6/9] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 5/9] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 3/9] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Lionel Landwerlin <lionel.g.landwerlin@xxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: James Morris <jmorris@xxxxxxxxx>
- mcstrans doesn't translate for s0 level (thus, doesn't work in mcs policy)
- From: Denis Obrezkov <denisobrezkov@xxxxxxxxx>
- Re: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: "Lubashev, Igor" <ilubashe@xxxxxxxxxx>
- Re: [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "watch" - Problem when using kernel >= 5.4
- From: Alexander Wetzel <alexander@xxxxxxxxxxxxxx>
- [PATCH] selinux: move pkey sid cache based retrieval under defconfig
- From: "Ravi Kumar Siddojigari" <rsiddoji@xxxxxxxxxxxxxx>
- [PATCH v2 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [RFC PATCH 1/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-testsuite: Add filesystem tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Connor Kuehl <cipkuehl@xxxxxxxxx>
- Re: "watch" - Problem when using kernel >= 5.4
- From: Dominick Grift <dac.override@xxxxxxxxx>
- "watch" - Problem when using kernel >= 5.4
- From: Alexander Wetzel <alexander@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: randomize layout of key structures
- From: Dan Aloni <dan@xxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Dan Aloni <dan@xxxxxxxxxxxx>
- Re: [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: randomize layout of key structures
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Does anyone use RANDSTRUCT?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [RFC PATCH] selinux: clean up selinux_enabled/disabled
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] selinux-testsuite: fix tun_tap checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: James Morris <jamorris@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary selinux cred request
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove unnecessary selinux cred request
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux namespaces working branch rebased
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: remove unnecessary selinux cred request
- From: Shaokun Zhang <zhangshaokun@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Stephane Eranian <eranian@xxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] python/semanage: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] LSM: allow an LSM to disable all hooks at once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] mcstrans: start early and stop late
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- [PATCH 2/8] afs: Fix SELinux setting security label on /afs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] python/semanage: check variable type of port before trying to split
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] selinux-testsuite: add lockdown tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V4] selinux-testsuite: Add kernel module tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [pcmoore-selinux:next 3/6] lsm_audit.c:undefined reference to `lockdown_reasons'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH] security: add an interface to lookup the lockdown reason
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: fall back to ref-walk if audit is required
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: cache the SID -> context string translation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: Looks like issue in handling active_nodes count in 4.19 kernel .
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/4] afs: Fix SELinux setting security label on /afs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Looks like issue in handling active_nodes count in 4.19 kernel .
- From: <rsiddoji@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: reorder hooks to make runtime disable less broken
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] python/semanage: check variable type of port before trying to split
- From: Joshua Schmidlkofer <joshland@xxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V2] selinux_testsuite: Add socketpair test
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
- From: Alexey Budankov <alexey.budankov@xxxxxxxxxxxxxxx>
- Re: [PATCH v9] selinux: sidtab: reverse lookup hash table
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]