SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 2/2] Fix mcstrans secolor examples
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libsepol: Make an unknown permission an error in CIL
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH v2] selinux: allow labeling before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH v4] Add default_range glblub support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 3/9] libsepol: do not dereference a failed allocated pointer
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: fix string conversion of unknown perms
- From: Mike Palmiotto <mike.palmiotto@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 2/9] libsepol/cil: help static analyzers by aborting when an allocation fails
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 3/9] libsepol: do not dereference a failed allocated pointer
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH v4] Add default_range glblub support
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: cron: SE Linux support uses obsolete API and gets wrong results
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Changing selinux enforcing mode at runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Changing selinux enforcing mode at runtime
- From: Srivatsa Vaddagiri <vatsa.ml@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Changing selinux enforcing mode at runtime
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v4] Add default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Changing selinux enforcing mode at runtime
- From: Srivatsa Vaddagiri <vatsa.ml@xxxxxxxxx>
- Re: [PATCH] lsm: remove current_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: Add key and key_socket tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: Permissions in the udevadm_t domain
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Permissions in the udevadm_t domain
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v8 00/28] LSM: Module stacking for AppArmor
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] lsm: remove current_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: don't break the system after running the cgroups_label tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH v3] Add default_range glblub support
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: don't break the system after running the cgroups_label tests
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] lsm: remove current_security()
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] lsm: remove current_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: don't break the system after running the cgroups_label tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: ensure the cgroups_label tests works on old and new systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH v3] Add default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v8 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: fix residual uses of current_security() for the SELinux blob
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: ensure the cgroups_label tests works on old and new systems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] Add configuration file for lgtm.com
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 9/9] libsepol/tests: do not dereference a NULL pointer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 8/9] python/sepolicy: remove unnecessary pass statement
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 7/9] python/chcat: remove unnecessary assignment
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 6/9] libsepol/cil: do not dereference perm_value_to_cil when it has not been allocated
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 5/9] libsepol: reset *p to NULL if sepol_module_package_create fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 4/9] libsepol: do not dereference scope if it can be NULL
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 3/9] libsepol: do not dereference a failed allocated pointer
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 2/9] libsepol/cil: help static analyzers by aborting when an allocation fails
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/9] semodule-utils: fix comparison with argc
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 0/9] Fix issues found by static analyzers
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libselinux: ensure that digest_len is not zero
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] libsemanage: include internal header to use the hidden function prototypes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Fix many misspellings
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Fix many misspellings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] default_range glblub implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] default_range glblub implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] Add default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH v3] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v8 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 25/28] LSM: Provide an user space interface for the default display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 23/28] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 24/28] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 21/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 20/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 22/28] SELinux: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 19/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 18/28] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 16/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 17/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 15/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 14/28] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 11/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 06/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 07/28] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 04/28] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 05/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 03/28] LSM: Infrastructure management of the key blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 01/28] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] Add default_range glblub support
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] Add default_range glblub support
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] Add default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Michal Kubecek <mkubecek@xxxxxxx>
- Re: [PATCH v2] default_range glblub implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] Add tests for default_range glblub
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: avoid atomic_t usage in sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: ensure the cgroups_label tests works on old and new systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: ensure the cgroups_label tests works on old and new systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] default_range glblub implementation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix the cgroups_label test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix the cgroups_label test
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] default_range glblub implementation
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] Add default_range glblub support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: use netlink_receive hook
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: use netlink_receive hook
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: New skb extension for use by LSMs (skb "security blob")?
- From: David Miller <davem@xxxxxxxxxxxxx>
- New skb extension for use by LSMs (skb "security blob")?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH 2/2] selinux: use netlink_receive hook
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
- From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] selinux: allow labeling before policy is loaded
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] selinux: allow labeling before policy is loaded
- From: Jonathan Lebon <jlebon@xxxxxxxxxx>
- Re: Question about BPF acccess checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Question about BPF acccess checks
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH v3] security, capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Question about BPF acccess checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Question about BPF acccess checks
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC PATCH v3] security,capability: pass object information to security_capable
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v3] security,capability: pass object information to security_capable
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: avoid atomic_t usage in sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V3 2/2] selinux-testsuite: Add BPF support to fdreceive test
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 1/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] security, capability: pass object information to security_capable
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Add BPF tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Jan Kara <jack@xxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] selinux-testsuite: Add BPF tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v7 22/28] SELinux: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 15/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 27/28] LSM: Add /proc attr entry for full LSM context
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 22/28] SELinux: Verify LSM display sanity in binder
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 15/28] LSM: Specify which LSM to display
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] security,capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 16/16] Smack: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 14/16] LSM: Hook for netlabel reconciliation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 15/16] LSM: Avoid network conflicts in SELinux and Smack
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 13/16] LSM: Remember the NLTYPE of netlabel sockets
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 12/16] Netlabel: Provide labeling type to security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 11/16] Netlabel: Add a secattr comparison API function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 10/16] LSM: Change error detection for UDP peer security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 09/16] LSM: Fix for security_init_inode_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 07/16] LSM: Correct handling of ENOSYS in inode_setxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 06/16] LSM: Make multiple MAC modules safe in nfs and kernfs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 05/16] LSM: Multiple modules using security_ismaclabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 08/16] LSM: Infrastructure security blobs for mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 04/16] LSM: List multiple security attributes in security_inode_listsecurity
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 03/16] LSM: Support multiple LSMs using inode_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 02/16] Smack: Detect if secmarks can be safely used
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 01/16] LSM: Single hook called in secmark refcounting
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 00/16] LSM: Full module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 00/16] LSM: Full module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 25/28] LSM: Provide an user space interface for the default display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 24/28] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 23/28] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 20/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 22/28] SELinux: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 21/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 19/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 16/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 17/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 15/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 18/28] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 14/28] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 11/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 07/28] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 05/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 06/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 04/28] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 03/28] LSM: Infrastructure management of the key blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 01/28] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] libselinux: ensure that digest_len is not zero
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: always return a secid from the network caches if we find one
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selinux: policydb - rename type_val_to_struct_array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] selinux: policydb - fix some checkpatch.pl warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: shuffle around policydb.c to get rid of forward declarations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] libsemanage: include internal header to use the hidden function prototypes
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.3 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.3 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Security labeling in NFS4 - who owns it?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Security labeling in NFS4 - who owns it?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: always return a secid from the network caches if we find one
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Security labeling in NFS4 - who owns it?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] d_walk: optionally lock also parent inode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] d_walk: optionally lock also parent inode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] selinux: fix race when removing selinuxfs entries
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2] security,capability: pass object information to security_capable
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- [PATCH V2 0/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] selinux: use d_genocide_safe() in selinuxfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 3/4] dcache: introduce d_genocide_safe()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/4] d_walk: add leave callback
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/4] d_walk: optionally lock also parent inode
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/4] selinux: fix race when removing selinuxfs entries
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: add tests for fsnotify
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH V2 1/2] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid atomic_t usage in sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: shuffle around policydb.c to get rid of forward declarations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/1] selinux-testsuite: Add BPF tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Fix mcstrans secolor examples
- From: Chad Hanson <dahchanson@xxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: initialize a local variable once
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: userfaultfd SELinux support?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- userfaultfd SELinux support?
- From: Nick Kralevich <nnk@xxxxxxxxxx>
- Re: [PATCH] selinux: optimize MLS context to string conversion
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: optimize MLS context to string conversion
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: optimize MLS context to string conversion
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V3 0/2] selinux: Remove legacy local boolean and user code
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] Fix mcstrans secolor examples
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 26/27] LSM: Add /proc attr entry for full LSM context
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Restorecon: factor out a lookup helper for context matches
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 26/27] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 26/27] LSM: Add /proc attr entry for full LSM context
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 24/27] LSM: Provide an user space interface for the default display
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 14/27] LSM: Specify which LSM to display
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 25/27] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 25/27] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- [PATCH v2 1/3] selinux: policydb - fix memory leak in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 3/3] selinux: policydb - rename type_val_to_struct_array
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 2/3] selinux: policydb - fix some checkpatch.pl warnings
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 0/3] selinux: policydb - fix memory leak and do some cleanup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fix memory leak in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/1] libsepol: initialize a local variable once
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/1] libsepol: initialize a local variable once
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] Restorecon: factor out a lookup helper for context matches
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.3 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 01/27] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/27] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/27] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/27] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/27] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/27] LSM: Provide an user space interface for the default display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/27] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/27] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/27] SELinux: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/27] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/27] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/27] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/27] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/27] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/27] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/27] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/27] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/27] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/27] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/27] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/27] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/27] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/27] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/27] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/27] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/27] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/27] LSM: Infrastructure management of the key blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 00/27] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix memory leak in policydb_init()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.3 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Use Python distutils to install SELinux python bindings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- initramfs file-management
- From: Claire Bocharova <claire.bocharova@xxxxxxxxx>
- RE: [PATCH] selinux: avoid atomic_t usage in sidtab
- From: "Gote, Nitin R" <nitin.r.gote@xxxxxxxxx>
- Re: [PATCH] selinux: avoid atomic_t usage in sidtab
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] selinux: avoid atomic_t usage in sidtab
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: fix memory leak in policydb_init()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] selinux: check sidtab limit before adding a new entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] selinux: check sidtab limit before adding a new entry
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Restorecon: factor out a lookup helper for context matches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Restorecon: factor out a lookup helper for context matches
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: memory leak in policydb_read
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2] selinux: check sidtab limit before adding a new entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: check sidtab limit before adding a new entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: check sidtab limit before adding a new entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: "Gote, Nitin R" <nitin.r.gote@xxxxxxxxx>
- Re: [PATCH] selinux: check sidtab limit before adding a new entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: check sidtab limit before adding a new entry
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: check sidtab limit before adding a new entry
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: check sidtab limit before adding a new entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: convert struct sidtab count to refcount_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)
- From: Simon McVittie <smcv@xxxxxxxxxxxxx>
- [PATCH] selinux: convert struct sidtab count to refcount_t
- From: NitinGote <nitin.r.gote@xxxxxxxxx>
- Re: [PATCH] libselinux: Use Python distutils to install SELinux python bindings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH V2] libselinux: Fix security_get_boolean_names build error
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Preferred subj= with multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- [PATCH] libselinux: Use Python distutils to install SELinux python bindings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC] libselinux: Use Python distutils to install SELinux python bindings
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH] security,capability: pass object information to security_capable
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 097/249] selinux: fix empty write to keycreate file
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 085/219] selinux: fix empty write to keycreate file
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 064/158] selinux: fix empty write to keycreate file
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 2/3] mcstrans: Move setrans.conf manpage to section 5
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/3] Add documentation key in systemd .service files
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security, capability: pass object information to security_capable
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] security,capability: pass object information to security_capable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] security,capability: pass object information to security_capable
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH] security,capability: pass object information to security_capable
- From: Nicholas Franck <nhfran2@xxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] selinux-testsuite: add tests for fsnotify
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: add tests for fsnotify
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
- From: Aaron Goidel <acgoide@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: RFC: BUG: overlayfs getxattr recursion leaves a poison sid.
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: RFC: BUG: overlayfs getxattr recursion leaves a poison sid.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RFC: BUG: overlayfs getxattr recursion leaves a poison sid.
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH V2] libselinux: Fix security_get_boolean_names build error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v3 1/4] x86/sgx: Add SGX specific LSM hooks
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix security_get_boolean_names build error
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH V3 0/2] Update restorecon to support new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix security_get_boolean_names build error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH 1/2] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 2/2] setfiles: Update utilities for the new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4 0/2] Update restorecon to support new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 2/2] setfiles: Update utilities for the new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] libselinux: Save digest of all partial matches for directory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH V3 2/2] setfiles: Update utilities for the new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 0/2] Update restorecon to support new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3 1/2] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 02/23] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 23/23] SELinux: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 22/23] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 21/23] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 16/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 20/23] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 18/23] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 14/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 11/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 12/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 13/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 09/23] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 10/23] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 08/23] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 07/23] net: Prepare UDS for secuirty module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 06/23] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 05/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 03/23] LSM: Infrastructure management of the key blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 04/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v5 01/23] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux: Fix security_get_boolean_names build error
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] Fix mcstrans secolor examples
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] Revert "mcstransd select correct colour range."
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Fwd: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fwd: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH ghak57 V2] selinux: format all invalid context as untrusted
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [RFC] libselinux: Use Python distutils to install SELinux python bindings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fwd: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] libselinux: Save digest of all partial matches for directory
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Fwd: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 23/23] AppArmor: Remove the exclusive flag
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 22/23] NET: Store LSM netlabel data in a lsmblob
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 21/23] Audit: Store LSM audit information in an lsmblob
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/23] LSM: security_secid_to_secctx in netlink netfilter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 19/23] LSM: Use lsmcontext in security_inode_getsecctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 15/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- RE: [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- [RFC PATCH v2 3/3] x86/sgx: Implement SGX specific hooks in SELinux
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v2 2/3] x86/sgx: Call LSM hooks from SGX subsystem/module
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
- From: Cedric Xing <cedric.xing@xxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 04/23] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH ghak57 V2] selinux: format all invalid context as untrusted
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 23/23] AppArmor: Remove the exclusive flag
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 23/23] AppArmor: Remove the exclusive flag
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 23/23] AppArmor: Remove the exclusive flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]