SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/58] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/58] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/58] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/58] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/58] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/58] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/58] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/58] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/58] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/58] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/58] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/58] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/58] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/58] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/58] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/58] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix strncpy in libselinux and libsepol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2] selinux: Fix strncpy in libselinux and libsepol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH 00/58] LSM: Module stacking for AppArmor
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 25/58] IMA: Clean out lsm_export scaffolding
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/58] LSM: Create an lsm_export data structure.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 03/58] LSM: Infrastructure management of the key security blob
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/58] LSM: Infrastructure management of the sock security
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/58] LSM: Infrastructure management of the superblock
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/58] LSM: Module stacking for AppArmor
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- [PATCH 02/58] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/58] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/58] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/58] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/58] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 50/58] LSM: Add the release function to the lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 49/58] fs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 47/58] LSM: Use lsm_context in security_release_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/58] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/58] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/58] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/58] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/58] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/58] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/58] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/58] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/58] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/58] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/58] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/58] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/58] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/58] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/58] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/58] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Add CONTRIBUTING.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] Add CONTRIBUTING.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix strncpy in libselinux and libsepol
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Add CONTRIBUTING
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Add CONTRIBUTING
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] selinux: Fix strncpy in libselinux and libsepol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix strncpy in libselinux and libsepol
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] selinux: Fix strncpy in libselinux and libsepol
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Add CONTRIBUTING
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Update restorecon to support new digest scheme
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [selinux.wiki] Mention Signed-off-by in Contributing.md
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Add CONTRIBUTING
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Add CONTRIBUTING
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [selinux.wiki] Mention Signed-off-by in Contributing.md
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH userspace v3 7/7] [RFC] libsemanage: switch to config file entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 6/7] [RFC] lisepol: slightly more thorough optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 5/7] checkpolicy: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 4/7] secilc: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 1/7] libsepol: add a function to optimize kernel policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 3/7] semodule: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 2/7] libsemanage: optionally optimize policy on rebuild
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v3 0/7] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Bug#929063: SELinux integration in sysVinit
- From: Dmitry Bogatov <KAction@xxxxxxxxxx>
- Re: Bug#929063: SELinux integration in sysVinit
- From: Dmitry Bogatov <KAction@xxxxxxxxxx>
- Re: Bug#929063: SELinux integration in sysVinit
- From: Dmitry Bogatov <KAction@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH userspace v2 4/7] secilc: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace v2 4/7] secilc: add flag to enable policy optimization
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH userspace v2 7/7] [RFC] libsemanage: switch to config file entry
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 6/7] [RFC] lisepol: slightly more thorough optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 5/7] checkpolicy: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 4/7] secilc: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 3/7] semodule: add flag to enable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/7] libsemanage: optionally optimize policy on rebuild
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/7] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] Update restorecon to support new digest scheme
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH] trivial typo fix
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH]: trivial fix incorrect indentation
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] More accurate error messages
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] trivial kernel_to_conf.c checks
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- [PATCH] remove redundant if
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] trivial: remove unneeded int
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH] conf-parse.y checks (with style fixes removed)
- From: selinux@xxxxxxxxxxxx
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH 0/3] Update restorecon to support new digest scheme
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] conf-parse.y checks (with style fixes removed)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH userspace] run_init: fix build when crypt() is not in unistd.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [Non-DoD Source] Re: [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: Add option to optimize policydb when writing kernel policy
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux integration in sysVinit
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SELinux integration in sysVinit
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: SELinux integration in sysVinit
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- SELinux integration in sysVinit
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- [PATCH] libsepol/cil: Allow validatetrans rules to be resolved
- From: Richard Haines <rch_patches@xxxxxxxxxxxxxx>
- [PATCH 0/3] Update restorecon to support new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [Non-DoD Source] [PATCH] libsepol/cil: Allow validatetrans rules to be resolved
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH userspace 4/4] semodule: add flag to disable policy optimization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 3/4] libsemanage: optimize policy on rebuild
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 2/4] secilc: optimize policy before writing
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 1/4] libsepol: add a function to optimize kernel policy
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace 0/4] Remove redundant rules when building policydb
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 3/3] restorecond: Update to handle new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/3] Update restorecon to support new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RFC V2 PATCH] selinux-testsuite: Add test for restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/3] setfiles: Update utilities for the new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/3] setfiles: Update utilities for the new digest scheme
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove some no-op BUG_ONs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: provide __le variables explicitly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.2 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [Non-DoD Source] [PATCH] libsepol/cil: Allow validatetrans rules to be resolved
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.2 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Allow validatetrans rules to be resolved
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH] conf-parse.y checks (with style fixes removed)
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH userspace v2] libsepol: add ebitmap_for_each_set_bit macro
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- ImportError: cannot import name '_selinux' from 'selinux' with swig-4.0.0
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH] Global replace exit(0) with more readable exit(EXIT_SUCCESS)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] General code cleanups, sanity checks and strdup() checks
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] Trivial style fixes pt2
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Check strdup() failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] another style fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: James Morris <jmorris@xxxxxxxxx>
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH userspace v2] libsepol: add ebitmap_for_each_set_bit macro
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace] libsepol: add ebitmap_for_each_set_bit macro
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: support attributes in type transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH userspace] run_init: fix build when crypt() is not in unistd.h
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: support attributes in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace] libsepol: add ebitmap_for_each_set_bit macro
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] General code cleanups, sanity checks and strdup() checks
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] Trivial style fixes pt2
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] Trivial style improvements
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- Re: [PATCH] Check strdup() failure
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] Global replace exit(0) with more readable exit(EXIT_SUCCESS)
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] another style fix
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Subject: [PATCH 1/2] Unify code style to preserve my sanity
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] Global replace exit(0) with more readable exit(EXIT_SUCCESS)
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH 2/2] another style fix
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH] Check strdup() failure
- From: Jokke Hämäläinen <jokke.hamalainen@xxxxxxxxxxxx>
- [PATCH v3] selinux: do not report error on connect(AF_UNSPEC)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net v2] Revert "selinux: do not report error on connect(AF_UNSPEC)"
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: do not report error on connect(AF_UNSPEC)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v2] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] selinux: do not report error on connect(AF_UNSPEC)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH net v2] Revert "selinux: do not report error on connect(AF_UNSPEC)"
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net] Revert "selinux: do not report error on connect(AF_UNSPEC)"
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH net] Revert "selinux: do not report error on connect(AF_UNSPEC)"
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] libselinux: Eliminate use of security_compute_user()
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: Mislabeled /proc/<pid>/ns/mnt files?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Mislabeled /proc/<pid>/ns/mnt files?
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH RFC] selinux: provide __le variables explicitly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Eliminate use of security_compute_user()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH RFC] selinux: provide __le variables explicitly
- From: Nicholas Mc Guire <der.herr@xxxxxxx>
- Re: [PATCH] selinux: remove some no-op BUG_ONs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] selinux: provide __le variables explicitly
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH net] selinux: do not report error on connect(AF_UNSPEC)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH RFC] selinux: provide __le variables explicitly
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux patches for v5.2
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support attributes in type transitions
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Possible regression test failure?
- From: Dan Noland <dan@xxxxxxxxxx>
- [PATCH] selinux: support attributes in type transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: remove some no-op BUG_ONs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Possible regression test failure?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Possible regression test failure?
- From: Dan Noland <dan@xxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.1 (#3)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] semanage/semanage-boolean.8: Fix a minor typo
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.1 (#3)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] proc: prevent changes to overridden credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- An update on my kernel "secnext" builds and testing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: scripts/selinux build error in 4.14 after glibc update
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 69/90] LSM: Use full security context in security_inode_setsecctx
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- scripts/selinux build error in 4.14 after glibc update
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH 69/90] LSM: Use full security context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/90] LSM: Module stacking for all
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 69/90] LSM: Use full security context in security_inode_setsecctx
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/90] LSM: Module stacking for all
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 00/90] LSM: Module stacking for all
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] proc: prevent changes to overridden credentials
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: [PATCH] proc: prevent changes to overridden credentials
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] proc: prevent changes to overridden credentials
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 0/2] checkmodule: allow building modules of a specific version
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] proc: prevent changes to overridden credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] proc: prevent changes to overridden credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/90] LSM: Module stacking for all
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 49/90] LSM: Use lsm_context in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 81/90] Netlabel: Return the labeling type on socket
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 80/90] Smack: Let netlabel do the work on connections
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 79/90] Smack: Don't set the socket label on each send
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 78/90] Smack: Let netlabel do the work on the ambient domain
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 75/90] Smack: Fix setting of the CIPSO MLS_CAT flags
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 76/90] Smack: Set netlabel flags properly on new label import
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 77/90] Netlabel: Add a secattr comparison API function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 71/90] LSM: Infrastructure security blobs for mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 74/90] LSM: Change error detection for UDP peer security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 73/90] Smack: Advertise the secid to netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 72/90] LSM: Fix for security_init_inode_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 70/90] LSM: Correct handling of ENOSYS in inode_setxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 69/90] LSM: Use full security context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 68/90] LSM: Support multiple LSMs using inode_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 67/90] Smack: Detect if secmarks can be safely used
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 65/90] LSM: Add secmark refcounting to call_one list
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 66/90] LSM: refactor security_setprocattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 62/90] netfilter: Fix memory leak introduced with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 64/90] netfilter: Remove unnecessary NULL check in lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 63/90] Smack: Consolidate secmark conversions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 60/90] LSM: Add secmark_relabel_packet to the set of one call hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 61/90] LSM: Make getting the secmark right cleaner
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 58/90] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 59/90] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 57/90] SELinux: Use blob offset in current_sid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 56/90] LSM: Special handling for secctx lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 55/90] LSM: Remove unused macro
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/90] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 51/90] LSM: Add the release function to the lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 54/90] kernfs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 53/90] LSM: Use lsm_context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 52/90] LSM: Use lsm_context in inode_setsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 50/90] fs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 48/90] LSM: Use lsm_context in security_release_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 45/90] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 47/90] LSM: Use lsm_context in release_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 46/90] LSM: Use lsm_context in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 44/90] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/90] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/90] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/90] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/90] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/90] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/90] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/90] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/90] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/90] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/90] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/90] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/90] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/90] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/90] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/90] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/90] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/90] NET: Change the UNIXCB from a secid to an lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/90] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/90] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/90] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/90] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/90] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/90] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/90] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/90] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/90] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/90] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/90] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/90] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/90] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/90] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/90] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/90] LSM: Fix logical operation in lsm_export checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/90] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/90] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/90] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/90] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/90] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/90] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/90] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/90] LSM: Module stacking for all
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/90] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 0/1] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 0/2] checkmodule: allow building modules of a specific version
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 0/2] checkmodule: allow building modules of a specific version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/2] dismod: print policy version of loaded modules
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/2] checkmodule: add support for specifying module policy version
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH 0/1] libselinux: Save digest of all partial matches for directory
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 0/2] checkmodule: allow building modules of a specific version
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add test for restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add test for restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux-testsuite: Add test for restorecon
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 0/1] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [RFC PATCH 1/1] libselinux: Save digest of all partial matches for directory
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Ignore the stem when looking up all matches in file context
- From: xunchang <xunchang@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] dismod: print policy version of loaded modules
- From: Gary Tierney <gary.tierney@xxxxxxxxxxxx>
- [PATCH 1/2] checkmodule: add support for specifying module policy version
- From: Gary Tierney <gary.tierney@xxxxxxxxxxxx>
- [PATCH 0/2] checkmodule: allow building modules of a specific version
- From: Gary Tierney <gary.tierney@xxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] selinux testsuite: Do not build SCTP unless kernel support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix potential memory leak in selinux_socket_bind()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH net] selinux: fix potential memory leak in selinux_socket_bind()
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: "chengjian (D)" <cj.chengjian@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: Check address length before reading address family
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel BUG at kernel/cred.c:434!
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux testsuite: Do not build SCTP unless kernel support
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/59] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH 00/59] LSM: Module stacking for AppArmor
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 02/59] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Sorry about duplicates on the stacking patches
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 55/59] LSM: Remove unused macro
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 56/59] LSM: Special handling for secctx lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/59] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 57/59] SELinux: Use blob offset in current_sid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 59/59] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/59] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 54/59] kernfs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 53/59] LSM: Use lsm_context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 50/59] fs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 51/59] LSM: Add the release function to the lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 52/59] LSM: Use lsm_context in inode_setsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 48/59] LSM: Use lsm_context in security_release_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 49/59] LSM: Use lsm_context in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/59] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/59] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/59] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/59] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/59] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/59] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]