SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/59] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/59] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/59] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/59] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/59] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/59] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/59] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/59] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/59] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/59] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/59] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/59] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/59] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/59] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/59] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/59] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/59] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/59] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/59] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/59] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/59] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/59] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/59] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/59] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] Add security_validatetrans support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5] Add security_validatetrans support
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] semanage/semanage-boolean.8: Fix a minor typo
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v5] Add security_validatetrans support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v5] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] Add security_validatetrans support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v4] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] Add security_validatetrans support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH v3] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- [PATCH] semanage/semanage-boolean.8: Fix a minor typo
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] Add security_validatetrans support
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] Add security_validatetrans support
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] kernfs: fix xattr name handling in LSM helpers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] kernfs: fix xattr name handling in LSM helpers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] selinux-testsuite: Update binder test applications
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v4] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] kernfs: fix xattr name handling in LSM helpers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] kernfs: fix xattr name handling in LSM helpers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] MAINTAINERS: update SELinux file patterns
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Bad file pattern in 'SELINUX SECURITY MODULE'
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Bad file pattern in 'SELINUX SECURITY MODULE'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] kernfs: fix xattr name handling in LSM helpers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 39/68] vfs: Convert selinuxfs to use the new mount API
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 179/192] selinux: do not override context on context mounts
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 116/123] selinux: do not override context on context mounts
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 82/87] selinux: do not override context on context mounts
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 244/262] selinux: do not override context on context mounts
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH -next] selinux: Make selinux_kernfs_init_security static
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] restorecond: Do not link against libpcre
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] gui: Install .desktop files to /usr/share/applications by default
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [kernfs] e19dfdc83b: BUG:KASAN:global-out-of-bounds_in_s
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] kernfs: fix xattr name handling in LSM helpers
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Bad file pattern in 'SELINUX SECURITY MODULE'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Bad file pattern in 'SELINUX SECURITY MODULE'
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Bad file pattern in MAINTAINERS section 'SELINUX SECURITY MODULE'
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Bad file pattern in MAINTAINERS section 'SELINUX SECURITY MODULE'
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] Bad file pattern in MAINTAINERS section 'SELINUX SECURITY MODULE'
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Bad file pattern in MAINTAINERS section 'SELINUX SECURITY MODULE'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [kernfs] e19dfdc83b: BUG:KASAN:global-out-of-bounds_in_s
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH] selinux: remove useless assignments
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [kernfs] e19dfdc83b: BUG:KASAN:global-out-of-bounds_in_s
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove useless assignments
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] [v3] selinux: avoid uninitialized variable warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove useless assignments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] [v2] selinux: avoid uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] [v3] selinux: avoid uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH] [v2] selinux: avoid uninitialized variable warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: lsm_hooks.h - fix missing colon in docstring
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] [v2] selinux: avoid uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] selinux: remove useless assignments
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] LSM: lsm_hooks.h - fix missing colon in docstring
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: fixed parse warning Using plain integer as NULL pointer
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: fixed parse warning Using plain integer as NULL pointer
- From: Hariprasad Kelam <hariprasad.kelam@xxxxxxxxx>
- Re: [PATCH] selinux: avoid uninitialized variable warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] selinux: avoid uninitialized variable warning
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Make selinux_kernfs_init_security static
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 1/4] mm: Implement kmem objects freeing queue
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH -next] selinux: Make selinux_kernfs_init_security static
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] selinux: avoid uninitialized variable warning
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH 4/4] mm: Do periodic rescheduling when freeing objects in kmem_free_up_q()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH] selinux: avoid uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH -next] selinux: Make selinux_kernfs_init_security static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 0/4] Signal: Fix hard lockup problem in flush_sigqueue()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 0/4] Signal: Fix hard lockup problem in flush_sigqueue()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [pcmoore-selinux:next 8/10] htmldocs: include/linux/lsm_hooks.h:1814: warning: Function parameter or member 'kernfs_init_security' not described in 'security_list_options'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [pcmoore-selinux:next 8/10] htmldocs: include/linux/lsm_hooks.h:1814: warning: Function parameter or member 'kernfs_init_security' not described in 'security_list_options'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: general protection fault in ebitmap_destroy (2)
- From: syzbot <syzbot+a57b2aff60832666fc28@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] mm: Do periodic rescheduling when freeing objects in kmem_free_up_q()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 3/4] signal: Add free_uid_to_q()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 1/4] mm: Implement kmem objects freeing queue
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 4/4] mm: Do periodic rescheduling when freeing objects in kmem_free_up_q()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 0/4] Signal: Fix hard lockup problem in flush_sigqueue()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.1 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: general protection fault in ebitmap_destroy (2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: general protection fault in ebitmap_destroy (2)
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.1 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] restorecond: Do not link against libpcre
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] restorecond: Do not link against libpcre
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] binder: fix BUG_ON found by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: fix build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH] scripts/selinux: fix build
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel definition of PF_MAX in scripts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] gui: Install .desktop files to /usr/share/applications by default
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/1] restorecond: use /run instead of /var/run
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] selinux: fix NULL dereference in policydb_destroy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] gui: Install .desktop files to /usr/share/applications by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: fix NULL dereference in policydb_destroy()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] gui: Install .desktop files to /usr/share/applications by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] gui: Install polgengui.py to /usr/bin/selinux-polgengui
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] selinux: fix NULL dereference in policydb_destroy()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/2] gui: Install .desktop files to /usr/share/applications by default
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: ANN: SELinux userspace release 2019-03-15 / 2.9
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- ANN: SELinux userspace release 2019-03-15 / 2.9
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- general protection fault in ebitmap_destroy (2)
- From: syzbot <syzbot+a57b2aff60832666fc28@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 36/38] vfs: Convert selinuxfs to fs_context
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.1 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] Restorecon: factor out a lookup helper for context matches
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.1 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel definition of PF_MAX in scripts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: use kernel definition of PF_MAX in scripts
- From: Johannes Brechtmann <johannes@xxxxxxx>
- Re: [PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH] Restorecon: factor out a lookup helper for context matches
- From: xunchang <xunchang@xxxxxxxxxx>
- Re: Patch to the context lookup change
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Patch to the context lookup change
- From: Tianjie Xu <xunchang@xxxxxxxxxx>
- Re: Patch to the context lookup change
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add security_reject_unknown(3) man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- [PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
- From: maowenan <maowenan@xxxxxxxxxx>
- Re: [PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
- From: maowenan <maowenan@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libselinux: Add security_reject_unknown(3) man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libselinux: Add security_reject_unknown(3) man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add security_reject_unknown(3) man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [GIT PULL] SELinux patches for v5.1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- [PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- [PATCH 2/2] gui: Install .desktop files to /usr/share/applications by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] gui: Install polgengui.py to /usr/bin/selinux-polgengui
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Add security_reject_unknown(3) man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libselinux: Add security_reject_unknown(3) man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add security_reject_unknown(3) man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: overlayfs access checks on underlying layers
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: overlayfs access checks on underlying layers
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add security_reject_unknown(3) man page
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: overlayfs access checks on underlying layers
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: overlayfs access checks on underlying layers
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- [PATCH] libselinux: Add security_reject_unknown(3) man page
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 00/97] LSM: Complete module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/97] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 05/97] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
- From: "Edwin Zimmerman" <edwin@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/97] LSM: Complete module stacking
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH 01/97] LSM: Infrastructure management of the superblock
- From: "Edwin Zimmerman" <edwin@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/97] LSM: Create an lsm_export data structure.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- ANN: SELinux userspace 2.9-rc2 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 84/97] Netlabel: Add a secattr comparison API function
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 96/97] LSM: Apply Netlabel consitancy checks on send and connect
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 97/97] Smack: Remove the exclusive bit
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 94/97] LSM: Hook for netlabel reconciliation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 95/97] LSM: Avoid network conflicts in SELinux and Smack
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 93/97] Smack: Use the NLTYPE on output
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 92/97] LSM: Remember the NLTYPE of netlabel sockets
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 89/97] Netlabel: Return the labeling type on socket
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 91/97] Netlabel: Return the labeling type on socket
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 90/97] Netlabel: Return the labeling type on socket
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 85/97] Smack: Let netlabel do the work on the ambient domain
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 86/97] Smack: Don't set the socket label on each send
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 88/97] Netlabel: Return the labeling type on socket
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 87/97] Smack: Let netlabel do the work on connections
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 81/97] LSM: Change error detection for UDP peer security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 83/97] Smack: Set netlabel flags properly on new label import
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 80/97] Smack: Advertise the secid to netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 79/97] LSM: Fix for security_init_inode_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 78/97] LSM: Infrastructure security blobs for mount options
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 76/97] LSM: Use full security context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 75/97] LSM: Support multiple LSMs using inode_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 74/97] Smack: Detect if secmarks can be safely used
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 77/97] LSM: Correct handling of ENOSYS in inode_setxattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 73/97] LSM: refactor security_setprocattr
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 71/97] LSM: Add secmark refcounting to call_one list
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 72/97] LSM: Add secmark refcounting to call_one list - part 2
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/97] LSM: Complete module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 25/97] LSM: FIXUP - security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 28/97] LSM: REVERT Use lsm_export in the sk_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 33/97] NET: Store LSM access information in the socket blob for UDS
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 56/97] fs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 57/97] LSM: Add the release function to the lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 58/97] LSM: Use lsm_context in inode_setsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 53/97] LSM: Use lsm_context in release_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 55/97] LSM: Use lsm_context in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 54/97] LSM: Use lsm_context in security_release_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 70/97] netfilter: Remove unnecessary NULL check in lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 69/97] Smack: Consolidate secmark conversions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 68/97] netfilter: Fix memory leak introduced with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 61/97] LSM: Remove unused macro
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 63/97] SELinux: Use blob offset in current_sid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 60/97] kernfs: remove lsm_context scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 62/97] LSM: Special handling for secctx lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 65/97] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 64/97] LSM: Specify which LSM to display with /proc/self/attr/display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 41/97] AppArmor: Remove unnecessary hook stub
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 48/97] LSM: Use lsm_context in dentry_init_security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 45/97] LSM: Use lsm_context in secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 59/97] LSM: Use lsm_context in security_inode_setsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 46/97] LSM: Use lsm_context in inode_getsecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 49/97] LSM: Use lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 50/97] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 52/97] LSM: Use lsm_context in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 47/97] LSM: Use lsm_context in inode_notifysecctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 51/97] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 42/97] LSM: Limit calls to certain module hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 38/97] LSM: Remove lsm_export scaffolding functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 39/97] IMA: FIXUP prototype using lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 43/97] LSM: Create a data structure for a security context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 44/97] LSM: Use lsm_context in secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 40/97] Smack: Restore the release_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 29/97] Audit: Change audit_sig_sid to audit_sig_lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 30/97] Audit: Convert target_sid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 31/97] Audit: Convert osid to an lsm_export structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 36/97] NET: Remove netfilter scaffolding for lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 34/97] NET: Remove scaffolding on secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 37/97] Netlabel: Replace secids with lsm_export
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 35/97] NET: Remove scaffolding on new secmarks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 22/97] LSM: Use lsm_export in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 32/97] IMA: Clean out lsm_export scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 23/97] LSM: Use lsm_export in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 24/97] LSM: FIXUP - security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 26/97] LSM: Use lsm_export in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 20/97] LSM: Use lsm_export in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 21/97] LSM: Use lsm_export in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 27/97] LSM: Use lsm_export in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 13/97] LSM: Use lsm_export in the audit_rule_match hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 14/97] LSM: Fix logical operation in lsm_export checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 18/97] LSM: Use lsm_export in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/97] LSM: Use lsm_export in the getpeersec_dgram hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 19/97] LSM: Use lsm_export in security_socket_getpeersec_dgram
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 17/97] LSM: Use lsm_export in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 15/97] LSM: Use lsm_export in the secid_to_secctx hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 16/97] LSM: Use lsm_export in the secctx_to_secid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 06/97] LSM: Use lsm_export in the inode_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/97] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 07/97] SCAFFOLD: Move security.h out of route.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/97] LSM: Use lsm_export in the sk_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 05/97] LSM: Create an lsm_export data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 08/97] LSM: Use lsm_export in the cred_getsecid hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 02/97] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 01/97] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 03/97] LSM: Infrastructure management of the key security blob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 00/97] LSM: Complete module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 04/97] SCAFFOLD: Move sock_graft out of sock.h
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] netlabel: fix out-of-bounds memory accesses
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: .desktop files installed by gui/
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Paulo Alcantara <paulo@xxxxxxxx>
- Re: [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Paulo Alcantara <paulo@xxxxxxxx>
- Re: [Non-DoD Source] Re: neverallow rules
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: neverallow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: .desktop files installed by gui/
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: neverallow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: neverallow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: neverallow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: neverallow rules
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL auth_role using logging_send_audit_msgs
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: RHEL auth_role using logging_send_audit_msgs
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: RHEL auth_role using logging_send_audit_msgs
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: neverallow rules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- neverallow rules
- From: Joe Nall <joe@xxxxxxxx>
- RHEL auth_role using logging_send_audit_msgs
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH 1/3] Always use /usr/bin/python3 in Python scripts
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] netlabel: fix out-of-bounds memory accesses
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Bash 5 change in behavior and SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
- From: Paulo Alcantara <paulo@xxxxxxxx>
- Re: wildcards in file_contexts.subs for NixOS
- From: Russell Coker <russell.coker@xxxxxxxxxx>
- Re: wildcards in file_contexts.subs for NixOS
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bash 5 change in behavior and SELinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bash 5 change in behavior and SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Bash 5 change in behavior and SELinux
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Bash 5 change in behavior and SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Bash 5 change in behavior and SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] doc: sctp: Merge and clean up rst files
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v7 4/7] kernfs: use simple_xattrs for security attributes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 7/7] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 6/7] selinux: implement the kernfs_init_security hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 5/7] LSM: add new hook for kernfs node initialization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 2/7] kernfs: do not alloc iattrs in kernfs_xattr_get
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 1/7] kernfs: clean up struct kernfs_iattrs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- wildcards in file_contexts.subs for NixOS
- From: Russell Coker <russell.coker@xxxxxxxxxx>
- [PATCH v6] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- .desktop files installed by gui/
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Always use /usr/bin/python3 in Python scripts
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC] Switch to Python 3 by default
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC] Switch to Python 3 by default
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH v4] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v4] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: modernize mdp
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- [PATCH 3/3] README: Update Fedora python 3 dependencies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] Switch to python3 by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] Always use /usr/bin/python3 in Python scripts
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [RFC] Switch to Python 3 by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v3] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v2] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] scripts/selinux: modernize mdp
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/2] python: always use python3 in the shebang of programs using setools
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 3/3] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 2/2] python: always use python3 in the shebang of programs using setools
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] python/sepolicy: drop python shebang from the module
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] python/sepolicy: drop python shebang from the module
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] doc: sctp: Merge and clean up rst files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] doc: sctp: Merge and clean up rst files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] python: always use python3 in the shebang of programs using setools
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/2] python/sepolicy: drop python shebang from the module
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2 3/3] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- For those not following the container world SELinux just proved it merits
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 3/3] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 2/3] python/semanage: Update semanage to use python3
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/3] python/semanage: Drop python shebang from seobject.py
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix userspace, refpolicy, and mailing list
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v2] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: genhomedircon - improve handling large groups
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux-testsuite: fix userspace, refpolicy, and mailing list
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] scripts/selinux: add basic mls support to mdp
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux-testsuite: fix userspace, refpolicy, and mailing list
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 2/5] kernfs: use simple_xattrs for security attributes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 3/5] LSM: add new hook for kernfs node initialization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 4/5] selinux: implement the kernfs_init_security hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v6 0/5] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: genhomedircon - improve handling large groups
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [Non-DoD Source] [PATCH 1/1] libsepol/cil: silence static analyser's use-after-free warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: genhomedircon - improve handling large groups
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
- From: Nazarov Sergey <s-nazarov@xxxxxxxxx>
- Re: Kernel memory corruption in CIPSO labeled TCP packets processing.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 1/1] libsepol/cil: silence static analyser's use-after-free warning
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 2/2] python/semanage: Use standard argparse.error() method in handlePermissive
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/selinux_restorecon: Skip customized files also without -v
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] gui: Make all polgen button labels translatable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] dbus: Fix name of polkit function
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: Update manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH rdma-rc v1 0/4] IB selinux related fixes
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
- From: Don Dutile <ddutile@xxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications
- From: Don Dutile <ddutile@xxxxxxxxxx>
- RE: gcc 9.0.0 build issues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon - improve handling large groups
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix classmap for BPF
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] python/semanage: Use standard argparse.error() method in handlePermissive
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH 1/2] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libselinux/selinux_restorecon: Skip customized files also without -v
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] gui: Make all polgen button labels translatable
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] libsemanage: genhomedircon - improve handling large groups
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] dbus: Fix name of polkit function
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: Update manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- RE: gcc 9.0.0 build issues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: gcc 9.0.0 build issues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: gcc 9.0.0 build issues
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: gcc 9.0.0 build issues
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] checkpolicy: Update manpage
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] dbus: Fix name of polkit function
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] dbus: Fix name of polkit function
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] LSM: Allow syzbot to ignore security= parameter.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH rdma-rc v1 4/4] IB/core: Don't register each MAD agent for LSM notifier
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage/seobject: Fix listing boolean values
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH 1/1] libsepol/cil: silence static analyser's use-after-free warning
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] checkpolicy: Add -S option to manpage
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] dbus: Fix name of polkit function
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH v2] libselinux: Fix RESOURCE_LEAK defects reported by coverity scan
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsemanage: genhomedircon - improve handling large groups
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] python/semanage: Use standard argparse.error() method in handlePermissive
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/2] python/semanage module: Fix handling of -a/-e/-d/-r options
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] gui: Make all polgen button labels translatable
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux/selinux_restorecon: Skip customized files also without -v
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix classmap for BPF
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix classmap for BPF
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Non-DoD Source] [PATCH 1/1] libsepol: do not use uninitialized value for low_value
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] scripts/release: Update links to use release assets instead of wiki links
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] selinux: Fix classmap for BPF
- From: "William A. Kennington III" <william@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix avc audit messages
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix avc audit messages
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [bug report] selinux: kill selinux_sb_get_mnt_opts()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 3/5] LSM: add new hook for kernfs node initialization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 4/5] selinux: implement the kernfs_init_security hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 2/5] kernfs: use simple_xattrs for security attributes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
- From: kbuild test robot <lkp@xxxxxxxxx>
- [bug report] selinux: kill selinux_sb_get_mnt_opts()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4 5/5] kernfs: initialize security of newly created nodes
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v4 2/5] kernfs: use simple_xattrs for security attributes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 5/5] kernfs: initialize security of newly created nodes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 1/5] selinux: try security xattr after genfs for kernfs filesystems
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]