SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 13/15] checkpolicy: free temporary bounds type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 12/15] checkpolicy: provide more descriptive error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 09/15] libsepol: use typedef
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/15] checkpolicy: bail out on invalid role
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 07/15] checkpolicy: call YYABORT on parse errors
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 06/15] checkpolicy: clean expression on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 05/15] checkpolicy: check allocation and free memory on error at type definition
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 04/15] checkpolicy: free ebitmap on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 03/15] checkpolicy: cleanup identifiers on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 02/15] checkpolicy: cleanup resources on parse error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/15] checkpolicy: add libfuzz based fuzzer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] python/semanage: Allow modifying records on "add"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: ensure transitivity in compare functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Sam Sun <samsun1006219@xxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <vorlon@xxxxxxxxxx>
- [PATCH PR#420 v3] audit2allow: CIL output mode
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH] libselinux/src/Makefile: fix reallocarray strlcpy detection
- From: Jordan Williams <jordan@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] libsepoll/src/Makefile: Fix reallocarray detection when cross-compiling
- From: Winfried Dobbe <winfried_mb2@xxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH PR#420] audit2allow: CIL output mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <vorlon@xxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <vorlon@xxxxxxxxxx>
- ANN: Reference Policy 2.20240226
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <vorlon@xxxxxxxxxx>
- Re: [PATCH 0/21] selinux: fix style issues in security/selinux/ss
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Fix lsm_get_self_attr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Fix lsm_get_self_attr()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] selinux: cleanup selinux_lsm_getattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] SELinux: Fix lsm_get_self_attr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 21/21] selinux: fix style issues in security/selinux/ss/symtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 20/21] selinux: fix style issues in security/selinux/ss/symtab.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 19/21] selinux: fix style issues in security/selinux/ss/sidtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 18/21] selinux: fix style issues in security/selinux/ss/sidtab.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 15/21] selinux: fix style issues in security/selinux/ss/policydb.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 16/21] selinux: fix style issues in security/selinux/ss/policydb.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 17/21] selinux: fix style issues in security/selinux/ss/services.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 13/21] selinux: fix style issues in security/selinux/ss/mls.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 14/21] selinux: fix style issues in security/selinux/ss/mls_types.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 11/21] selinux: fix style issues in security/selinux/ss/hashtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 12/21] selinux: fix style issues in security/selinux/ss/mls.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 09/21] selinux: fix style issues in security/selinux/ss/ebitmap.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/21] selinux: fix style issues in security/selinux/ss/hashtab.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 06/21] selinux: fix style issues in security/selinux/ss/context.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 08/21] selinux: fix style issues in security/selinux/ss/ebitmap.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 07/21] selinux: fix style issues in security/selinux/ss/context.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 05/21] selinux: fix style issues in security/selinux/ss/constraint.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 04/21] selinux: fix style issues in security/selinux/ss/conditional.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 02/21] selinux: fix style issues in security/selinux/ss/avtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 01/21] selinux: fix style issues in security/selinux/ss/avtab.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 03/21] selinux: fix style issues in security/selinux/ss/conditional.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 00/21] selinux: fix style issues in security/selinux/ss
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] sepolgen: adjust parse for refpolicy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: ensure transitivity in compare functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 25/25] vfs: return -EOPNOTSUPP for fscaps from vfs_*xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 23/25] commoncap: remove cap_inode_getsecurity()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 21/25] ovl: use vfs_{get,set}_fscaps() for copy-up
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 22/25] fs: use vfs interfaces for capabilities xattrs
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 04/25] capability: rename cpu_vfs_cap_data to vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 5.4,4.19] lsm: new security_file_ioctl_compat() hook
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/inet_socket: test CALIPSO also with datagram protocols
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH PR#420 v2] audit2allow: CIL output mode
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH PR#420] audit2allow: CIL output mode
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <steve.langasek@xxxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <steve.langasek@xxxxxxxxxxxxx>
- [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <steve.langasek@xxxxxxxxxxxxx>
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] Always build for LFS mode on 32-bit archs.
- From: Steve Langasek <steve.langasek@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] mm: add vma_assert_locked() for !CONFIG_PER_VMA_LOCK
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v7 0/4] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 2/4] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 4/4] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 3/4] mm: add vma_assert_locked() for !CONFIG_PER_VMA_LOCK
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v7 1/4] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v10 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v6 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v6 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v6 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v6 0/3] per-vma locks in userfaultfd
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH v2] python/semanage: Allow modifying records on "add"
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v6 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v6 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH 15/15] checkpolicy: misc policy_define.c cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 14/15] checkpolicy: avoid assigning garbage values
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 13/15] checkpolicy: free temporary bounds type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 12/15] checkpolicy: provide more descriptive error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 09/15] libsepol: use typedef
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 08/15] checkpolicy: bail out on invalid role
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 07/15] checkpolicy: call YYABORT on parse errors
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 06/15] checkpolicy: clean expression on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 05/15] checkpolicy: check allocation and free memory on error at type definition
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 04/15] checkpolicy: free ebitmap on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 03/15] checkpolicy: cleanup identifiers on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 02/15] checkpolicy: cleanup resources on parse error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/15] checkpolicy: add libfuzz based fuzzer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH v5 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v5 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v5 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v5 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH 10/15] libsepol: add copy member to level_datum
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH testsuite] tests/inet_socket: test CALIPSO also with datagram protocols
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy: fix testsuite_domain_type_minimal() to work with rpm-ostree
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH v4 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v4 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v4 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v4 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH testsuite] policy: fix testsuite_domain_type_minimal() to work with rpm-ostree
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Calls to vfs_setlease() from NFSD code cause unnecessary CAP_LEASE security checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 9/25] security: Align inode_setattr hook definition with EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 7/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 5/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 4/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use kfree_sensitive for certain code paths of security
- From: Ronald Monthero <debug.penguin32@xxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH] python/semanage: Do not sort local fcontext definitions
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH 5.4,4.19] lsm: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v3 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v3 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v3 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [RFC PATCH] libselinux: disable capturing in fcontext matching
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] selinux: only filter copy-up xattrs following initialization
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: correct return values in selinux_socket_getpeersec_dgram()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Calls to vfs_setlease() from NFSD code cause unnecessary CAP_LEASE security checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Calls to vfs_setlease() from NFSD code cause unnecessary CAP_LEASE security checks
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Calls to vfs_setlease() from NFSD code cause unnecessary CAP_LEASE security checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: only filter copy-up xattrs following initialization
- From: David Disseldorp <ddiss@xxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] python/semanage: Allow modifying records on "add"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [RFC PATCH v2 6/9] libselinux: rework selabel_file(5) database
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 5/9] libselinux: sidtab updates
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 9/9] libselinux: support parallel selabel_lookup(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/9] policycoreutils: introduce unsetfiles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 8/9] libselinux: add selabel_file(5) fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/9] libselinux/utils: introduce selabel_compare
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 7/9] libselinux: remove unused hashtab code
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/9] libselinux: add unique id to sidtab entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/9] libselinux: use more appropriate types in sidtab
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/9] libselinux: rework selabel_file(5) database
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] mcstrans: ensure transitivity in compare functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: ensure transitivity in compare functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libsepol/cil: ensure transitivity in compare functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: correct return values in selinux_socket_getpeersec_dgram()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] selinux: Use kfree_sensitive for certain code paths of security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 0/3] per-vma locks in userfaultfd
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v2 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v2 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH v2 0/3] per-vma locks in userfaultfd
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH] security: fix no-op hook logic in security_inode_{set,remove}xattr()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: Use kfree_sensitive for certain code paths of security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: Use kfree_sensitive for certain code paths of security
- From: Ronald Monthero <debug.penguin32@xxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] lsm: fix default return value of the socket_getpeersec_* hooks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 3/3] userfaultfd: use per-vma locks in userfaultfd operations
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH 2/3] userfaultfd: protect mmap_changing with rw_sem in userfaulfd_ctx
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH 1/3] userfaultfd: move userfaultfd_ctx struct to header file
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] security: fix the logic in security_inode_getsecctx()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix ordering of arguments to calloc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: use reentrant strtok_r(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/src/Makefile: fix reallocarray detection
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reorder calloc(3) arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/11] libselinux/man: mention errno for regex compilation failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reduce the object class calculations at inode init time
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] python/semanage: Allow modifying records on "add"
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 14/15] checkpolicy: avoid assigning garbage values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 15/15] checkpolicy: misc policy_define.c cleanup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 12/15] checkpolicy: provide more descriptive error messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 13/15] checkpolicy: free temporary bounds type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 10/15] libsepol: add copy member to level_datum
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/15] checkpolicy: call YYABORT on parse errors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/15] checkpolicy: clean expression on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/15] libsepol: use typedef
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/15] checkpolicy: bail out on invalid role
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/15] checkpolicy: check allocation and free memory on error at type definition
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/15] checkpolicy: add libfuzz based fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/15] checkpolicy: cleanup identifiers on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/15] checkpolicy: free ebitmap on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/15] checkpolicy: cleanup resources on parse error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reduce the object class calculations at inode init time
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: reduce the object class calculations at inode init time
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Gabriel Ryan <gabe@xxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [UTIL-LINUX PATCH] sulogin: relabel terminal according to SELinux policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: use reentrant strtok_r(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] libselinux: use reentrant strtok_r(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/src/Makefile: fix reallocarray detection
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240105
- From: pr-tracker-bot@xxxxxxxxxx
- ANN: SELint 1.5
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol/src/Makefile: fix reallocarray detection
- From: Fabrice Fontaine <fontaine.fabrice@xxxxxxxxx>
- [RFC PATCH] libselinux: disable capturing in fcontext matching
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240105
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Fix ordering of arguments to calloc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reorder calloc(3) arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/11] libselinux/man: mention errno for regex compilation failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [UTIL-LINUX PATCH] sulogin: relabel terminal according to SELinux policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] sandbox: do not override warning CFLAGS
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] mcstrans: check memory allocations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] libselinux: reorder calloc(3) arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: reorder calloc(3) arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/15] selinux: fix style issues in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 15/15] selinux: fix style issues in security/selinux/include/initial_sid_to_string.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 14/15] selinux: fix style issues in security/selinux/include/xfrm.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 12/15] selinux: fix style issues with security/selinux/include/policycap_names.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 13/15] selinux: fix style issues in security/selinux/include/security.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 11/15] selinux: fix style issues in security/selinux/include/policycap.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/15] selinux: fix style issues in security/selinux/include/objsec.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 07/15] selinux: fix style issues in security/selinux/include/ima.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 09/15] selinux: fix style issues with security/selinux/include/netlabel.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 08/15] selinux: fix style issues in security/selinux/include/netif.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 05/15] selinux: fix style issues in security/selinux/include/classmap.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 04/15] selinux: fix style issues in security/selinux/include/avc_ss.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 06/15] selinux: fix style issues in security/selinux/include/conditional.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 01/15] selinux: fix style issues in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 02/15] selinux: fix style issues in security/selinux/include/avc.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux style fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 03/15] selinux: align avc_has_perm_noaudit() prototype with definition
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Aishwarya TCV <aishwarya.tcv@xxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Cathy Hu <cahu@xxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/11] libselinux: enable usage with pedantic UB sanitizers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/11] setfiles: avoid unsigned integer underflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/11] libselinux: support huge passwd/group entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/11] libsemanage: support huge passwd entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/11] libselinux: use logging wrapper in getseuser(3) and get_default_context(3) family
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/11] libselinux: align SELABEL_OPT_DIGEST usage with man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/11] libselinux/utils: free allocated resources
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/11] libselinux/utils: improve compute_av output
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/11] libselinux: fail selabel_open(3) on invalid option
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/11] libselinux/man: sync selinux_check_securetty_context(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/11] libselinux/man: mention errno for regex compilation failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 13/24] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 24/24] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 18/24] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 17/24] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 16/24] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 15/24] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 14/24] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 13/24] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 12/24] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 10/24] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 09/24] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 08/24] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 07/24] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 06/24] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 05/24] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 04/24] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 03/24] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 02/24] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 01/24] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]