SELinux - Date Index
[Prev Page][Next Page]
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] python/semanage: Allow modifying records on "add"
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 14/15] checkpolicy: avoid assigning garbage values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 15/15] checkpolicy: misc policy_define.c cleanup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 12/15] checkpolicy: provide more descriptive error messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 13/15] checkpolicy: free temporary bounds type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 10/15] libsepol: add copy member to level_datum
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/15] checkpolicy: call YYABORT on parse errors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/15] checkpolicy: clean expression on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/15] libsepol: use typedef
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/15] checkpolicy: bail out on invalid role
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/15] checkpolicy: check allocation and free memory on error at type definition
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/15] checkpolicy: add libfuzz based fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/15] checkpolicy: cleanup identifiers on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/15] checkpolicy: free ebitmap on error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/15] checkpolicy: cleanup resources on parse error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Jens Axboe <axboe@xxxxxxxxx>
- IORING_OP_FIXED_FD_INSTALL and audit/LSM interactions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: reduce the object class calculations at inode init time
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: reduce the object class calculations at inode init time
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Race in security/selinux/hooks.c on isec->sclass and isec->sid usage
- From: Gabriel Ryan <gabe@xxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH] userfaultfd: fix return error if mmap_changing is non-zero in MOVE ioctl
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- [PATCH] userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb
- From: Lokesh Gidra <lokeshgidra@xxxxxxxxxx>
- Re: [UTIL-LINUX PATCH] sulogin: relabel terminal according to SELinux policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: use reentrant strtok_r(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] libselinux: use reentrant strtok_r(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/src/Makefile: fix reallocarray detection
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240105
- From: pr-tracker-bot@xxxxxxxxxx
- ANN: SELint 1.5
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol/src/Makefile: fix reallocarray detection
- From: Fabrice Fontaine <fontaine.fabrice@xxxxxxxxx>
- [RFC PATCH] libselinux: disable capturing in fcontext matching
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240105
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Fix ordering of arguments to calloc
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reorder calloc(3) arguments
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/11] libselinux/man: mention errno for regex compilation failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [UTIL-LINUX PATCH] sulogin: relabel terminal according to SELinux policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4] sandbox: do not override warning CFLAGS
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] mcstrans: check memory allocations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] libselinux: reorder calloc(3) arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: reorder calloc(3) arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/15] selinux: fix style issues in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 15/15] selinux: fix style issues in security/selinux/include/initial_sid_to_string.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 14/15] selinux: fix style issues in security/selinux/include/xfrm.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 12/15] selinux: fix style issues with security/selinux/include/policycap_names.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 13/15] selinux: fix style issues in security/selinux/include/security.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 11/15] selinux: fix style issues in security/selinux/include/policycap.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/15] selinux: fix style issues in security/selinux/include/objsec.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 07/15] selinux: fix style issues in security/selinux/include/ima.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 09/15] selinux: fix style issues with security/selinux/include/netlabel.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 08/15] selinux: fix style issues in security/selinux/include/netif.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 05/15] selinux: fix style issues in security/selinux/include/classmap.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 04/15] selinux: fix style issues in security/selinux/include/avc_ss.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 06/15] selinux: fix style issues in security/selinux/include/conditional.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 01/15] selinux: fix style issues in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 02/15] selinux: fix style issues in security/selinux/include/avc.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- SELinux style fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 03/15] selinux: align avc_has_perm_noaudit() prototype with definition
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
- From: Aishwarya TCV <aishwarya.tcv@xxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] MAINTAINERS: drop Eric Paris from his SELinux role
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: add Ondrej Mosnacek as a SELinux reviewer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Cathy Hu <cahu@xxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/11] libselinux: enable usage with pedantic UB sanitizers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/11] setfiles: avoid unsigned integer underflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/11] libselinux: support huge passwd/group entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/11] libsemanage: support huge passwd entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/11] libselinux: use logging wrapper in getseuser(3) and get_default_context(3) family
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/11] libselinux: align SELABEL_OPT_DIGEST usage with man page
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/11] libselinux/utils: free allocated resources
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/11] libselinux/utils: improve compute_av output
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/11] libselinux: fail selabel_open(3) on invalid option
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/11] libselinux/man: sync selinux_check_securetty_context(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/11] libselinux/man: mention errno for regex compilation failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- [PATCH] security: new security_file_ioctl_compat() hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] SELinux: Introduce security_file_ioctl_compat hook
- From: Alfred Piccioni <alpic@xxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 13/24] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v8 24/24] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 18/24] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 17/24] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 16/24] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 15/24] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 14/24] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 13/24] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 12/24] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 10/24] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 09/24] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 08/24] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 07/24] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 06/24] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 05/24] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 04/24] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 03/24] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 02/24] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 01/24] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 00/24] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: SELinux mprotect EACCES/execheap for memory segment directly adjacent to heap
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Fwd: SELinux mprotect EACCES/execheap for memory segment directly adjacent to heap
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [UTIL-LINUX PATCH] sulogin: relabel terminal according to SELinux policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: ANN: SELinux userspace 3.6
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- ANN: SELinux userspace 3.6-rc2 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Clear AST node after destroying bad filecon rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: update const qualifier of parameters in man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Harden more tools agains "rogue" modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: validate empty common classes in scope indices
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: constify tokenized input
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy/dispol: misc updates
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: update const qualifier of parameters in man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Clear AST node after destroying bad filecon rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Harden more tools agains "rogue" modules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- [PATCH v5 3/4] vduse: enable Virtio-net device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- [PATCH v5 1/4] vduse: validate block features only with block devices
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- [PATCH v5 0/4] vduse: add support for networking devices
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [RFC PATCH] libsepol: handle long permission names in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libsepol: handle long permission names in sepol_av_to_string()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol: validate empty common classes in scope indices
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libsepol: handle long permission names in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Where's 3.6-rc3 and plan with 3.6 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: constify tokenized input
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Where's 3.6-rc3 and plan with 3.6 release
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Where's 3.6-rc3 and plan with 3.6 release
- From: Johannes Segitz <jsegitz@xxxxxxx>
- [PATCH 3/3] libselinux: state setexecfilecon(3) sets errno on failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: always set errno on context translation failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: update const qualifier of parameters in man pages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: validate empty common classes in scope indices
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] libsepol: handle long permission names in sepol_av_to_string()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: constify tokenized input
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] libsepol: extended permission formatting cleanup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libsepol: avoid integer overflow in add_i_to_a()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Where's 3.6-rc3 and plan with 3.6 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libsepol: validate common classes in scope indices
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libsepol: validate permission identifier length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] libsepol: validate permission identifier length
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] libsepol: validate permission identifier length
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol: validate common classes in scope indices
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] checkpolicy/dispol: misc updates
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- Re: [PATCH v2] selinux: remove the wrong comment about multithreaded process handling
- From: Munehisa Kamata <kamatam@xxxxxxxxxx>
- Re: [PATCH] mm: fix VMA heap bounds checking
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH] mm: fix VMA heap bounds checking
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: remove the wrong comment about multithreaded process handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/11] vfs: inode cache scalability improvements
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- [PATCH v2] checkpolicy/dispol: misc updates
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH] libsepol: validate permission identifier length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: SETools 4.4.4
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] mm: fix VMA heap bounds checking
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/11] vfs: inode cache conversion to hash-bl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 08/11] vfs: inode cache conversion to hash-bl
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 03/11] vfs: Use dlock list for superblock's inode list
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 03/11] vfs: Use dlock list for superblock's inode list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 08/11] vfs: inode cache conversion to hash-bl
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 09/11] hash-bl: explicitly initialise hash-bl heads
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] hlist-bl: add hlist_bl_fake()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/11] vfs: factor out inode hash head calculation
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/11] vfs: Use dlock list for superblock's inode list
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] lib/dlock-list: Distributed and lock-protected lists
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux: remove the wrong comment about multithreaded process handling
- From: Munehisa Kamata <kamatam@xxxxxxxxxx>
- Re: [PATCH 05/11] selinux: use dlist for isec inode list
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 05/11] selinux: use dlist for isec inode list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 05/11] selinux: use dlist for isec inode list
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] [userspace] Add CPPFLAGS to Makefiles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: fix src/genhomedircon.c build on `gcc-14` (`-Werror=alloc-size`)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: simplify string formatting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/7] libsepol: validate conditional type rules have a simple default type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] sepolicy: port to dnf4 python API
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] python: Harden more tools agains "rogue" modules
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 03/11] vfs: Use dlock list for superblock's inode list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 08/11] vfs: inode cache conversion to hash-bl
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 01/11] lib/dlock-list: Distributed and lock-protected lists
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 11/11] hlist-bl: introduced nested locking for dm-snap
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 09/11] hash-bl: explicitly initialise hash-bl heads
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 0/11] vfs: inode cache scalability improvements
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 05/11] selinux: use dlist for isec inode list
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 07/11] hlist-bl: add hlist_bl_fake()
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 06/11] vfs: factor out inode hash head calculation
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: bring the comment about multithreaded process handling back
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] [userspace] Add CPPFLAGS to Makefiles
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v6] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: fix src/genhomedircon.c build on `gcc-14` (`-Werror=alloc-size`)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] [userspace] Add CPPFLAGS to Makefiles
- From: Cameron Williams <ckwilliams.work@xxxxxxxxx>
- [PATCH 1/2] Revert "libsepol/tests: rename bool indentifiers"
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 2/2] Revert "libsepol: rename struct member"
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: setools build is broken by 61f21385004 ("libsepol: rename struct member"), revert?
- From: James Carter <jwcart2@xxxxxxxxx>
- setools build is broken by 61f21385004 ("libsepol: rename struct member"), revert?
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] libsemanage: fix src/genhomedircon.c build on `gcc-14` (`-Werror=alloc-size`)
- From: Sergei Trofimovich <slyich@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] clean up io_uring cmd header structure
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2 3/3] io_uring/cmd: inline io_uring_cmd_get_task
- From: Ming Lei <ming.lei@xxxxxxxxxx>
- Re: [PATCH v2 2/3] io_uring/cmd: inline io_uring_cmd_do_in_task_lazy
- From: Ming Lei <ming.lei@xxxxxxxxxx>
- Re: [PATCH v2 1/3] io_uring: split out cmd api into a separate header
- From: Ming Lei <ming.lei@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH 1/7] libsepol: validate conditional type rules have a simple default type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/7] checkpolicy/dispol: misc updates
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: simplify string formatting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH v2 1/3] io_uring: split out cmd api into a separate header
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH v2 3/3] io_uring/cmd: inline io_uring_cmd_get_task
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH v2 0/3] clean up io_uring cmd header structure
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH v2 2/3] io_uring/cmd: inline io_uring_cmd_do_in_task_lazy
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 22/23] integrity: Remove 'integrity' LSM and move integrity functions to 'ima' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selinux: bring the comment about multithreaded process handling back
- From: Munehisa Kamata <kamatam@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Petr Tesarik <petrtesarik@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Clear AST node after destroying bad filecon rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 7/7] libsepol: reject linking modules with no avrules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/7] libsepol/fuzz: handle empty and non kernel policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/7] libsepol: validate conditional type rules have a simple default type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/7] libsepol: reject invalid class datums
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/7] checkpolicy/dispol: misc updates
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/7] libsepol: use correct type to avoid truncations
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/7] checkpolicy/dismod: avoid duplicate initialization and fix module linking
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: simplify string formatting
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] sepolicy: port to dnf4 python API
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] defconfig: add NF_TABLES dependency for netlink_socket tests to pass
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] defconfig: add NF_TABLES dependency for netlink_socket tests to pass
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite] defconfig: add NF_TABLES dependency for netlink_socket tests to pass
- From: Alan Wandke <alanwandke.linux@xxxxxxxxx>
- [PATCH v5] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- PSA: this list has moved to new vger infra (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: getpolicyload returns 0, 2, 3, 4, ...
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: getpolicyload returns 0, 2, 3, 4, ...
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- ANN: SELinux userspace 3.6-rc2 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] sepolicy: port to dnf4 python API
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- getpolicyload returns 0, 2, 3, 4, ...
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol/tests: Update the order of neverallow test results
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not allow classpermissionset to use anonymous classpermission
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/9] libsepol/cil: Use struct cil_db * instead of void *
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: add check for category value before printing
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: avoid fixed sized format buffer for xperms
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v4] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] sepolicy: port to dnf4 python API
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 19/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] selinux: refactor avtab_node comparisons
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC: selinux: don't filter copy-up xattrs while uninitialized
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] sepolicy: port to dnf4 python API
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] libsepol: avoid fixed sized format buffer for xperms
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v6 20/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 23/25] evm: Remove dependency on 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 22/25] ima: Remove dependency on 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 24/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 21/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 19/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] sepolicy: port to dnf4 python API
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v2 2/2] libsepol: avoid fixed sized format buffer for xperms
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] libsepol: avoid fixed sized format buffer for xperms
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: avoid fixed sized format buffer for xperms
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: avoid fixed sized format buffer for xperms
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Do not allow classpermissionset to use anonymous classpermission
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/9] libsepol/cil: Use struct cil_db * instead of void *
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/tests: Update the order of neverallow test results
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: add check for category value before printing
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] github: bump action dependencies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: update policy capabilities array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: validate common classes have at least one permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] semodule_link: avoid NULL dereference on OOM
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/7] Drop LGTM.com configuration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol: use str_read() where appropriate
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the SELinux entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: add check for category value before printing
- From: <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the SELinux entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update the SELinux entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] github: bump action dependencies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol: update policy capabilities array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: validate common classes have at least one permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] libsepol: add check for category value before printing
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: assorted hash table improvements
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] selinux: introduce an initial SID for early boot processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Proposed feature: fine-grained file descriptors in SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Proposed feature: fine-grained file descriptors in SELinux
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Proposed feature: fine-grained file descriptors in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: assorted hash table improvements
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: update filenametr_hash() to use full_name_hash()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v1] libsepol: add check for category value before printing
- From: <luhuaxin1@xxxxxxxxxx>
- [PATCH] libsepol: add check for category value before printing
- From: l00564439 <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH 1/5] semodule_link: avoid NULL dereference on OOM
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/7] Drop LGTM.com configuration
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: validate common classes have at least one permissions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol: use str_read() where appropriate
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Proposed feature: fine-grained file descriptors in SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Proposed feature: fine-grained file descriptors in SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] LSM syscall tweaks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: update filenametr_hash() to use full_name_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: update filenametr_hash() to use full_name_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: update filenametr_hash() to use full_name_hash()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Proposed feature: fine-grained file descriptors in SELinux
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH] github: bump action dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: update policy capabilities array
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libsepol: avoid leak in OOM branch
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] libselinux: fix memory leak in customizable_init()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] libsepol: avoid memory corruption on realloc failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] libsepol: set number of target names
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] semodule_link: avoid NULL dereference on OOM
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/7] libselinux: update Python binding
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/7] ci: bump Fedora to version 39
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/7] Drop Travis CI configuration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/7] scripts: ignore unavailable interpreters
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/7] Update Python installation on Debian
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 7/7] scripts: update run-scan-build
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/7] Drop LGTM.com configuration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/4] libsepol: adjust type for saturation check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] libsepol: enhance saturation check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] libsepol: validate the identifier for initials SID is valid
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/4] libsepol: use str_read() where appropriate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/tests: Update the order of neverallow test results
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] selinux: add prefix/suffix matching to filename type transitions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- ANN: SELinux userspace 3.6-rc1 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v3] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH v3] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/2] libselinux: cast to unsigned char for character handling function
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: reject unsupported policy capabilities
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] libsepol: validate default type of transition is not an attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/utils: update getdefaultcon
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy: add round-trip tests
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/2] libsepol: reject avtab entries with invalid specifier
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] secilc/docs: fixes filecon example
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] restorecond: compatible with the use of EUID
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] sepolicy/manpage.py: make output deterministic
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: rework saturation check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 09/23] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 2/2] libselinux: introduce reallocarray(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/2] libselinux: cast to unsigned char for character handling function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] Update translations
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v4 12/23] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: reject unsupported policy capabilities
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 3/3] libsepol: more strict validation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 2/3] libsepol: validate constraint depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] libsepol: validate default type of transition is not an attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 2/3] libsepol: validate constraint depth
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] libsepol: validate default type of transition is not an attribute
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] libsepol: more strict validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: reject unsupported policy capabilities
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 13/27] libselinux/utils: introduce selabel_compare
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] selinux: use arrays for avtab hashtable nodes
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5 3/3] selinux: use arrays for avtab hashtable nodes
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- [PATCH v5 2/3] selinux: fix conditional avtab slot hint
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- [PATCH v5 1/3] selinux: refactor avtab_node comparisons
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- [PATCH v5 0/3] selinux: avtab arrays and refactors
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
- From: Maxime Coquelin <maxime.coquelin@xxxxxxxxxx>
- [pcmoore-selinux:main 1/1] README.orig: warning: ignored by one of the .gitignore files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/3] selinux: use arrays for avtab hashtable nodes
- From: Jacob Satterfield <jsatterfield.linux@xxxxxxxxx>
- Re: [PATCH] libsepol: ignore writing invalid polcaps in fuzzer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol: more strict validation
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: validate constraint depth
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: validate default type of transition is not an attribute
- From: James Carter <jwcart2@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]