SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: remove the sidtab context conversion indirect calls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] python: Fix typo in audit2allow.1 example
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python: Fix typo in audit2allow.1 example
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v1 2/2] selinux: add support for the io_uring setup permission
- From: Gil Cukierman <cukie@xxxxxxxxxx>
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
- From: Gil Cukierman <cukie@xxxxxxxxxx>
- Re: [PATCH] libselinux: Ignore missing directories when -i is used
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Constraints of policy identifiers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Constraints of policy identifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Security context of root inode of in-memory filesystems
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python: Harden tools against "rogue" modules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5 v3] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/5 v3] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v3] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v3] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v3] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/5 v2] python: Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 4/5 v2] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5 v2] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5 v2] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5 v2] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5 v2] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5 v2] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- ANN: Reference Policy 2.20221101
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Ignore missing directories when -i is used
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove dependency on the Python module distutils
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] scripts: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 5/5] README.md: Remove mention of python3-distutils dependency
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] python: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/5] libsemanage: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/5] libselinux: Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/5] Remove dependency on the Python module distutils
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: Adjust sepolgen grammar to support allowxperm, et. al.
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] libselinux: Drop '\n' from avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 135/530] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] python: Do not query the local database if the fcontext is non-local
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] gui: Fix export file chooser dialog
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4.14 080/210] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 5.10 091/390] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 057/255] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 069/229] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 063/159] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: ignore invalid class name lookup
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH] libselinux: ignore invalid class name lookup
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.19 176/717] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v6.1 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] python: Hide error message when modifying non-local fcontext
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] python: Hide error message when modifying non-local fcontext
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python: Do not query the local database if the fcontext is non-local
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 6.0 202/862] selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] selinux: use GFP_ATOMIC in convert_context()
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH] python: Harden tools against "rogue" modules
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: use GFP_ATOMIC in convert_context()
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH v5 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gui: Fix export file chooser dialog
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] docs: Add GPG fingerprints
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: Add GPG fingerprints
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH] docs: Add GPG fingerprints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/2] sandbox: Use temporary directory for XDG_RUNTIME_DIR
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 01/39] LSM: Identify modules by more than name
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 20/39] LSM: Specify which LSM to display
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 09/39] LSM: Add the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 08/39] LSM: Infrastructure management of the sock security
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: restore error on context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: restore error on context rule conflicts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [DPKG PATCH] selinux: install log callback to filter messages
- From: Guillem Jover <guillem@xxxxxxxxxx>
- Re: [PATCH] libselinux: support objname in compute_create
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tests/secretmem: add test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [DPKG PATCH] selinux: install log callback to filter messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] gui: Fix export file chooser dialog
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] tests/secretmem: add test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libselinux: Add missing '\n' to avc_log() messages
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: systemd socket activation selinux context pr review
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- systemd socket activation selinux context pr review
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: SO_PEERSEC protections in sk_getsockopt()?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: SO_PEERSEC protections in sk_getsockopt()?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v4] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: unnecessary log output in selinux_status_updated
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- RE: [PATCH] Fix race condition when exec'ing setuid files
- From: David Laight <David.Laight@xxxxxxxxxx>
- unnecessary log output in selinux_status_updated
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Fix race condition when exec'ing setuid files
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] Fix race condition when exec'ing setuid files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Jann Horn <jannh@xxxxxxxxxx>
- RE: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/2] exec: Remove LSM_UNSAFE_SHARE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- SO_PEERSEC protections in sk_getsockopt()?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: add Paul Moore's GPG fingerprint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] secilc/doc: classmap is also allowed in permissionx
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] docs: add Paul Moore's GPG fingerprint
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v6.1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux patches for v6.1
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: provide a top level LICENSE file
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH =v2] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: update the README.md with a basic SELinux description
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] docs: provide a top level LICENSE file
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] docs: update the README.md with a basic SELinux description
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- bug report: semodule doesn't reject policices with duplicate fc's
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] secilc/doc: classmap is also allowed in permissionx
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Update translations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [PATCH v3 10/29] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: James Carter <jwcart2@xxxxxxxxx>
- GREETIPNGS REAR BELOVED
- From: Mrs Aisha Gaddafi <aishagaddafiaisha20@xxxxxxxxx>
- Re: [PATCH v2 11/30] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 38/39] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 33/39] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 35/39] Audit: Add record for multiple object contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 34/39] audit: multiple subject lsm values for netlabel
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 28/39] LSM: security_secid_to_secctx module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 31/39] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 30/39] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 27/39] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 26/39] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 25/39] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 24/39] Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 22/39] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 20/39] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 23/39] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 15/39] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 16/39] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 13/39] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 12/39] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 14/39] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 11/39] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 10/39] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 09/39] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 08/39] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 03/39] LSM: Identify the process attributes for each module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 05/39] proc: Use lsmids instead of lsm names for attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 01/39] LSM: Identify modules by more than name
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 02/39] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 00/39] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] docs: add Paul Moore's GPG fingerprint
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [PATCH v2 11/30] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] docs: add Paul Moore's GPG fingerprint
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: Matt Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage: Allow user to set SYSCONFDIR
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: jeffxu@xxxxxxxxxxxx
- [PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
- From: jeffxu@xxxxxxxxxxxx
- Re: [PATCH] selinux: remove runtime disable message in the install_policy.sh script
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: remove runtime disable message in the install_policy.sh script
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] scripts/selinux: use "grep -E" instead of "egrep"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] scripts/selinux: use "grep -E" instead of "egrep"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 RFC] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] secilc/doc: classmap is also allowed in permissionx
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH userspace] fixfiles: do not cross mounts when traversing directories
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: context of socket passed between processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: /dev/random MLS policy
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- /dev/random MLS policy
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] python: Hide error message when modifying non-local fcontext
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH RFC] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH linux-next] selinux/hooks: remove the unneeded result variable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tests/secretmem: add test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH] python/chcat: Don't fail on missing translation files
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [PATCH] python/chcat: Don't fail on missing translation files
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH linux-next] selinux/hooks: remove the unneeded result variable
- [PATCH] python/chcat: Don't fail on missing translation files
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: battery dude <jyf007@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] LSM: lsm_self_attr system call to get security module attributes
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH RFC] LSM: lsm_self_attr system call to get security module attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Does NFS support Linux Capabilities
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Anna Schumaker <anna@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: context of socket passed between processes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- context of socket passed between processes
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Update translations
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [v5.19.y PATCH 3/3] Smack: Provide read control for io_uring_cmd
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v5.19.y PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [v5.19.y PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [v5.19.y PATCH 3/3] Smack: Provide read control for io_uring_cmd
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/Makefile: add missing condition for userfaultfd test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: LSM stacking in next for 6.1?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH testsuite] tests/Makefile: add missing condition for userfaultfd test
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH 3/3] secilc/docs: disable pandoc default css for html docs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] secilc/docs: fix syntax highlighting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid passing NULL pointer to memset()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: fix missing double quotes in typetransition CIL rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/xattr: add *at family syscalls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] fs: convert simple_xattrs to RCU list
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] fs: don't call capable() prematurely in simple_xattr_list()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/xattr: add *at family syscalls
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/xattr: add *at family syscalls
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] fs/xattr: wire up syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [GIT PULL] LSM fixes for v6.0 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tests/secretmem: add test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] tests/secretmem: add test
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/3] secilc/docs: disable pandoc default css for html docs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/3] secilc/docs: fix syntax highlighting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH] selinux: declare read-only parameters const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use int arrays for boolean values
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH linux-next] selinux: remove redundant variables rc
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH linux-next] selinux: Remove the unneeded result variable
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: support objname in compute_create
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] fs/xattr: add *at family syscalls
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] fs/xattr: wire up syscalls
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] selinux: declare read-only parameters const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: use int arrays for boolean values
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/2] fs/xattr: add *at family syscalls
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] fs/xattr: wire up syscalls
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH linux-next] selinux: remove redundant variables rc
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests: remove more stray flag/temporary files with 'make clean'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH linux-next] selinux: Remove the unneeded result variable
- Re: [systemd-devel] socket activation selinux context on create
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] LSM fixes for v6.0 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid passing NULL pointer to memset()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: fix missing double quotes in typetransition CIL rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] checkpolicy: avoid passing NULL pointer to memset()
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 3/3] secilc/docs: disable pandoc default css for html docs
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 2/3] secilc/docs: fix syntax highlighting
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Song Liu <songliubraving@xxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Song Liu <songliubraving@xxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Song Liu <songliubraving@xxxxxx>
- Re: [PATCH 0/3] LSM hooks for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH testsuite] tests: remove more stray flag/temporary files with 'make clean'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 0/2] Prepare userfaultfd policy for Fedora policy changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Song Liu <songliubraving@xxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Song Liu <songliubraving@xxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH] libsepol: fix missing double quotes in typetransition CIL rule
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/2] test_userfaultfd.te: adapt to upcoming Fedora policy changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Fwd: [systemd-devel] socket activation selinux context on create
- From: Ted Toth <txtoth@xxxxxxxxx>
- Re: [PATCH] tests/filesystem/xfs: use a 300M xfs filesystem image
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] tests/filesystem/xfs: use a 300M xfs filesystem image
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/2] test_userfaultfd.te: adapt to upcoming Fedora policy changes
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite 1/2] policy: remove CIL workarounds for missing anon_inode class
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 2/2] test_userfaultfd.te: adapt to upcoming Fedora policy changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite 0/2] Prepare userfaultfd policy for Fedora policy changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: SCTP fixes, including ASCONF
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: add a new warn_on_audited debug flag to selinuxfs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Jens Axboe <axboe@xxxxxxxxx>
- [PATCH 3/3] /dev/null: add IORING_OP_URING_CMD support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 0/3] LSM hooks for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] LSM hooks for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 0/3] LSM hooks for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux testsuite on 6.0-rc2 binder BUG
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux testsuite on 6.0-rc2 binder BUG
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1] selinux/ss/services.c: check the return value of audit_log_start() in security_sid_mls_copy()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v1] selinux/ss/services.c: check the return value of audit_log_start() in security_sid_mls_copy()
- From: lily <floridsleeves@xxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] f*xattr: allow O_PATH descriptors
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- RE: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Jonathan Chapman-Moore <jdm7dv@xxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Variable type completion
- From: Xin Gao <gaoxin@xxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Read in sock_has_perm
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Read in sock_has_perm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Read in sock_has_perm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [syzbot] KASAN: use-after-free Read in sock_has_perm
- From: syzbot <syzbot+2f2c6bea25b08dc06f86@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add a new warn_on_audited debug flag to selinuxfs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean'
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: SCTP fixes, including ASCONF
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v5 3/4] selftests/bpf: Add tests verifying bpf lsm userns_create hook
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- [PATCH v5 4/4] selinux: Implement userns_create hook
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- [PATCH v5 2/4] bpf-lsm: Make bpf_lsm_userns_create() sleepable
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- [PATCH v5 0/4] Introduce security_create_user_ns()
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- [PATCH v5 1/4] security, lsm: Introduce security_create_user_ns()
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] ci: bump versions in GitHub Actions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: use strict function prototype for definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: avoid newline in avc message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] ci: bump versions in GitHub Actions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: SCTP fixes, including ASCONF
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [BUG] (fsuse xattr "fuse" mycontext) causes deadlock for mount/sync syscall
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux: SCTP fixes, including ASCONF
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: KVM / virtual networking access control
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: use strict function prototype for definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: avoid newline in avc message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tests/sctp: reenable the SCTP ASCONF tests
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: SCTP fixes, including ASCONF
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: KVM / virtual networking access control
- From: Karl MacMillan <karl@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v3 1/8] libsepol: refactor ebitmap conversion in link.c
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/5] libsepol: rename validate_policydb to policydb_validate
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/7] libsepol/tests: add ebitmap tests
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: break circular include
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: set errno to EBADF on O_PATH emulation ENOENT failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] restorecond: use strict function prototype for definition
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: use strict function prototype for definitions
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils: install into bin PATH
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce security_create_user_ns()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]