SELinux - Date Index
[Prev Page][Next Page]
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 2/2] selinux: apply clang format to security/selinux/nlmsgtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- [pcmoore-selinux:main 1/1] README.orig: warning: ignored by one of the .gitignore files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] mm: call the security_mmap_file() LSM hook in remap_file_pages()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] mm: call the security_mmap_file() LSM hook in remap_file_pages()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] LSM: Replace context+len with lsm_context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5/5] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] LSM: secctx provider check on release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- ANN: Reference Policy 2.20240916
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240911
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240911
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 7/8] net: Replace strcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2 0/8] Enable build system on macOS hosts
- From: Jeff Xie <xiehuan09@xxxxxxxxx>
- [PATCH v3] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 05/13] LSM: Use lsm_prop in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 07/13] LSM: Use lsm_prop in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 06/13] Audit: Update shutdown LSM data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 02/13] LSM: Use lsm_prop in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 03/13] LSM: Add lsmprop_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 01/13] LSM: Add the lsm_prop data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 13/13] LSM: Remove lsm_prop scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 12/13] Use lsm_prop for audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 11/13] Audit: Change context data from secid to lsm_prop
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 10/13] LSM: Create new security_cred_getlsmprop LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 09/13] Audit: use an lsm_prop in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 08/13] LSM: Use lsm_prop in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 04/13] Audit: maintain an lsm_prop in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 00/13] LSM: Move away from secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Jan Kara <jack@xxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 1/8] scripts: subarch.include: fix SUBARCH on macOS hosts
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] selinux: fix style problems in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] scripts: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v2 8/8] Documentation: add howto build in macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 5/8] scripts: add bee-headers support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 1/8] scripts: subarch.include: fix SUBARCH on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 0/8] Enable build system on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: rename hashtab functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- selinux-testsuite / NFS symlink issue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 5/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/13] Audit: maintain an lsmblob in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/13] LSM: Add lsmblob_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/13] Audit: maintain an lsmblob in audit_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/13] LSM: Add lsmblob_to_secctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix style problems in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] libselinux: rename hashtab functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 11/13] Audit: Change context data from secid to lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 06/13] Audit: Update shutdown LSM data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 05/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 01/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 00/13] LSM: Move away from secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 13/13] LSM: Remove lsmblob scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 12/13] Netlabel: Use lsmblob for audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 09/13] Audit: use an lsmblob in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 07/13] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 08/13] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 04/13] Audit: maintain an lsmblob in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 03/13] LSM: Add lsmblob_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol: Add policy capability netlink_xperm
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: Support nlmsg extended permissions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH 0/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: simplify avc_xperms_audit_required()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH RESEND] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 7/8] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 3/8] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: ericsu@xxxxxxxxxxxxxxxxxxx
- [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH] libselinux: rename hashtab functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [syzbot] [selinux?] KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
- From: syzbot <syzbot+319ed1769c0078257262@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: simplify avc_xperms_audit_required()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Add policy capability netlink_xperm
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 2/3] libsepol: Support nlmsg extended permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 2/2] security: Update file_set_fowner documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Klaus Jensen <k.jensen@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH v7 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 7/8] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 3/8] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240814
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240814
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: kernel NULL pointer dereference in selinux_cred
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- kernel NULL pointer dereference in selinux_cred
- From: "Jaihind Yadav (QUIC)" <quic_jaihindy@xxxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Samasth Norway Ananda <samasth.norway.ananda@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- [no subject]
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: no period allowed in typealiasactual libsepol 3.7
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH v6 9/9] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 8/9] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 6/9] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 5/9] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 4/9] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 3/9] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 2/9] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- no period allowed in typealiasactual libsepol 3.7
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/2] selinux: Do not include <linux/*.h> from host programs (+ extra clean-up)
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 05/12] accessiblity/speakup: genmap and makemapdata require linux/version.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 02/12] kbuild: add header_install dependency to scripts
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: thunder.leizhen@xxxxxxxxxxxxxxx
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 09/12] include: add endian.h support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 12/12] scripts/kallsyms: add compatibility support for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 05/12] accessiblity/speakup: genmap and makemapdata require linux/version.h
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 07/12] selinux/mdp: include bitsperlong and posix_types headers
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 10/12] scripts/mod: add byteswap support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 02/12] kbuild: add header_install dependency to scripts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: thunder.leizhen@xxxxxxxxxxxxxxx
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2 0/2] get rid of cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v5 9/9] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 8/9] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 7/9] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 6/9] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 5/9] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 4/9] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 3/9] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 2/9] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 1/9] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v1 2/2] policygen: respect CIL option when generating comments
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next,v2] selinux: refactor code to return ERR_PTR in selinux_netlbl_sock_genattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: UnicodeDecodeError: utf-8 on python semanage -i import
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: UnicodeDecodeError: utf-8 on python semanage -i import
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- [PATCH v1 2/2] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 1/2] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240715
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240715
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next,v2] selinux: refactor code to return ERR_PTR in selinux_netlbl_sock_genattr
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Serge Hallyn <serge@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Serge Hallyn <serge@xxxxxxxxxx>
- [PATCH bpf-next v4 15/20] bpf: Fix compare error in function retval_range_within
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 20/20] selftests/bpf: Add verifier tests for bpf lsm
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 19/20] selftests/bpf: Add test for lsm tail call
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 18/20] selftests/bpf: Add return value checks for failed tests
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 17/20] selftests/bpf: Avoid load failure for token_lsm.c
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 16/20] bpf: Add a special case for bitwise AND on range [-1, 0]
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 13/20] bpf, lsm: Add check for BPF LSM return value
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 14/20] bpf: Prevent tail call between progs attached to different hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 12/20] bpf, lsm: Enable BPF LSM prog to read/write return value parameters
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 09/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 06/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 07/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 04/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 08/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 05/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH -next] selinux: refactor code to return the correct errno
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: James Carter <jwcart2@xxxxxxxxx>
- UnicodeDecodeError: utf-8 on python semanage -i import
- From: Allan Oepping <allan@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]