SELinux - Date Index
[Prev Page][Next Page]
- [PATCH 06/17] Makefile: add PHONY targets
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 02/17] Makefile: use $(MAKE) to pass options
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 04/17] tests: port scripts to sh and please shellcheck
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 03/17] tools: quote command to prevent word splitting
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: Intent to release 3.7
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] fixfiles: use `grep -F` when search in mounts
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] restorecond: Set GLib IO channels to binary mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: open lock_file with O_RDWR
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Optionally allow duplicate role declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH 22/22] selinux: restrict policy strings
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 00/22] selinux: harden against malformed policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 21/22] selinux: check for simple types
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 20/22] selinux: more strict bounds check
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 19/22] selinux: validate symbols
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 18/22] selinux: beef up isvalid checks
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 17/22] selinux: reorder policydb_index()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 16/22] selinux: check type attr map overflows
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 15/22] selinux: introduce ebitmap_highest_set_bit()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 14/22] selinux: pre-validate conditional expressions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 13/22] selinux: validate constraints
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 12/22] selinux: check length fields in policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 11/22] selinux: more strict policy parsing
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 10/22] selinux: use u16 for security classes
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 09/22] selinux: make use of str_read()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 08/22] selinux: avoid unnecessary indirection in struct level_datum
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 07/22] selinux: use known type instead of void pointer
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 06/22] selinux: rename comparison functions for clarity
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 04/22] selinux: rework match_ipv6_addrmask()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 03/22] selinux: align and constify functions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 01/22] selinux: supply missing field initializers
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 02/22] selinux: avoid using types indicating user space interaction
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 05/22] selinux: avoid nontransitive comparison
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] policycoreutils: introduce unsetfiles
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v5 1/6] libsepol: misc assertion cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: RFC: Adding a dyntrans in systemd pid1's forking
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: RFC: Adding a dyntrans in systemd pid1's forking
- From: Kenton Groombridge <me@xxxxxxxxxx>
- Re: RFC: Adding a dyntrans in systemd pid1's forking
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH] fixfiles: use `grep -F` when search in mounts
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Intent to release 3.7
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH v1 1/2] libsepol: allow specifying SUBDIRS when building
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- [PATCH v1 2/2] libsemanage: allow specifying SUBDIRS when building
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- [GIT PULL] selinux/selinux-pr-20241112
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: Fix SCTP error inconsistency in selinux_socket_bind()
- From: Mikhail Ivanov <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- Re: Allow rule not having any effect?!
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: How to write a policy for a "service wrapper"?
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: How to write a policy for a "service wrapper"?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- SOLVED: Allow rule not having any effect?!
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Allow rule not having any effect?!
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- How to write a policy for a "service wrapper"?
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- [PATCH 39/47] libsemanage: avoid writing directly to stderr
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 47/47] libsemanage/tests: misc cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 40/47] libsemanage: drop duplicate newlines and error descriptions in error messages
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 43/47] libsemanage: optimize policy by default
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 46/47] libsemanage: respect shell paths with /usr prefix
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 45/47] libsemanage: skip sort of empty arrays
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 44/47] libsemanage/man: add documentation for command overrides
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 42/47] libsemanage: simplify file deletion
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 41/47] libsemanage: check closing written files
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 34/47] libsemanage: drop macros used once
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 35/47] libsemanage: handle shell allocation failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 32/47] libsemanage: use asprintf(3) to simplify code
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 38/47] libsemanage: avoid strerror(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 27/47] libsemanage: constify function pointer structures
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 36/47] libsemanage: drop dead code
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 28/47] libsemanage: simplify loop exit
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 33/47] libsemanage: use size_t for hash input sizes
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 37/47] libsemanage: preserve errno during internal logging
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 29/47] libsemanage: constify read only parameters and variables
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 30/47] libsemanage: avoid misc function pointer casts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 26/47] libsemanage: more strict value parsing
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 31/47] libsemanage: adjust sizes to avoid implicit truncations
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 23/47] libsemanage: simplify malloc plus strcpy via strndup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 22/47] libsemanage: free ibdev names in semanage_ibendport_validate_local()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 25/47] libsemanage: introduce write_full wrapper
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 24/47] libsemanage: check for path formatting failures
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 21/47] libsemanage: handle cil_set_handle_unknown() failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 18/47] libsemanage: fix asprintf error branch
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 16/47] libsemanage: cast to unsigned char for character checking functions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 14/47] libsemanage: declare file local function tables static
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 20/47] libsemanage: use strtok_r for thread safety
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 17/47] libsemanage: drop casts to same type
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 19/47] libsemanage: avoid leak on realloc failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 15/47] libsemanage: avoid const dropping casts
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 12/47] libsemanage: use unlink on non directory
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 13/47] libsemanage: free resources on failed connect attempt
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 11/47] libsemanage: check memory allocations
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 10/47] libsemanage: set O_CLOEXEC flag for file descriptors
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 07/47] libsemanage: drop unnecessary return statements
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 01/47] libsemanage: white space cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 08/47] libsemanage: drop duplicate include
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 09/47] libsemanage: drop const from function declaration
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 06/47] libsemanage: drop unnecessary declarations
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 03/47] libsemanage: drop unused macro
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 04/47] libsemanage: drop dead assignments
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 05/47] libsemanage: drop dead variable
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 02/47] libsemanage: fix typo
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: avoid dynamic allocation in openattr()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v5 6/6] libsepol/tests: add cond xperm neverallow tests
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v5 4/6] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v5 1/6] libsepol: misc assertion cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v5 3/6] checkpolicy: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v5 2/6] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v5 5/6] libsepol: indent printed allow rule on assertion failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsemanage: open lock_file with O_RDWR
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: avoid dynamic allocation in openattr()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid leak of identifier on required attribute
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: avoid memory leaks on redeclarations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [PATCH] selinux,xfrm: fix dangling refcount on deferred skb free
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] policy/test_sctp.te: add missing corenet_inout_generic_if() calls
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RFC: Adding a dyntrans in systemd pid1's forking
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] libsepol: add support for xperms in conditional policies
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] checkpolicy: avoid leak of identifier on required attribute
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH next] lsm: Fix signedness bug in selinux_secid_to_secctx()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy: avoid memory leaks on redeclarations
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: make use of calloc(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: avoid dynamic allocation in openattr()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 6/9] libselinux: rework selabel_file(5) database
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 8/9] libselinux: add selabel_file(5) fuzzer
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/9] policycoreutils: introduce unsetfiles
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 9/9] libselinux: support parallel selabel_lookup(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 7/9] libselinux: remove unused hashtab code
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 5/9] libselinux: sidtab updates
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 4/9] libselinux: add unique id to sidtab entries
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 2/9] libselinux/utils: introduce selabel_compare
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 3/9] libselinux: use more appropriate types in sidtab
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 0/9] libselinux: rework selabel_file(5) database
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 5/6] libsepol: indent printed allow rule on assertion failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 2/6] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 4/6] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 3/6] checkpolicy: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 1/6] libsepol: misc assertion cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v4 6/6] libsepol/tests: add cond xperm neverallow tests
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/3] libsemanage: Optionally allow duplicate declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsepol: Remove special handling of roles in module_to_cil.c
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Optionally allow duplicate role declarations
- From: James Carter <jwcart2@xxxxxxxxx>
- [syzbot] [selinux?] INFO: rcu detected stall in rw_verify_area (3)
- From: syzbot <syzbot+fc43743888db044f8f70@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH next] lsm: Fix signedness bug in selinux_secid_to_secctx()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH next] lsm: Fix signedness bug in selinux_secid_to_secctx()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Setrans ambiguous translations
- From: "Sloane, Brandon" <bsloane@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: add netlink nlmsg_type audit message
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] LSM: Use lsm_context in security_inode_getsecctx
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] LSM: secctx provider check on release
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: add support for xperms in conditional policies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: add netlink nlmsg_type audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api: INTEGER_OVERFLOW read_len = read()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux/setexecfilecon: Remove useless rc check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Support nlmsg xperms in assertions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol/cil: Initialize avtab_datum on declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy/fuzz: fix setjmp condition
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libselinux: avoid errno modification by fclose(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: fix swig bindings for 4.3.0
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: formally deprecate security_compute_user()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 4/6] libsepol/cil: add support for xperms in conditional policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux/setexecfilecon: Remove useless rc check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage/direct_api: INTEGER_OVERFLOW read_len = read()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 4/6] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] libsepol/cil: add support for xperms in conditional policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsemanage/direct_api: INTEGER_OVERFLOW read_len = read()
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/2] libselinux/setexecfilecon: Remove useless rc check
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/2] libselinux/matchpathcon: RESOURCE_LEAK: Variable "con"
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3 4/6] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 3/6] checkpolicy: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 6/6] libsepol/tests: add cond xperm neverallow tests
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 5/6] libsepol: indent printed allow rule on assertion failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 2/6] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/6] libsepol: misc assertion cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/3] all: coding style fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/3] check-syntax: update arguments for astyle v3.2 (possibly earlier)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/3] check-syntax: ignore "bad" astyle versions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH v2 2/4] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 3/4] checkpolicy: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 1/4] libsepol: misc assertion cleanup
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 4/4] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] restorecond: Set GLib IO channels to nonblocking
- From: Fabian Vogt <fvogt@xxxxxxx>
- [PATCH 1/2] restorecond: Set GLib IO channels to binary mode
- From: Fabian Vogt <fvogt@xxxxxxx>
- [PATCH 0/2] restorecond: GLib IO channel fixes
- From: Fabian Vogt <fvogt@xxxxxxx>
- [PATCH v3 5/5] LSM: secctx provider check on release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 4/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: add support for xperms in conditional policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/4] libsepol/cil: Initialize avtab_datum on declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Support nlmsg xperms in assertions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsepol/cil: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/3] checkpolicy: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v2 1/4] libsepol/cil: Initialize avtab_datum on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 3/4] libsepol/cil/cil_post: Initialize tmp on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 4/4] libsepol: Initialize "strs" on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2 2/4] libsepol/mls: Do not destroy context on memory error
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: testsuite astyle options no longer supported
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: testsuite astyle options no longer supported
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: add netlink nlmsg_type audit message
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH 4/4] libsepol: Initialize "strs" on declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 3/4] libsepol/cil/cil_post: Initialize tmp on declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/4] libsepol/mls: Do not destroy context on memory error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol/cil: Initialize avtab_datum on declaration
- From: James Carter <jwcart2@xxxxxxxxx>
- testsuite astyle options no longer supported
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/6] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] LSM: secctx provider check on release
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 4/4] libsepol: Initialize "strs" on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 3/4] libsepol/cil/cil_post: Initialize tmp on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 2/4] libsepol/mls: Do not destroy context on memory error
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH 1/4] libsepol/cil: Initialize avtab_datum on declaration
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2 4/6] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] LSM: secctx provider check on release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] LSM: lsm_context in security_dentry_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] LSM: secctx provider check on release
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Support nlmsg xperms in assertions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH 1/4] libselinux: avoid errno modification by fclose(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy/fuzz: fix setjmp condition
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: selinux_set_callback for policy load not triggering
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] newrole: constant time password comparison
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy/fuzz: fix setjmp condition
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/4] selinux: set missing errno in failure branch
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/4] libsemanage: check for rewind(3) failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/4] libselinux: avoid errno modification by fclose(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/4] selinux: free memory in error branch
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: selinux_set_callback for policy load not triggering
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux_set_callback for policy load not triggering
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- selinux_set_callback for policy load not triggering
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: fix swig bindings for 4.3.0
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsemanage: fix swig bindings for 4.3.0
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 1/2] libselinux: fix swig bindings for 4.3.0
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libselinux: formally deprecate security_compute_user()
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- Re: [PATCH v2 0/6] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] LSM: Replace secctx/len pairs with lsm_context
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 0/6] LSM: Replace secctx/len pairs with lsm_context
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v2 6/6] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] LSM: secctx provider check on release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/13] Audit: maintain an lsm_prop in audit_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/13] Audit: maintain an lsm_prop in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/13] Audit: maintain an lsm_prop in audit_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/13] Audit: maintain an lsm_prop in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/13] LSM: Add the lsm_prop data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 01/13] LSM: Add the lsm_prop data structure.
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/13] LSM: Use lsm_prop in security_ipc_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/13] Audit: maintain an lsm_prop in audit_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/13] LSM: Add the lsm_prop data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4 05/13] LSM: Use lsm_prop in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 02/13] LSM: Use lsm_prop in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 01/13] LSM: Add the lsm_prop data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 03/13] LSM: Add lsmprop_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 00/13] LSM: Move away from secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 13/13] LSM: Remove lsm_prop scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 12/13] Use lsm_prop for audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 10/13] LSM: Create new security_cred_getlsmprop LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 11/13] Audit: Change context data from secid to lsm_prop
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 09/13] Audit: use an lsm_prop in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 08/13] LSM: Use lsm_prop in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 07/13] LSM: Use lsm_prop in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 06/13] Audit: Update shutdown LSM data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 04/13] Audit: maintain an lsm_prop in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: Deprecate /sys/fs/selinux/user
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: Deprecate /sys/fs/selinux/user
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: apply clang format to security/selinux/nlmsgtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v9 7/7] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 6/7] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 5/7] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 4/7] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 3/7] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 2/7] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 1/7] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v9 0/7] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2] selinux: Deprecate /sys/fs/selinux/user
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Deprecate /sys/fs/selinux/user
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Deprecate /sys/fs/selinux/user
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: formally deprecate security_compute_user()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Deprecate /sys/fs/selinux/user
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v5.15-v6.1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Shivani Agarwal <shivani.agarwal@xxxxxxxxxxxx>
- [PATCH v5.10] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Shivani Agarwal <shivani.agarwal@xxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 2/2] selinux: apply clang format to security/selinux/nlmsgtab.c
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 1/2] selinux: streamline selinux_nlmsg_lookup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- [pcmoore-selinux:main 1/1] README.orig: warning: ignored by one of the .gitignore files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux,smack: properly reference the LSM blob in security_watch_key()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] mm: call the security_mmap_file() LSM hook in remap_file_pages()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] mm: call the security_mmap_file() LSM hook in remap_file_pages()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] LSM: Replace context+len with lsm_context
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- [PATCH 5/5] LSM: Use lsm_context in security_inode_notifysecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] LSM: secctx provider check on release
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] LSM: lsm_context in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] LSM: Use lsm_context in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] LSM: Replace secctx/len pairs with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] LSM: Replace context+len with lsm_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- ANN: Reference Policy 2.20240916
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240911
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240911
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 7/8] net: Replace strcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2 0/8] Enable build system on macOS hosts
- From: Jeff Xie <xiehuan09@xxxxxxxxx>
- [PATCH v3] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 05/13] LSM: Use lsm_prop in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 07/13] LSM: Use lsm_prop in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 06/13] Audit: Update shutdown LSM data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 02/13] LSM: Use lsm_prop in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 03/13] LSM: Add lsmprop_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 01/13] LSM: Add the lsm_prop data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 13/13] LSM: Remove lsm_prop scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 12/13] Use lsm_prop for audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 11/13] Audit: Change context data from secid to lsm_prop
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 10/13] LSM: Create new security_cred_getlsmprop LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 09/13] Audit: use an lsm_prop in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 08/13] LSM: Use lsm_prop in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 04/13] Audit: maintain an lsm_prop in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 00/13] LSM: Move away from secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Jan Kara <jack@xxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] policy/test_filesystem.te: fix policy for NFS over a symlinked directory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 1/8] scripts: subarch.include: fix SUBARCH on macOS hosts
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 8/8] Documentation: add howto build in macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- linux-next commit 0855feef5235 ("fsnotify: introduce pre-content permission event")
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] selinux: fix style problems in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] scripts: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v2 8/8] Documentation: add howto build in macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 7/8] selinux: move genheaders to security/selinux/
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 6/8] selinux: do not include <linux/*.h> headers from host programs
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 5/8] scripts: add bee-headers support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 4/8] arm64: nvhe: add bee-headers support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 3/8] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 1/8] scripts: subarch.include: fix SUBARCH on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 2/8] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH v2 0/8] Enable build system on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: rename hashtab functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux-testsuite / NFS symlink issue
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- selinux-testsuite / NFS symlink issue
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 5/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/13] Audit: maintain an lsmblob in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/13] LSM: Add lsmblob_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/13] Audit: maintain an lsmblob in audit_context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/13] LSM: Add lsmblob_to_secctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/13] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix style problems in security/selinux/include/audit.h
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] libselinux: rename hashtab functions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 11/13] Audit: Change context data from secid to lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 06/13] Audit: Update shutdown LSM data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 05/13] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 01/13] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 00/13] LSM: Move away from secids
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 13/13] LSM: Remove lsmblob scaffolding
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 12/13] Netlabel: Use lsmblob for audit data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 09/13] Audit: use an lsmblob in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 07/13] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 08/13] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 04/13] Audit: maintain an lsmblob in audit_context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 03/13] LSM: Add lsmblob_to_secctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH testsuite v2] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 3/3] libsepol: Add policy capability netlink_xperm
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/3] libsepol: Support nlmsg extended permissions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH testsuite] policy,tests: add tests for netlink xperms
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH 0/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: simplify avc_xperms_audit_required()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v3] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH RESEND] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 7/8] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 3/8] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: ericsu@xxxxxxxxxxxxxxxxxxx
- [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH] libselinux: rename hashtab functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [syzbot] [selinux?] KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
- From: syzbot <syzbot+319ed1769c0078257262@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: simplify avc_xperms_audit_required()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Add policy capability netlink_xperm
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 2/3] libsepol: Support nlmsg extended permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 2/2] security: Update file_set_fowner documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Klaus Jensen <k.jensen@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH v7 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 7/8] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 3/8] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240814
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240814
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: kernel NULL pointer dereference in selinux_cred
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- kernel NULL pointer dereference in selinux_cred
- From: "Jaihind Yadav (QUIC)" <quic_jaihindy@xxxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Samasth Norway Ananda <samasth.norway.ananda@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]