SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v8 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: replace kmem_cache_create() with KMEM_CACHE()
- From: ericsu@xxxxxxxxxxxxxxxxxxx
- [PATCH testsuite] tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: annotate false positive data race to avoid KCSAN warnings
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: mark all newly created Internet domain sockets as labeled sockets
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH] libselinux: rename hashtab functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [syzbot] [selinux?] KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
- From: syzbot <syzbot+319ed1769c0078257262@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: simplify avc_xperms_audit_required()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 3/3] libsepol: Add policy capability netlink_xperm
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 2/3] libsepol: Support nlmsg extended permissions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH 1/3] libsepol: Rename ioctl xperms structures and functions
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 2/2] security: Update file_set_fowner documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- [PATCH] sepolgen-ifgen: allow M4 escaped filenames
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Klaus Jensen <k.jensen@xxxxxxxxxxx>
- Re: [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH v7 8/8] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 7/8] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 3/8] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 2/8] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 1/8] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v7 0/8] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH testsuite] tests/extended_socket_class: test SMC sockets
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- selinux: support IPPROTO_SMC in socket_type_to_security_class()
- From: Jeongjun Park <aha310510@xxxxxxxxx>
- [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240814
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240814
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: kernel NULL pointer dereference in selinux_cred
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- kernel NULL pointer dereference in selinux_cred
- From: "Jaihind Yadav (QUIC)" <quic_jaihindy@xxxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix Null pointer deference at sidtab_convert_hashtable()
- From: Samasth Norway Ananda <samasth.norway.ananda@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: kernel test robot <lkp@xxxxxxxxx>
- [no subject]
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- [PATCH] checkpolicy: Fix MLS users in optional blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] libsepol/cil: Allow dotted names in aliasactual rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: no period allowed in typealiasactual libsepol 3.7
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- [PATCH v6 9/9] drm: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 8/9] net: Replace strcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 6/9] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 5/9] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 4/9] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 3/9] security: Replace memcpy() with get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 2/9] auditsc: Replace memcpy() with strscpy()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 1/9] Get rid of __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v6 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- no period allowed in typealiasactual libsepol 3.7
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: "Daniel Gomez (Samsung)" <d+samsung@xxxxxxxxxx>
- [PATCH 2/2] selinux: move genheaders to security/selinux/
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/2] selinux: Do not include <linux/*.h> from host programs (+ extra clean-up)
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: revert our use of vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] Revert "selinux: use vma_is_initial_stack() and vma_is_initial_heap()"
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH v3 3/4] selinux: use vma_is_initial_stack() and vma_is_initial_heap()
- From: Marc Reisner <reisner.marc@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 05/12] accessiblity/speakup: genmap and makemapdata require linux/version.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 02/12] kbuild: add header_install dependency to scripts
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Nicolas Schier <nicolas@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] include: add elf.h support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] Enable build system on macOS hosts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- [PATCH 1/1] selinux: add the processing of the failure of avc_add_xperms_decision()
- From: thunder.leizhen@xxxxxxxxxxxxxxx
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez <da.gomez@xxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [PATCH 11/12] tty/vt: conmakehash requires linux/limits.h
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 09/12] include: add endian.h support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 12/12] scripts/kallsyms: add compatibility support for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 08/12] include: add elf.h support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 05/12] accessiblity/speakup: genmap and makemapdata require linux/version.h
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 07/12] selinux/mdp: include bitsperlong and posix_types headers
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 10/12] scripts/mod: add byteswap support
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 06/12] selinux/genheaders: include bitsperlong and posix_types headers
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 04/12] drm/xe: xe_gen_wa_oob: fix program_invocation_short_name for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 03/12] file2alias: fix uuid_t definitions for macos
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 02/12] kbuild: add header_install dependency to scripts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 00/12] Enable build system on macOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- [PATCH 01/12] scripts: subarch.include: fix SUBARCH on MacOS hosts
- From: Daniel Gomez via B4 Relay <devnull+da.gomez.samsung.com@xxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Alejandro Colomar <alx@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/1] selinux: Fix potential counting error in avc_add_xperms_decision()
- From: thunder.leizhen@xxxxxxxxxxxxxxx
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5 0/9] Improve the copy of task comm
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2 0/2] get rid of cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v5 9/9] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 8/9] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 7/9] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 6/9] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 5/9] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 4/9] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 3/9] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 2/9] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 1/9] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v5 0/9] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: monolithic policy on a volatile root
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- monolithic policy on a volatile root
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH v1 2/2] policygen: respect CIL option when generating comments
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- [PATCH v1 1/2] sepolgen: initialize gen_cil
- From: dmitry.sharshakov@xxxxxxxxxxxxxx
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- SELinux namespaces re-base
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next,v2] selinux: refactor code to return ERR_PTR in selinux_netlbl_sock_genattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: UnicodeDecodeError: utf-8 on python semanage -i import
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: UnicodeDecodeError: utf-8 on python semanage -i import
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- [PATCH v1 2/2] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 1/2] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240715
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240715
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next,v2] selinux: refactor code to return ERR_PTR in selinux_netlbl_sock_genattr
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Serge Hallyn <serge@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Serge Hallyn <serge@xxxxxxxxxx>
- [PATCH bpf-next v4 15/20] bpf: Fix compare error in function retval_range_within
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 20/20] selftests/bpf: Add verifier tests for bpf lsm
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 19/20] selftests/bpf: Add test for lsm tail call
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 18/20] selftests/bpf: Add return value checks for failed tests
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 17/20] selftests/bpf: Avoid load failure for token_lsm.c
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 16/20] bpf: Add a special case for bitwise AND on range [-1, 0]
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 13/20] bpf, lsm: Add check for BPF LSM return value
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 14/20] bpf: Prevent tail call between progs attached to different hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 12/20] bpf, lsm: Enable BPF LSM prog to read/write return value parameters
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 09/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 06/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 07/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 04/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 08/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 05/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH -next] selinux: refactor code to return the correct errno
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: James Carter <jwcart2@xxxxxxxxx>
- UnicodeDecodeError: utf-8 on python semanage -i import
- From: Allan Oepping <allan@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- ANN: SELinux userspace 3.7
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
- [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.7-rc3 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: check scope permissions refer to valid class
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: contify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] tree-wide: fix misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: validate attribute-type maps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: reject duplicate nodecon statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: move unchanged data out of loop
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: hashtab: save one comparison on hit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] fixfiles: drop unnecessary \ line endings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: rework permission enabled check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH v2 10/10] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 09/10] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 08/10] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 07/10] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 04/10] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 03/10] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 02/10] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 01/10] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 00/10] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: contify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] tree-wide: fix misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [f2fs-dev] [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: patchwork-bot+f2fs@xxxxxxxxxx
- Re: [PATCH] libsepol: validate attribute-type maps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: reject duplicate nodecon statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: move unchanged data out of loop
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: rework permission enabled check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: hashtab: save one comparison on hit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce user namespace capabilities
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH] fixfiles: drop unnecessary \ line endings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 3/4] capabilities: Add sysctl to mask off userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 0/4] Introduce user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH] libsepol: contify function pointer arrays
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] tree-wide: fix misc typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: reject duplicate nodecon statements
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: rework permission enabled check
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: move unchanged data out of loop
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: hashtab: save one comparison on hit
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: validate attribute-type maps
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] fixfiles: drop unnecessary \ line endings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- ANN: SELinux userspace 3.7-rc2 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] sandbox: do not fail without xmodmap
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] sandbox: do not fail without xmodmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
- From: Quentin Monnet <qmo@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Chris Hofstaedtler <zeha@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 6/6] selftests/bpf: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 0/6] kernel: Avoid memcpy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 2/2 testsuite] tests/nfs_filesystem: comment out failing mount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 2/2] tests/nfs_filesystem: remove failing mount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: perform contiguous check in host byte order
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reject self flag in type rules in old policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- ANN: SELinux userspace 3.7-rc1 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH PR #134] sesearch: CIL output
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Thomas Hellström <thomas.hellstrom@xxxxxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]