SELinux - Date Index
[Prev Page][Next Page]
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v5] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH resend v4 00/11] Improve the copy of task comm
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH resend v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libselinux/restorecon: Include <selinux/label.h>
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v4] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- [PATCH v1 2/2] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 1/2] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH v1 0/2] Refactor return value of two lsm hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] libsepol/cil: Check that sym_index is within bounds
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v3] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH] libsepol/sepol_compute_sid: Do not destroy uninitialized context
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH v2] libsemanage: Preserve file context and ownership in policy store
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240715
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240715
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RPC] Topic: Issues and Testing Regarding SELinx AVC Cache Modification
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next,v2] selinux: refactor code to return ERR_PTR in selinux_netlbl_sock_genattr
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH] selinux: refactor code to return the correct errno
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SElinux store file context and ownership change
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [RFC PATCH] libsemanage: Do not change file context when copying files
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- SElinux store file context and ownership change
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Serge Hallyn <serge@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Serge Hallyn <serge@xxxxxxxxxx>
- [PATCH bpf-next v4 15/20] bpf: Fix compare error in function retval_range_within
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 20/20] selftests/bpf: Add verifier tests for bpf lsm
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 19/20] selftests/bpf: Add test for lsm tail call
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 18/20] selftests/bpf: Add return value checks for failed tests
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 17/20] selftests/bpf: Avoid load failure for token_lsm.c
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 16/20] bpf: Add a special case for bitwise AND on range [-1, 0]
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 13/20] bpf, lsm: Add check for BPF LSM return value
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 14/20] bpf: Prevent tail call between progs attached to different hooks
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 12/20] bpf, lsm: Enable BPF LSM prog to read/write return value parameters
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 09/20] lsm: Refactor return value of LSM hook key_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 06/20] lsm: Refactor return value of LSM hook getselfattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 07/20] lsm: Refactor return value of LSM hook setprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 04/20] lsm: Refactor return value of LSM hook inode_listsecurity
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 08/20] lsm: Refactor return value of LSM hook getprocattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 05/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH -next] selinux: refactor code to return the correct errno
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] libselinux: set free'd data to NULL
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- In permissive setting labels that are not in host policy when running unprivileged fails with EINVAL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libselinux: set free'd data to NULL
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Regression in 5876aca0484f ("libselinux: free data on selabel open failure")
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH] checkpolicy: Check the right bits of an ibpkeycon rule subnet prefix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- [PATCH] libselinux: Fix integer comparison issues when compiling for 32-bit
- From: James Carter <jwcart2@xxxxxxxxx>
- UnicodeDecodeError: utf-8 on python semanage -i import
- From: Allan Oepping <allan@xxxxxxxxxxxxxx>
- [PATCH] selinux: Streamline type determination in security_compute_sid
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- [PATCH] selinux: Use 1UL for EBITMAP_BIT to match maps type
- From: Canfeng Guo <guocanfeng@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- ANN: SELinux userspace 3.7
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
- [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 10/11] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 08/11] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 05/11] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 04/11] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 03/11] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 02/11] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 00/11] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux userspace 3.7-rc3 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH] libsepol: check scope permissions refer to valid class
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: check scope permissions refer to valid class
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: Do not reject all type rules in conditionals when validating
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: contify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] tree-wide: fix misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: validate attribute-type maps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: reject duplicate nodecon statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: move unchanged data out of loop
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: hashtab: save one comparison on hit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] fixfiles: drop unnecessary \ line endings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: rework permission enabled check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH v2 10/10] drm: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 09/10] net: Replace strcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 08/10] tracing: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 07/10] tsacct: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 04/10] bpftool: Ensure task comm is always NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 03/10] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 02/10] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 01/10] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v2 00/10] Improve the copy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: contify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] tree-wide: fix misc typos
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [f2fs-dev] [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: patchwork-bot+f2fs@xxxxxxxxxx
- Re: [PATCH] libsepol: validate attribute-type maps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy: reject duplicate nodecon statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: move unchanged data out of loop
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2] libsepol: rework permission enabled check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: hashtab: save one comparison on hit
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce user namespace capabilities
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH] fixfiles: drop unnecessary \ line endings
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- Re: [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 3/4] capabilities: Add sysctl to mask off userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH v2 0/4] Introduce user namespace capabilities
- From: Jonathan Calmels <jcalmels@xxxxxxxx>
- [PATCH] libsepol: contify function pointer arrays
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] tree-wide: fix misc typos
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] checkpolicy: reject duplicate nodecon statements
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: rework permission enabled check
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: move unchanged data out of loop
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] libselinux: constify avc_open(3) parameter
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] libselinux: deprecate security_disable(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: hashtab: save one comparison on hit
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: validate attribute-type maps
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] fixfiles: drop unnecessary \ line endings
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- ANN: SELinux userspace 3.7-rc2 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] sandbox: do not fail without xmodmap
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 11/15] checkpolicy: fix use-after-free on invalid sens alias
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Matus Jokay <matus.jokay@xxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] sandbox: do not fail without xmodmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
- From: Quentin Monnet <qmo@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH] Always build for LFS mode on 32-bit archs.
- From: Chris Hofstaedtler <zeha@xxxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 6/6] selftests/bpf: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH 0/6] kernel: Avoid memcpy of task comm
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v3 2/2 testsuite] tests/nfs_filesystem: comment out failing mount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v3 1/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 2/2] tests/nfs_filesystem: remove failing mount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2 1/2] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: perform contiguous check in host byte order
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reject self flag in type rules in old policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- ANN: SELinux userspace 3.7-rc1 release
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH PR #134] sesearch: CIL output
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Thomas Hellström <thomas.hellstrom@xxxxxxxxxxxxxxx>
- Re: [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- [PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Intent to release 3.7
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: perform contiguous check in host byte order
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240513
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 3/4] seunshare: Add [ -P pipewiresocket ] [ -W waylandsocket ] options
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 2/4] sandbox: do not run window manager if it's not a session
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 4/4] sandbox: Add support for Wayland
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [PATCH 1/4] sandbox: do not fail without xmodmap
- From: Petr Lautrbach <lautrbach@xxxxxxxxxx>
- [GIT PULL] selinux/selinux-pr-20240513
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] libsepol: reject self flag in type rules in old policies
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] checkpolicy: support CIDR notation for nodecon statements
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] checkpolicy: perform contiguous check in host byte order
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2 testsuite] tools/nfs.sh: comment out the fscontext= tests for now
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/2 testsuite] tests/nfs_filesystem: remove failing mount
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 2/4] libsepol: only exempt gaps checking for kernel policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/4] libsepol: include prefix for module policy versions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/4] libsepol: validate type-attribute-map for old policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: reject self flag in type rules in old policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: NFS context mount failures
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- NFS context mount failures
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling status
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Serge Hallyn <serge@xxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v3] nfsd: set security label during create operations
- From: Jeffrey Layton <jlayton@xxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling status
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] nfsd: set security label during create operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] lsm: fixup the inode xattr capability handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] nfsd: set security label during create operations
- From: Jeffrey Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2] nfsd: set security label during create operations
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: selinux-testsuite nfs tests?
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: cgroup2 labeling status
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: cgroup2 labeling status
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- cgroup2 labeling status
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC][PATCH] nfsd: set security label during create operations
- From: Jeffrey Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libselinux/man: correct file extension of man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] github: bump Python and Ruby versions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: validate class permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] libsepol: improve policy lookup failure message
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC][PATCH] nfsd: set security label during create operations
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ANN: SETools 4.5.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] selinux: constify source policy in cond_policydb_dup()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid printk_ratelimit()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: pre-allocate the status page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: new release of The SELinux Notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772)
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] libselinux/man: correct file extension of man pages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 2/2] fs/xattr: add *at family syscalls
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 3/3] mcstrans: free constraint in error branch
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 2/3] libselinux: avoid pointer dereference before check
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH 1/3] libselinux: free empty scandir(3) result
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] mcstrans: free constraint in error branch
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: avoid pointer dereference before check
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/3] libselinux: free empty scandir(3) result
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 5/5] libselinux: constify selinux_set_mapping(3) parameter
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/5] libselinux/man: use void in synopses
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/5] libselinux/man: add format attribute for set_matchpathcon_printf(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/5] libselinux/man: sync const qualifiers
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/5] libselinux/man: correct file extension of man pages
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v3 2/2] fs/xattr: add *at family syscalls
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v3 2/2] fs/xattr: add *at family syscalls
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] github: bump Python and Ruby versions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 1/4] libsepol: improve policy lookup failure message
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] libsepol: validate class permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libsepol: validate class permissions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] libsepol: validate class permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/3] newrole: constant time password comparison
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] github: bump Python and Ruby versions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] newrole: constant time password comparison
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] newrole: use ROWHAMMER resistant values
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [RFC PATCH 2/3] newrole: cleanse shadow data hold by libc
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/4] checkpolicy: drop global policyvers variable
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/4] checkpolicy/tests: add test for splitting xperm rule
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/4] checkpolicy: declare file local variable static
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/4] libsepol: improve policy lookup failure message
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] libsepol: validate class permissions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: constify source policy in cond_policydb_dup()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 2/2] selinux: add support for xperms in conditional policies
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] netlink: Remove the include of files doesn't exist
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] selinux: pre-allocate the status page
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] selinux: avoid printk_ratelimit()
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] netlink: Remove the include of files doesn't exist
- From: I Hsin Cheng <richard120310@xxxxxxxxx>
- Re: [PATCH] selinux: clarify return code in filename_trans_read_helper_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: constify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] checkpolicy: include <ctype.h> for isprint(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Check common perms when verifiying "all"
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: free identifiers on invalid typebounds
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: clarify return code in filename_trans_read_helper_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [bug report] selinux: optimize storage of filename transitions
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: constify function pointer arrays
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/6] checkpolicy: include <ctype.h> for isprint(3)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [bug report] selinux: optimize storage of filename transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [bug report] selinux: optimize storage of filename transitions
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240402
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] selinux/selinux-pr-20240402
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] libsepol: constify function pointer arrays
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- [PATCH 2/6] checkpolicy/fuzz: override YY_FATAL_ERROR
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 3/6] libsepol: validate access vector permissions
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 6/6] checkpolicy: free complete role_allow_rule on error
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 5/6] checkpolicy: drop union stack_item_u
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/6] checkpolicy: include <ctype.h> for isprint(3)
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 4/6] checkpolicy: drop never read member
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid dereference of garbage after mount failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: pre-allocate the status page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid dereference of garbage after mount failure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: free identifiers on invalid typebounds
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol/cil: Check common perms when verifiying "all"
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] checkpolicy: update error diagnostic
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH 1/2] checkpolicy: free identifiers on invalid typebounds
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: Job Offer
- From: "Beckie Varnadore"<oddzial.onkologii@xxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: avoid dereference of garbage after mount failure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] selinux: pre-allocate the status page
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- [PATCH] selinux: avoid dereference of garbage after mount failure
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH v5] selinux: add prefix/suffix matching to filename type transitions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: use u32 as bit type in ebitmap code
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selinux: improve symtab string hashing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] selinux: dump statistics for more hash tables
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selinux: make more use of current_sid()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux: optimize ebitmap_and()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: update numeric format specifiers for ebitmaps
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: update numeric format specifiers for ebitmaps
- From: Christian Göttsche <cgoettsche@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: use YYerror only when available
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: avoid logs in get_ordered_context_list() without policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: fix pr_err() format specifier in ebitmap_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix pr_err() format specifier in ebitmap_read()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix pr_err() format specifier in ebitmap_read()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the selinux tree
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: improve error checking in sel_write_load()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selinux: avoid identifier using reserved name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: cleanup selinux_lsm_getattr()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: reject invalid ebitmaps
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: avoid logs in get_ordered_context_list() without policy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] checkpolicy: use YYerror only when available
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] libselinux: avoid logs in get_ordered_context_list() without policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux: avoid logs in get_ordered_context_list() without policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] checkpolicy: use YYerror only when available
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: handle unprintable token
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: SETools 4.5.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH PR#420 v4] audit2allow: CIL output mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] libselinux/utils/selabel_digest: drop unsupported option -d
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5] checkpolicy/fuzz: drop redundant notdefined check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Fix buffer overflow when using sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolgen: adjust parse for refpolicy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Where to look for system services modified for SELinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Where to look for system services modified for SELinux
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: Where to look for system services modified for SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] sepolgen: adjust parse for refpolicy
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: Where to look for system services modified for SELinux
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH PR#420 v4] audit2allow: CIL output mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Where to look for system services modified for SELinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: avoid logs in get_ordered_context_list() without policy
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH PR#420 v4] audit2allow: CIL output mode
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH PR#420 v3] audit2allow: CIL output mode
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: nfs client uses different MAC policy or model
- From: "Daniel Walker (danielwa)" <danielwa@xxxxxxxxx>
- Re: [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: Serge Hallyn <serge@xxxxxxxxxx>
- [PATCH v2 1/2] selinux: dump statistics for more hash tables
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] selinux: improve symtab string hashing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] selinux: optimize ebitmap_and()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] selinux: wire up new execstack LSM hook
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: use u32 as bit type in ebitmap code
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] selinux: make more use of current_sid()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] selinux: avoid identifier using reserved name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: reject invalid ebitmaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: avoid logs in get_ordered_context_list() without policy
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: nfs client uses different MAC policy or model
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- nfs client uses different MAC policy or model
- From: "Daniel Walker (danielwa)" <danielwa@xxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 1/5] libselinux/utils/selabel_digest: drop unsupported option -d
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
- From: Winfried <winfried_mb2@xxxxxxxxx>
- Re: [PATCH] libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
- From: Jordan Williams <jordan@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] checkpolicy/fuzz: drop redundant notdefined check
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux/src/Makefile: fix reallocarray strlcpy detection
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepoll/src/Makefile: Fix reallocarray detection when cross-compiling
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libselinux, libsepol: Add CFLAGS and LDFLAGS to Makefile checks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/5] libselinux/utils/selabel_digest: avoid buffer overflow
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] libselinux/utils/selabel_digest: pass BASEONLY only for file backend
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] libselinux/utils/selabel_digest: drop unsupported option -d
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libselinux: free data on selabel open failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] libselinux/utils/selabel_digest: cleanup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] selinux/selinux-pr-20240312
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] selinux/selinux-pr-20240312
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: Fix buffer overflow when using sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 2/9] libselinux/utils: introduce selabel_compare
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Fix buffer overflow when using sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 2/9] libselinux/utils: introduce selabel_compare
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] libselinux: sidtab updates
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] libsepol: reject MLS support in pre-MLS policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] checkpolicy/fuzz: scan Xen policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] checkpolicy/fuzz: drop redundant notdefined check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] checkpolicy: return YYerror on invalid character
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] checkpolicy: clone level only once
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Fix buffer overflow when using sepol_av_to_string()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Fix buffer overflow when using sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: improve error checking in sel_write_load()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] libselinux: sidtab updates
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 2/9] libselinux/utils: introduce selabel_compare
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy/fuzz: Update check_level() to use notdefined field
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] checkpolicy/fuzz: Update check_level() to use notdefined field
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] checkpolicy/fuzz: Update check_level() to use notdefined field
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5] selinux: add prefix/suffix matching to filename type transitions
- From: Juraj Marcin <juraj@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Sam Sun <samsun1006219@xxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: improve error checking in sel_write_load()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Sam Sun <samsun1006219@xxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 15/15] checkpolicy: misc policy_define.c cleanup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 14/15] checkpolicy: avoid assigning garbage values
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 13/15] checkpolicy: free temporary bounds type
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 12/15] checkpolicy: provide more descriptive error messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 09/15] libsepol: use typedef
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [Bug] WARNING: zero-size vmalloc in sel_write_load
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 08/15] checkpolicy: bail out on invalid role
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 07/15] checkpolicy: call YYABORT on parse errors
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 06/15] checkpolicy: clean expression on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 05/15] checkpolicy: check allocation and free memory on error at type definition
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 04/15] checkpolicy: free ebitmap on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 03/15] checkpolicy: cleanup identifiers on error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 02/15] checkpolicy: cleanup resources on parse error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 01/15] checkpolicy: add libfuzz based fuzzer
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/semanage: Do not sort local fcontext definitions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] checkpolicy, libsepol: Fix potential double free of mls_level_t
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Use a dynamic buffer in sepol_av_to_string()
- From: James Carter <jwcart2@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]