messages from 2019-11-13 17:58:22 to 2019-11-27 15:21:51 UTC [more...]
[PATCH] selinux-testsuite: update the dependencies in README.md
2019-11-27 15:21 UTC (2+ messages)
[PATCH testsuite] travis: improve selinuxfs mocking
2019-11-27 15:21 UTC (2+ messages)
[PATCH testsuite v5] policy: use the kernel_request_load_module() interface
2019-11-27 15:16 UTC (3+ messages)
[RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition
2019-11-27 15:03 UTC (10+ messages)
` [RFC 1/3] libsemanage: fall back to valid "object_r" role instead of "user" prefix string
` [RFC 2/3] semanage: do not default prefix to "user"
` [RFC 3/3] cil: qualify roles from symtable when resolving userprefix
[RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests
2019-11-27 14:59 UTC (2+ messages)
[PATCH V5] selinux-testsuite: Add kernel module tests
2019-11-27 12:21 UTC (3+ messages)
[GIT PULL] SELinux patches for v5.5
2019-11-26 21:24 UTC
[PATCH v5] selinux: cache the SID -> context string translation
2019-11-26 16:36 UTC (4+ messages)
[PATCH testsuite v3] policy: use the kernel_request_load_module() interface
2019-11-26 16:22 UTC (8+ messages)
[PATCH testsuite v4] policy: use the kernel_request_load_module() interface
2019-11-26 16:01 UTC (2+ messages)
general protection fault in selinux_socket_sendmsg (2)
2019-11-25 22:03 UTC (2+ messages)
[PATCH testsuite] policy: check for module_request support for key_socket
2019-11-25 15:33 UTC (3+ messages)
[PATCH testsuite v2] policy: check for module_request support for key_socket
2019-11-25 15:28 UTC
[PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests
2019-11-22 21:16 UTC
[PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
2019-11-22 17:22 UTC (2+ messages)
` [PATCH 2/2] selinux: fall back to ref-walk if audit is required
[RFC PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
2019-11-22 17:04 UTC (11+ messages)
` [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
[PATCH V4] selinux-testsuite: Add kernel module tests
2019-11-22 16:18 UTC (6+ messages)
ANN: SELinux userspace 3.0-rc2 release candidate
2019-11-22 14:54 UTC
[PATCH v9] selinux: sidtab: reverse lookup hash table
2019-11-22 14:21 UTC (2+ messages)
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 20:36 UTC (13+ messages)
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v11 22/25] Audit: Include object data for all security modules
` [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
` [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v11 25/25] AppArmor: Remove the exclusive flag
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 19:00 UTC (32+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
[PATCH] Fix: check variable type of port before trying to split
2019-11-21 18:20 UTC (2+ messages)
[PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot
2019-11-21 17:08 UTC (6+ messages)
` [Non-DoD Source] "
[PATCH] Travis-CI: Drop Python 2 from matrix
2019-11-21 17:07 UTC (3+ messages)
[PATCH testsuite v4 0/3] Fix refpolicy build & build test_policy.pp in Travis
2019-11-21 17:02 UTC (6+ messages)
` [PATCH testsuite v4 1/3] policy: drop the unneeded userdom_search_generic_user_home_dirs()
` [PATCH testsuite v4 2/3] policy: add fallbacks for Fedora-specific macros
` [PATCH testsuite v4 3/3] travis: test building the test policy package
[PATCH v8] selinux: sidtab: reverse lookup hash table
2019-11-21 13:17 UTC (2+ messages)
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 5:50 UTC (16+ messages)
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
[RFC PATCH 0/2] Avoid blocking in selinux inode callbacks on RCU walk
2019-11-20 19:13 UTC (11+ messages)
` [RFC PATCH 1/2] selinux: Don't call avc_compute_av() from RCU path walk
` [RFC PATCH 2/2] selinux: Propagate RCU walk status from 'security_inode_follow_link()'
RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712
2019-11-20 18:06 UTC (2+ messages)
[PATCH v7] selinux: sidtab: reverse lookup hash table
2019-11-18 21:46 UTC (6+ messages)
[PATCH V3] selinux-testsuite: Add kernel module tests
2019-11-18 18:15 UTC (2+ messages)
[PATCH V2] selinux-testsuite: Add kernel module tests
2019-11-18 16:15 UTC (4+ messages)
[PATCH V3] selinux-testsuite: Add key_socket tests
2019-11-18 14:55 UTC (2+ messages)
[PATCH testsuite v3 0/3] Fix refpolicy build & build test_policy.pp in Travis
2019-11-18 14:29 UTC (6+ messages)
` [PATCH testsuite v3 1/3] policy: drop the unneeded userdom_search_generic_user_home_dirs()
` [PATCH testsuite v3 2/3] policy: add fallbacks for Fedora-specific macros
` [PATCH testsuite v3 3/3] travis: test building the test policy package
[PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis
2019-11-15 15:59 UTC (7+ messages)
` [PATCH testsuite v2 1/3] policy: consolidate macros for home dirs access
` [PATCH testsuite v2 2/3] policy: add fallbacks for Fedora-specific macros
` [PATCH testsuite v2 3/3] travis: test building the test policy package
[PATCH v4] selinux: cache the SID -> context string translation
2019-11-15 15:36 UTC (4+ messages)
[PATCH] restorecond: Fix redundant console log output error
2019-11-15 13:12 UTC (3+ messages)
[PATCH] selinux: sidtab: reverse lookup hash table
2019-11-15 0:04 UTC (2+ messages)
[PATCH v5] selinux: sidtab: reverse lookup hash table
2019-11-14 23:35 UTC (3+ messages)
[PATCH V2] selinux-testsuite: Add key_socket tests
2019-11-14 17:56 UTC (3+ messages)
[PATCH] selinux-testsuite: Add kernel module tests
2019-11-14 15:31 UTC (2+ messages)
[PATCH testsuite] tests/sctp: initialize addrlen for accept(2) properly
2019-11-14 13:39 UTC (2+ messages)
[PATCH 00/23] y2038 cleanups
2019-11-14 10:51 UTC (10+ messages)
` [PATCH 20/23] y2038: move itimer reset into itimer.c
[PATCH] restorecond: Fix redundant console log output error
2019-11-14 3:03 UTC (6+ messages)
` 答复: "
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).