selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-12 19:24:41 to 2020-01-24 00:25:41 UTC [more...]

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-01-24  0:22 UTC  (16+ messages)
  ` [PATCH v14 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v14 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v14 13/23] LSM: Specify which LSM to display
  ` [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx

[PATCH] selinux-testsuite: move variable definitions out of binder_common.h
 2020-01-23 22:39 UTC 

Problems with the selinux-testsuite and GCC v10?
 2020-01-23 22:10 UTC  (2+ messages)

any reason why a class mapping is not able to solve permissionx?
 2020-01-23 21:15 UTC  (6+ messages)
  ` [Non-DoD Source] "

[PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
 2020-01-23 20:40 UTC 

SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree
 2020-01-23 20:35 UTC  (4+ messages)
` SELinux: How to split permissions for keys?

[PATCH] testsuite/policy: fixes for running on a labeled NFS mount
 2020-01-23 19:34 UTC 

[PATCH userspace v2 0/4] Fix build with -fno-common
 2020-01-23 18:26 UTC  (6+ messages)
` [PATCH userspace v2 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace v2 2/4] libsepol: remove leftovers of cil_mem_error_handler
` [PATCH userspace v2 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace v2 4/4] Makefile: always build with -fno-common
  ` [Non-DoD Source] "

[PATCH userspace 0/4] Fix build with -fno-common
 2020-01-23 11:59 UTC  (8+ messages)
` [PATCH userspace 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
  ` [Non-DoD Source] "
` [PATCH userspace 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace 4/4] Makefile: always build with -fno-common

[PATCH] libselinux: Eliminate use of security_compute_user()
 2020-01-23  8:44 UTC  (6+ messages)

[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-22 14:25 UTC  (19+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v5 03/10] perf/core: open access to anon probes "
` [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v5 06/10] trace/bpf_trace: "
` [PATCH v5 07/10] powerpc/perf: "
` [PATCH v5 08/10] parisc/perf: "
` [PATCH v5 09/10] drivers/perf: "
` [PATCH v5 10/10] drivers/oprofile: "

[PATCH] libselinux: update man pages for userspace policy enforcers
 2020-01-21 19:40 UTC  (3+ messages)

[PATCH] libselinux: remove flask.h and av_permissions.h
 2020-01-21 19:34 UTC  (8+ messages)

[PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-21 18:56 UTC  (4+ messages)
` [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-21 18:40 UTC 

[PATCH V7 0/1] selinux-testsuite: Add filesystem tests
 2020-01-21 16:31 UTC  (4+ messages)
` [PATCH V7 1/1] "

[PATCH] libselinux: export flush_class_cache(), call it on policyload
 2020-01-21 16:25 UTC 

[PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
 2020-01-21 14:21 UTC  (8+ messages)

[PATCH] selinux: map RTM_GETLINK to a privileged permission
 2020-01-20  9:54 UTC  (8+ messages)

[PATCH V6 0/1] selinux-testsuite: Add filesystem tests
 2020-01-17 20:25 UTC  (4+ messages)
` [PATCH V6 1/1] "

[PATCH] selinux: move status variables out of selinux_ss
 2020-01-17 19:48 UTC  (2+ messages)

[PATCH v2 0/5] selinux: Assorted simplifications and cleanups
 2020-01-17 19:39 UTC  (9+ messages)
` [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
` [PATCH v2 2/5] selinux: convert cond_list to array
` [PATCH v2 3/5] selinux: convert cond_av_list "
` [PATCH v2 4/5] selinux: convert cond_expr "
` [PATCH v2 5/5] selinux: generalize evaluate_cond_node()

[PATCH v3] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-17 19:33 UTC 

[PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
 2020-01-17 19:11 UTC  (2+ messages)

[PATCH v3] selinux: map RTM_GETLINK to a privileged permission
 2020-01-17  9:08 UTC 

[PATCH 0/6] selinux: Assorted simplifications and cleanups
 2020-01-17  0:56 UTC  (21+ messages)
` [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
` [PATCH 2/6] selinux: simplify security_preserve_bools()
` [PATCH 3/6] selinux: convert cond_list to array
` [PATCH 4/6] selinux: convert cond_av_list "
` [PATCH 5/6] selinux: convert cond_expr "
` [PATCH 6/6] selinux: generalize evaluate_cond_node()

[PATCH v2] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-16 20:47 UTC 

[PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-16 20:36 UTC  (3+ messages)

[RFC PATCH] selinux: remove redundant allocation and helper functions
 2020-01-16 20:15 UTC  (3+ messages)

[PATCH v2] selinux: map RTM_GETLINK to a privileged permission
 2020-01-16 19:45 UTC 

[PATCH v2] selinux: remove redundant selinux_nlmsg_perm
 2020-01-16 19:37 UTC  (2+ messages)

[PATCH v2] selinux: fix wrong buffer types in policydb.c
 2020-01-16 19:33 UTC  (2+ messages)

[PATCH] selinux: fix sparse warnings in policydb.c
 2020-01-16 16:21 UTC  (4+ messages)

[PATCH V5 0/1] selinux-testsuite: Add filesystem tests
 2020-01-16 13:03 UTC  (5+ messages)
` [PATCH V5 1/1] "

Perf Data on LSM in v5.3
 2020-01-16  0:00 UTC  (11+ messages)

[RFC PATCH] selinux: implement move_mount hook
 2020-01-14 23:05 UTC  (3+ messages)

[PATCH V4 0/1] selinux-testsuite: Add filesystem tests
 2020-01-14 14:00 UTC  (6+ messages)
` [PATCH V4 1/1] "

[PATCH V3 0/1] selinux-testsuite: Add filesystem tests
 2020-01-14 12:08 UTC  (8+ messages)
` [PATCH V3 1/1] "

[PATCH V2 0/1] selinux-testsuite: Add filesystem tests
 2020-01-13 18:54 UTC  (10+ messages)
` [PATCH V2 1/1] "

[PATCH] selinux: remove redundant selinux_nlmsg_perm
 2020-01-13 15:00 UTC  (3+ messages)
  ` [External] "

[PATCH testsuite] tests/prlimit: avoid invalid limit combinations
 2020-01-13 14:21 UTC  (3+ messages)

[PATCH v2] selinux: reorder hooks to make runtime disable less broken
 2020-01-13 10:00 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).