selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-16 19:52:18 to 2020-01-28 09:54:27 UTC [more...]

[PATCH userspace v2 0/4] Fix build with -fno-common
 2020-01-28  9:54 UTC  (10+ messages)
` [PATCH userspace v2 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace v2 2/4] libsepol: remove leftovers of cil_mem_error_handler
` [PATCH userspace v2 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace v2 4/4] Makefile: always build with -fno-common
  ` [Non-DoD Source] "
` [Non-DoD Source] [PATCH userspace v2 0/4] Fix "

[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-28  6:14 UTC  (11+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "

possible deadlock in sidtab_sid2str_put
 2020-01-28  4:27 UTC 

[GIT PULL] SELinux patches for v5.6
 2020-01-27 23:55 UTC  (2+ messages)

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-01-27 22:49 UTC  (40+ messages)
  ` [PATCH v14 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v14 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v14 13/23] LSM: Specify which LSM to display
  ` [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
  ` [PATCH v14 21/23] Audit: Include object data for all security modules
  ` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v14 23/23] AppArmor: Remove the exclusive flag
        ` KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)

[PATCH] selinux: remove unused initial SIDs and improve handling
 2020-01-27 20:55 UTC 

[PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-27 17:46 UTC  (4+ messages)
` [PATCH V2 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH V2 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

question about fs sid
 2020-01-27 14:08 UTC  (3+ messages)

[PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-27 13:58 UTC  (3+ messages)
  ` [PATCH v4] libsepol, checkpolicy: "

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2020-01-27  8:52 UTC  (3+ messages)
` [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process

[PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
 2020-01-27  8:32 UTC  (3+ messages)

Problems with the selinux-testsuite and GCC v10?
 2020-01-24 21:19 UTC  (3+ messages)

[PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-24 19:41 UTC  (9+ messages)
` [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH] selinux: allow kernfs symlinks to inherit parent directory context
 2020-01-24 19:18 UTC  (4+ messages)

[PATCH] selinux-testsuite: move variable definitions out of binder_common.h
 2020-01-24 19:08 UTC  (3+ messages)

Perf Data on LSM in v5.3
 2020-01-24 14:57 UTC  (8+ messages)

[PATCH] libselinux: export flush_class_cache(), call it on policyload
 2020-01-24 13:30 UTC  (2+ messages)

[PATCH] selinux: seq_file .next functions should increase position index
 2020-01-24  6:32 UTC 

[PATCH 1/1] sel_avc_get_stat_idx should increase position index
 2020-01-24  6:32 UTC 

any reason why a class mapping is not able to solve permissionx?
 2020-01-23 21:15 UTC  (6+ messages)
  ` [Non-DoD Source] "

SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree
 2020-01-23 20:35 UTC  (4+ messages)
` SELinux: How to split permissions for keys?

[PATCH] testsuite/policy: fixes for running on a labeled NFS mount
 2020-01-23 19:34 UTC 

[PATCH userspace 0/4] Fix build with -fno-common
 2020-01-23 11:59 UTC  (8+ messages)
` [PATCH userspace 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
  ` [Non-DoD Source] "
` [PATCH userspace 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace 4/4] Makefile: always build with -fno-common

[PATCH] libselinux: Eliminate use of security_compute_user()
 2020-01-23  8:44 UTC  (6+ messages)

[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-22 14:25 UTC  (19+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v5 03/10] perf/core: open access to anon probes "
` [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v5 06/10] trace/bpf_trace: "
` [PATCH v5 07/10] powerpc/perf: "
` [PATCH v5 08/10] parisc/perf: "
` [PATCH v5 09/10] drivers/perf: "
` [PATCH v5 10/10] drivers/oprofile: "

[PATCH] libselinux: update man pages for userspace policy enforcers
 2020-01-21 19:40 UTC  (3+ messages)

[PATCH] libselinux: remove flask.h and av_permissions.h
 2020-01-21 19:34 UTC  (8+ messages)

[PATCH V7 0/1] selinux-testsuite: Add filesystem tests
 2020-01-21 16:31 UTC  (4+ messages)
` [PATCH V7 1/1] "

[PATCH v2] selinux: fix regression introduced by move_mount(2) syscall
 2020-01-21 14:21 UTC  (8+ messages)

[PATCH] selinux: map RTM_GETLINK to a privileged permission
 2020-01-20  9:54 UTC  (7+ messages)

[PATCH V6 0/1] selinux-testsuite: Add filesystem tests
 2020-01-17 20:25 UTC  (4+ messages)
` [PATCH V6 1/1] "

[PATCH] selinux: move status variables out of selinux_ss
 2020-01-17 19:48 UTC  (2+ messages)

[PATCH v2 0/5] selinux: Assorted simplifications and cleanups
 2020-01-17 19:39 UTC  (9+ messages)
` [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
` [PATCH v2 2/5] selinux: convert cond_list to array
` [PATCH v2 3/5] selinux: convert cond_av_list "
` [PATCH v2 4/5] selinux: convert cond_expr "
` [PATCH v2 5/5] selinux: generalize evaluate_cond_node()

[PATCH v3] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-17 19:33 UTC 

[PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
 2020-01-17 19:11 UTC  (2+ messages)

[PATCH v3] selinux: map RTM_GETLINK to a privileged permission
 2020-01-17  9:08 UTC 

[PATCH 0/6] selinux: Assorted simplifications and cleanups
 2020-01-17  0:56 UTC  (12+ messages)
` [PATCH 1/6] selinux: do not allocate ancillary buffer on first load
` [PATCH 2/6] selinux: simplify security_preserve_bools()

[PATCH v2] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-16 20:47 UTC 

[PATCH] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-16 20:36 UTC  (3+ messages)

[RFC PATCH] selinux: remove redundant allocation and helper functions
 2020-01-16 20:15 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).