selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-21 16:32:59 to 2020-02-03 08:47:08 UTC [more...]

possible deadlock in sidtab_sid2str_put
 2020-02-03  8:46 UTC  (10+ messages)

[RFC PATCH] libsepol: Add 'key_perms' policy capability
 2020-02-02 19:36 UTC 

[RFC PATCH 0/1] selinux-testsuite: Add additional key permission tests
 2020-02-02 19:35 UTC  (2+ messages)
` [RFC PATCH 1/1] "

SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree
 2020-02-02 19:30 UTC  (5+ messages)
` SELinux: How to split permissions for keys?

[PATCH] selinux: Fix typo in filesystem name
 2020-02-02  1:46 UTC 

[PATCH 1/1] sel_avc_get_stat_idx should increase position index
 2020-02-01  7:47 UTC  (3+ messages)
  ` [PATCH v2] selinux: "

[PATCH] selinux-testsuite: Binder goto brexit fix
 2020-01-31 23:00 UTC 

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-01-31 22:10 UTC  (41+ messages)
  ` [PATCH v14 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v14 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v14 13/23] LSM: Specify which LSM to display
  ` [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
  ` [PATCH v14 21/23] Audit: Include object data for all security modules
  ` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v14 23/23] AppArmor: Remove the exclusive flag
        ` KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)

[PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets
 2020-01-31 20:24 UTC 

Perf Data on LSM in v5.3
 2020-01-31 19:50 UTC  (10+ messages)

[PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks
 2020-01-31 18:39 UTC 

[PATCH] selinux: allow kernfs symlinks to inherit parent directory context
 2020-01-31 13:30 UTC  (8+ messages)
` [PATCH v2] "

[PATCH v2 0/5] selinux: Assorted simplifications and cleanups
 2020-01-31  4:24 UTC  (11+ messages)
` [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
` [PATCH v2 2/5] selinux: convert cond_list to array
` [PATCH v2 3/5] selinux: convert cond_av_list "
` [PATCH v2 4/5] selinux: convert cond_expr "
` [PATCH v2 5/5] selinux: generalize evaluate_cond_node()

[PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
 2020-01-31  3:42 UTC  (3+ messages)

[PATCH] selinux: move status variables out of selinux_ss
 2020-01-31  3:38 UTC  (2+ messages)

[PATCH v3 1/2] testsuite: provide support for testing labeled NFS
 2020-01-30 20:22 UTC  (2+ messages)
` [PATCH v3 2/2] testsuite: add further nfs tests

[PATCH v2 1/2] testsuite: provide support for testing labeled NFS
 2020-01-30 20:16 UTC  (3+ messages)
` [PATCH v2 2/2] testsuite: add further nfs tests

[PATCH] testsuite: provide support for testing labeled NFS
 2020-01-30 19:52 UTC  (2+ messages)

[PATCH] testsuite: add further nfs tests
 2020-01-30 19:51 UTC  (2+ messages)

[PATCH 0/1] selinux-testsuite: Add watch_sb and watch_mount checks
 2020-01-30 19:07 UTC  (2+ messages)
` [PATCH 1/1] "

[PATCH] testsuite: enable running over labeled NFS
 2020-01-29 20:29 UTC 

[PATCH] testsuite/policy: fixes for running on a labeled NFS mount
 2020-01-29 19:30 UTC  (3+ messages)

[PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-29 18:21 UTC  (7+ messages)
` [PATCH V2 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH V2 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH v2] selinux: remove unused initial SIDs and improve handling
 2020-01-29 16:42 UTC 

[PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
 2020-01-29 15:15 UTC  (2+ messages)

[PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-29 12:52 UTC  (4+ messages)
  ` [PATCH v4] libsepol, checkpolicy: "

[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-28 21:18 UTC  (18+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "

[PATCH] libsepol,checkpolicy: support omitting unused initial sid contexts
 2020-01-28 20:42 UTC  (4+ messages)
` [PATCH] libsepol, checkpolicy: "

[PATCH] selinux: remove unused initial SIDs and improve handling
 2020-01-28 18:13 UTC  (2+ messages)

CIL: another segfault producer
 2020-01-28 16:25 UTC  (3+ messages)

[PATCH userspace v2 0/4] Fix build with -fno-common
 2020-01-28  9:54 UTC  (10+ messages)
` [PATCH userspace v2 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace v2 2/4] libsepol: remove leftovers of cil_mem_error_handler
` [PATCH userspace v2 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace v2 4/4] Makefile: always build with -fno-common
  ` [Non-DoD Source] "
` [Non-DoD Source] [PATCH userspace v2 0/4] Fix "

[GIT PULL] SELinux patches for v5.6
 2020-01-27 23:55 UTC  (2+ messages)

question about fs sid
 2020-01-27 14:08 UTC  (3+ messages)

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2020-01-27  8:52 UTC  (3+ messages)
` [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process

[PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
 2020-01-27  8:32 UTC  (3+ messages)

Problems with the selinux-testsuite and GCC v10?
 2020-01-24 21:19 UTC  (3+ messages)

[PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-24 19:41 UTC  (9+ messages)
` [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH] selinux-testsuite: move variable definitions out of binder_common.h
 2020-01-24 19:08 UTC  (3+ messages)

[PATCH] libselinux: export flush_class_cache(), call it on policyload
 2020-01-24 13:30 UTC  (2+ messages)

[PATCH] selinux: seq_file .next functions should increase position index
 2020-01-24  6:32 UTC 

any reason why a class mapping is not able to solve permissionx?
 2020-01-23 21:15 UTC  (5+ messages)
  ` [Non-DoD Source] "

[PATCH userspace 0/4] Fix build with -fno-common
 2020-01-23 11:59 UTC  (8+ messages)
` [PATCH userspace 1/4] libsepol: fix CIL_KEY_* build errors "
` [PATCH userspace 2/4] libsepol: remove unused cil_mem_error_handler
  ` [Non-DoD Source] "
` [PATCH userspace 3/4] checkpolicy: remove unused te_assertions
` [PATCH userspace 4/4] Makefile: always build with -fno-common

[PATCH] libselinux: Eliminate use of security_compute_user()
 2020-01-23  8:44 UTC  (6+ messages)

[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-22 14:25 UTC  (11+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process

[PATCH] libselinux: update man pages for userspace policy enforcers
 2020-01-21 19:40 UTC  (3+ messages)

[PATCH] libselinux: remove flask.h and av_permissions.h
 2020-01-21 19:34 UTC  (8+ messages)

[PATCH V7 0/1] selinux-testsuite: Add filesystem tests
 2020-01-21 16:31 UTC  (4+ messages)
` [PATCH V7 1/1] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).