selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-24 14:35:38 to 2020-02-06 15:34:39 UTC [more...]

[RFC PATCH 0/2] userspace: Allow changing version of kernel policy built by semodule
 2020-02-06 15:35 UTC  (8+ messages)
` [RFC PATCH 1/2] libsemanage: support changing policy version via API
` [RFC PATCH 2/2] semodule: support changing policyvers via command line

[PATCH 0/2] userspace: Fix DEBUG=1 build
 2020-02-06 13:19 UTC  (3+ messages)
` [PATCH 1/2] libsemanage: preserve parent Makefile's flags in debug mode
` [PATCH 2/2] Travis-CI: test that DEBUG build works

Test to trace kernel bug in fsconfig(2) with nfs
 2020-02-06 10:12 UTC 

Test to trace kernel bug in fsconfig(2) with btrfs
 2020-02-06  9:50 UTC 

[PATCH] selinux: Fix typo in filesystem name
 2020-02-05 23:52 UTC  (4+ messages)

[PATCH] selinux: fix sidtab string cache locking
 2020-02-05 23:33 UTC  (3+ messages)

[PATCH 1/1] sel_avc_get_stat_idx should increase position index
 2020-02-05 23:21 UTC  (5+ messages)
  ` [PATCH v2] selinux: "

[PATCH] selinux-testsuite: Binder goto brexit fix
 2020-02-05 23:18 UTC  (2+ messages)

IPv6 netmask in nodecon statement
 2020-02-05 18:01 UTC  (2+ messages)

[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-02-05 17:37 UTC  (11+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "

[PATCH v3 1/2] testsuite: provide support for testing labeled NFS
 2020-02-05 17:10 UTC  (3+ messages)
` [PATCH v3 2/2] testsuite: add further nfs tests

[PATCH] testsuite: enable running over labeled NFS
 2020-02-05 17:09 UTC  (2+ messages)

[PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets
 2020-02-05 15:44 UTC  (2+ messages)

[PATCH v2] libselinux: Eliminate use of security_compute_user()
 2020-02-05 15:38 UTC  (2+ messages)

[PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts
 2020-02-04 19:07 UTC  (3+ messages)

[RFC PATCH 0/1] selinux-testsuite: Test all mount option context types
 2020-02-04 18:22 UTC  (3+ messages)
` [RFC PATCH 1/1] "

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-02-04 17:14 UTC  (28+ messages)
  ` [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
        ` KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)

[PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable
 2020-02-04 15:49 UTC  (5+ messages)

[PATCH 0/1] selinux-testsuite: Add watch_sb and watch_mount checks
 2020-02-04 13:44 UTC  (3+ messages)
` [PATCH 1/1] "

[ANNOUNCE][CFP] Linux Security Summit North America 2020
 2020-02-03 23:59 UTC 

rangetranstion in cil fails and doesn't produce explanatory output
 2020-02-03 19:44 UTC  (2+ messages)
` [Non-DoD Source] "

security/selinux: Add support for new key permissions
 2020-02-03 15:42 UTC  (3+ messages)

[RFC PATCH] libsepol: Add 'key_perms' policy capability
 2020-02-03 15:36 UTC  (2+ messages)

SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree
 2020-02-03 14:48 UTC  (8+ messages)
` SELinux: How to split permissions for keys?

[PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks
 2020-02-03 13:34 UTC  (2+ messages)

[PATCH v3 0/5] selinux: Assorted simplifications and cleanups
 2020-02-03 11:27 UTC  (6+ messages)
` [PATCH v3 1/5] selinux: simplify evaluate_cond_node()
` [PATCH v3 2/5] selinux: convert cond_list to array
` [PATCH v3 3/5] selinux: convert cond_av_list "
` [PATCH v3 4/5] selinux: convert cond_expr "
` [PATCH v3 5/5] selinux: generalize evaluate_cond_node()

[PATCH v2 0/5] selinux: Assorted simplifications and cleanups
 2020-02-03  9:13 UTC  (13+ messages)
` [PATCH v2 1/5] selinux: simplify evaluate_cond_node()
` [PATCH v2 2/5] selinux: convert cond_list to array
` [PATCH v2 3/5] selinux: convert cond_av_list "
` [PATCH v2 4/5] selinux: convert cond_expr "
` [PATCH v2 5/5] selinux: generalize evaluate_cond_node()

possible deadlock in sidtab_sid2str_put
 2020-02-03  8:46 UTC  (10+ messages)

[RFC PATCH 0/1] selinux-testsuite: Add additional key permission tests
 2020-02-02 19:35 UTC  (2+ messages)
` [RFC PATCH 1/1] "

Perf Data on LSM in v5.3
 2020-01-31 19:50 UTC  (10+ messages)

[PATCH] selinux: allow kernfs symlinks to inherit parent directory context
 2020-01-31 13:30 UTC  (8+ messages)
` [PATCH v2] "

[PATCH] Documentation,selinux: deprecate setting checkreqprot to 1
 2020-01-31  3:42 UTC  (3+ messages)

[PATCH] selinux: move status variables out of selinux_ss
 2020-01-31  3:38 UTC  (2+ messages)

[PATCH v2 1/2] testsuite: provide support for testing labeled NFS
 2020-01-30 20:16 UTC  (3+ messages)
` [PATCH v2 2/2] testsuite: add further nfs tests

[PATCH] testsuite: provide support for testing labeled NFS
 2020-01-30 19:52 UTC  (2+ messages)

[PATCH] testsuite: add further nfs tests
 2020-01-30 19:51 UTC  (2+ messages)

[PATCH] testsuite/policy: fixes for running on a labeled NFS mount
 2020-01-29 19:30 UTC  (3+ messages)

[PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-29 18:21 UTC  (7+ messages)
` [PATCH V2 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH V2 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH v2] selinux: remove unused initial SIDs and improve handling
 2020-01-29 16:42 UTC 

[PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values
 2020-01-29 12:52 UTC  (4+ messages)
  ` [PATCH v4] libsepol, checkpolicy: "

[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-28 21:18 UTC  (18+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "

[PATCH] libsepol,checkpolicy: support omitting unused initial sid contexts
 2020-01-28 20:42 UTC  (4+ messages)
` [PATCH] libsepol, checkpolicy: "

[PATCH] selinux: remove unused initial SIDs and improve handling
 2020-01-28 18:13 UTC  (2+ messages)

CIL: another segfault producer
 2020-01-28 16:25 UTC  (3+ messages)

[PATCH userspace v2 0/4] Fix build with -fno-common
 2020-01-28  9:54 UTC  (4+ messages)
` [PATCH userspace v2 4/4] Makefile: always "
` [Non-DoD Source] [PATCH userspace v2 0/4] Fix "

[GIT PULL] SELinux patches for v5.6
 2020-01-27 23:55 UTC  (2+ messages)

question about fs sid
 2020-01-27 14:08 UTC  (3+ messages)

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2020-01-27  8:52 UTC  (3+ messages)
` [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process

[PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
 2020-01-27  8:32 UTC  (3+ messages)

Problems with the selinux-testsuite and GCC v10?
 2020-01-24 21:19 UTC  (3+ messages)

[PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests
 2020-01-24 19:41 UTC  (8+ messages)
` [PATCH 1/2] selinux-testsuite: Prepare for adding fs*(2) API tests
` [PATCH 2/2] selinux-testsuite: Add fs*(2) API filesystem tests

[PATCH] selinux-testsuite: move variable definitions out of binder_common.h
 2020-01-24 19:08 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).