messages from 2020-07-07 20:55:34 to 2020-07-17 19:11:36 UTC [more...]
[PATCH 00/13] Introduce partial kernel_read_file() support
2020-07-17 19:11 UTC (19+ messages)
` [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH 04/13] fs/kernel_read_file: Split into separate include file
` [PATCH 05/13] fs/kernel_read_file: Split into separate source file
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
` [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
` [PATCH 10/13] firmware_loader: Use security_post_load_data()
` [PATCH 11/13] module: Call security_kernel_post_load_data()
` [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads
[PATCH v4 0/2] userspace: Implement new format of filename trans rules
2020-07-17 11:48 UTC (3+ messages)
` [PATCH v4 1/2] libsepol,checkpolicy: optimize storage of filename transitions
` [PATCH v4 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
Reporting a use-after-free read bug in userfaultfd_release()
2020-07-17 11:45 UTC
[SELinux-notebook PATCH] onjects.md: some clarifications
2020-07-17 6:41 UTC (9+ messages)
` [SELinux-notebook PATCH v2] objects.md: "
` [SELinux-notebook PATCH v3] "
` [SELinux-notebook PATCH v4] "
[PATCH v2 0/5] LSM: Measure security module state
2020-07-16 22:03 UTC (10+ messages)
` [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v2 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v2 4/5] LSM: Define SELinux function to measure security state
` [PATCH v2 5/5] LSM: Define workqueue for measuring security module state
[PATCH v2] libselinux: Use sestatus if open
2020-07-16 21:03 UTC
[PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
2020-07-16 20:29 UTC
[PATCH] selinux: make use of variables when defining libdir and includedir
2020-07-16 20:32 UTC
[RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
2020-07-16 20:35 UTC (5+ messages)
` [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
` [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
` [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
` [RFC PATCH 5/5] keys: Implement a 'container' keyring
[SELinux-notebook PATCH] adds CIL policy with makefile
2020-07-16 20:11 UTC (5+ messages)
` [SELinux-notebook PATCH v2] "
` [SELinux-notebook PATCH v3] "
[PATCH] libselinux: Use sestatus if open
2020-07-16 15:44 UTC (17+ messages)
[PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
2020-07-16 12:22 UTC
[PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
2020-07-16 8:51 UTC (15+ messages)
` [PATCH v5 1/6] "
` [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
` [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
` [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
` [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
ANN: The SELinux Notebook in markdown on GitHub
2020-07-16 8:01 UTC (3+ messages)
[PATCH v1 0/5] LSM: Measure security module state
2020-07-15 18:34 UTC (8+ messages)
` [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v1 2/5] IMA: Define an IMA hook "
` [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
` [PATCH v1 4/5] LSM: Define SELinux function to measure security state
` [PATCH v1 5/5] LSM: Define workqueue for measuring security module state
Fwd: RedHat 8 Default Context mismatch
2020-07-15 15:30 UTC (3+ messages)
` "
[SELinux-notebook RFC] mypolicy is a simple CIL policy with Makefile to get started with
2020-07-15 10:47 UTC (7+ messages)
` [SELinux-notebook RFC v2] "
` [SELinux-notebook RFC v3] cil-policy "
[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-07-14 15:27 UTC (10+ messages)
[PATCH] selinux-testsuite: Remove unused sctp code
2020-07-14 14:40 UTC (3+ messages)
[PATCH] Update the cil docs to match the current behaviour
2020-07-14 14:29 UTC (6+ messages)
` [PATCH v2] "
genhomedircon and passwd
2020-07-14 6:46 UTC (2+ messages)
travis: any reason we have keep going on make commands
2020-07-13 19:01 UTC (7+ messages)
[PATCH] selinux-testsuite: Review and update SCTP tests
2020-07-12 16:00 UTC
ANN: SELinux userspace release 2020-07-10 / 3.1
2020-07-10 16:20 UTC
[PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy
2020-07-10 13:42 UTC (3+ messages)
How to off RBAC in SELinux?
2020-07-10 0:09 UTC (5+ messages)
[PATCH v4 0/2] Inline some hashtab functions to improve performance
2020-07-09 23:10 UTC (5+ messages)
` [PATCH v4 1/2] selinux: prepare for inlining of hashtab functions
` [PATCH v4 2/2] selinux: complete the "
[PATCH v18 00/23] LSM: Module stacking for AppArmor
2020-07-09 19:54 UTC (29+ messages)
` [PATCH v18 01/23] LSM: Infrastructure management of the sock security
` [PATCH v18 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v18 05/23] net: Prepare UDS for security module stacking
` [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v18 13/23] LSM: Specify which LSM to display
` [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
` [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v18 19/23] LSM: Verify LSM display sanity in binder
` [PATCH v18 20/23] Audit: Add new record for multiple process LSM attributes
` [PATCH v18 21/23] Audit: Add a new record for multiple object "
` [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v18 23/23] AppArmor: Remove the exclusive flag
[SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement
2020-07-09 18:48 UTC (5+ messages)
` [PATCH] "
[SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream
2020-07-09 18:31 UTC (3+ messages)
[SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword
2020-07-09 18:21 UTC (3+ messages)
[PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
2020-07-09 18:09 UTC (2+ messages)
3.1 release notes draft
2020-07-09 16:09 UTC (5+ messages)
` [PATCH] Update VERSIONs and Python bindings version to 3.1 for release
[PATCH v3 0/3] Inline some hashtab functions to improve performance
2020-07-09 0:35 UTC (10+ messages)
` [PATCH v3 1/3] selinux: specialize symtab insert and search functions
` [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions
` [PATCH v3 3/3] selinux: complete the "
[PATCH] security/selinux: Fix spelling mistakes in the comments
2020-07-08 16:35 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).