selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-07-09 00:21:12 to 2020-07-18 05:44:44 UTC [more...]

[PATCH 00/13] Introduce partial kernel_read_file() support
 2020-07-18  5:44 UTC  (24+ messages)
` [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH 04/13] fs/kernel_read_file: Split into separate include file
` [PATCH 05/13] fs/kernel_read_file: Split into separate source file
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
` [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
` [PATCH 10/13] firmware_loader: Use security_post_load_data()
` [PATCH 11/13] module: Call security_kernel_post_load_data()
` [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads

[PATCH v3 0/5] LSM: Measure security module state
 2020-07-18  3:38 UTC  (8+ messages)
` [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v3 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v3 4/5] LSM: Define SELinux function to measure security state
` [PATCH v3 5/5] LSM: Define workqueue for measuring security module state

[PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 2020-07-18  3:24 UTC  (16+ messages)
` [PATCH v5 1/6] "
` [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
` [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
` [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
` [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test

[PATCH v4 0/2] userspace: Implement new format of filename trans rules
 2020-07-17 11:48 UTC  (3+ messages)
` [PATCH v4 1/2] libsepol,checkpolicy: optimize storage of filename transitions
` [PATCH v4 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS

Reporting a use-after-free read bug in userfaultfd_release()
 2020-07-17 11:45 UTC 

[SELinux-notebook PATCH] onjects.md: some clarifications
 2020-07-17  6:41 UTC  (9+ messages)
` [SELinux-notebook PATCH v2] objects.md: "
    ` [SELinux-notebook PATCH v3] "
      ` [SELinux-notebook PATCH v4] "

[PATCH v2 0/5] LSM: Measure security module state
 2020-07-16 22:03 UTC  (10+ messages)
` [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v2 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v2 4/5] LSM: Define SELinux function to measure security state
` [PATCH v2 5/5] LSM: Define workqueue for measuring security module state

[PATCH v2] libselinux: Use sestatus if open
 2020-07-16 21:03 UTC 

[PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
 2020-07-16 20:29 UTC 

[PATCH] selinux: make use of variables when defining libdir and includedir
 2020-07-16 20:32 UTC 

[RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
 2020-07-16 20:35 UTC  (5+ messages)
` [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
` [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
` [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
` [RFC PATCH 5/5] keys: Implement a 'container' keyring

[SELinux-notebook PATCH] adds CIL policy with makefile
 2020-07-16 20:11 UTC  (5+ messages)
  ` [SELinux-notebook PATCH v2] "
  ` [SELinux-notebook PATCH v3] "

[PATCH] libselinux: Use sestatus if open
 2020-07-16 15:44 UTC  (17+ messages)

[PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
 2020-07-16 12:22 UTC 

ANN: The SELinux Notebook in markdown on GitHub
 2020-07-16  8:01 UTC  (2+ messages)

[PATCH v1 0/5] LSM: Measure security module state
 2020-07-15 18:34 UTC  (8+ messages)
` [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v1 2/5] IMA: Define an IMA hook "
` [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
` [PATCH v1 4/5] LSM: Define SELinux function to measure security state
` [PATCH v1 5/5] LSM: Define workqueue for measuring security module state

Fwd: RedHat 8 Default Context mismatch
 2020-07-15 15:30 UTC  (3+ messages)
  `  "

[SELinux-notebook RFC] mypolicy is a simple CIL policy with Makefile to get started with
 2020-07-15 10:47 UTC  (7+ messages)
` [SELinux-notebook RFC v2] "
    ` [SELinux-notebook RFC v3] cil-policy "

[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-07-14 15:27 UTC  (10+ messages)

[PATCH] selinux-testsuite: Remove unused sctp code
 2020-07-14 14:40 UTC  (3+ messages)

[PATCH] Update the cil docs to match the current behaviour
 2020-07-14 14:29 UTC  (6+ messages)
` [PATCH v2] "

genhomedircon and passwd
 2020-07-14  6:46 UTC  (2+ messages)

travis: any reason we have keep going on make commands
 2020-07-13 19:01 UTC  (7+ messages)

[PATCH] selinux-testsuite: Review and update SCTP tests
 2020-07-12 16:00 UTC 

ANN: SELinux userspace release 2020-07-10 / 3.1
 2020-07-10 16:20 UTC 

[PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy
 2020-07-10 13:42 UTC  (3+ messages)

How to off RBAC in SELinux?
 2020-07-10  0:09 UTC  (5+ messages)

[PATCH v4 0/2] Inline some hashtab functions to improve performance
 2020-07-09 23:10 UTC  (5+ messages)
` [PATCH v4 1/2] selinux: prepare for inlining of hashtab functions
` [PATCH v4 2/2] selinux: complete the "

[PATCH v18 00/23] LSM: Module stacking for AppArmor
 2020-07-09 19:54 UTC  (27+ messages)
` [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v18 05/23] net: Prepare UDS for security module stacking
` [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v18 13/23] LSM: Specify which LSM to display
` [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
` [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v18 19/23] LSM: Verify LSM display sanity in binder
` [PATCH v18 20/23] Audit: Add new record for multiple process LSM attributes
` [PATCH v18 21/23] Audit: Add a new record for multiple object "
` [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v18 23/23] AppArmor: Remove the exclusive flag

[SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement
 2020-07-09 18:48 UTC  (5+ messages)
  ` [PATCH] "

[SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream
 2020-07-09 18:31 UTC  (3+ messages)

[SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword
 2020-07-09 18:21 UTC  (3+ messages)

[PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning
 2020-07-09 18:09 UTC  (2+ messages)

3.1 release notes draft
 2020-07-09 16:09 UTC  (5+ messages)
` [PATCH] Update VERSIONs and Python bindings version to 3.1 for release

[PATCH v3 0/3] Inline some hashtab functions to improve performance
 2020-07-09  0:35 UTC  (7+ messages)
` [PATCH v3 1/3] selinux: specialize symtab insert and search functions
` [PATCH v3 2/3] selinux: prepare for inlining of hashtab functions


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).