messages from 2020-07-19 10:06:38 to 2020-07-28 13:04:45 UTC [more...]
[PATCH] selinux: add tracepoint on denials
2020-07-28 13:04 UTC (6+ messages)
[PATCH v2] selinux: add tracepoint on denials
2020-07-28 13:01 UTC
[PATCH v2] Improve network_support.md
2020-07-28 10:30 UTC (13+ messages)
[PATCH] selinux-testsuite: Review and update SCTP tests
2020-07-28 8:02 UTC (2+ messages)
[SELinux-notebook PATCH v4] objects.md: some clarifications
2020-07-28 2:17 UTC (27+ messages)
` [SELinux-notebook PATCH v6] "
` [SELinux-notebook PATCH v7] "
` [SELinux-notebook PATCH v8] "
` [SELinux-notebook PATCH v9] "
[PATCH v19 00/23] LSM: Module stacking for AppArmor
2020-07-27 21:04 UTC (31+ messages)
` [PATCH v19 01/23] LSM: Infrastructure management of the sock security
` [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v19 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v19 05/23] net: Prepare UDS for security module stacking
` [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v19 07/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v19 08/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v19 13/23] LSM: Specify which LSM to display
` [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
` [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v19 18/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
` [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
` [PATCH v19 21/23] Audit: Add a new record for multiple object "
` [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v19 23/23] AppArmor: Remove the exclusive flag
[PATCH v3 00/19] Introduce partial kernel_read_file() support
2020-07-27 19:18 UTC (37+ messages)
` [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI systems
` [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
` [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
` [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
` [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
` [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
` [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
` [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
` [PATCH v3 13/19] module: Call security_kernel_post_load_data()
` [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH v3 15/19] IMA: Add support for file reads without contents
` [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial reads
` [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
` [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
` [PATCH v3 19/19] test_firmware: Test partial read support
[RFC PATCH] Improve getcon man page
2020-07-27 13:38 UTC (2+ messages)
File context rule not working
2020-07-26 18:52 UTC (5+ messages)
[PATCH] Improve network_support.md
2020-07-26 15:16 UTC (2+ messages)
[PATCH v4] libselinux: use kernel status page by default
2020-07-24 20:25 UTC (10+ messages)
getcon family: returning success while context is NULL
2020-07-24 13:13 UTC (2+ messages)
[PATCH v3] libselinux: use kernel status page by default
2020-07-24 12:18 UTC (3+ messages)
[PATCH v18 00/23] LSM: Module stacking for AppArmor
2020-07-24 1:08 UTC (4+ messages)
` [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
[SELinux-notebook PATCH] lsm_selinux: document genfs_seclabel_symlinks policy capability
2020-07-23 1:54 UTC (5+ messages)
` [SELinux-notebook PATCH v2] "
[PATCH v5 0/2] userspace: Implement new format of filename trans rules
2020-07-22 22:15 UTC (6+ messages)
` [PATCH v5 1/2] libsepol,checkpolicy: optimize storage of filename transitions
` [PATCH v5 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS
[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-07-22 11:30 UTC (10+ messages)
[RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
2020-07-22 9:07 UTC (2+ messages)
` [RESEND] [PATCHv4 2/2] fuse: Call security hooks on new inodes
[PATCH 00/13] Introduce partial kernel_read_file() support
2020-07-21 21:50 UTC (6+ messages)
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
[SELinux-notebook PATCH v4] adds CIL policy with makefile
2020-07-21 21:08 UTC (6+ messages)
` [SELinux-notebook PATCH v5] "
[SELinux-notebook PATCH] object_classes_permissions: describe bpf and perfmon capabilities
2020-07-21 21:04 UTC (3+ messages)
[RFC] Porting glibc away from deprecated libselinux APIs
2020-07-21 14:48 UTC (5+ messages)
[PATCH] policycoreutils: fix inaccurate description in sestatus
2020-07-21 13:34 UTC (4+ messages)
[PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
2020-07-21 6:36 UTC (3+ messages)
[PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
2020-07-21 6:35 UTC (3+ messages)
[PATCH v3 0/5] LSM: Measure security module state
2020-07-20 18:59 UTC (14+ messages)
` [PATCH v3 4/5] LSM: Define SELinux function to measure security state
[PATCH v2] libselinux: Use sestatus if open
2020-07-20 13:57 UTC (3+ messages)
[PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
2020-07-20 12:58 UTC (10+ messages)
` [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
` [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
[RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
2020-07-19 18:10 UTC (2+ messages)
[PATCH] selinux: make use of variables when defining libdir and includedir
2020-07-19 17:15 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).