messages from 2021-03-01 20:57:17 to 2021-03-17 22:57:31 UTC [more...]
[RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
2021-03-17 22:56 UTC (30+ messages)
` [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
` [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
` [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
[PATCH] libsepol/cil: Destroy classperm list when resetting map perms
2021-03-17 20:58 UTC
[PATCH] selinux: vsock: Set SID for socket returned by accept()
2021-03-17 20:16 UTC (2+ messages)
[PATCH] libsepol/cil: Destroy classperms list when resetting classpermission
2021-03-17 19:00 UTC
[PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\"
2021-03-17 14:35 UTC (17+ messages)
` [PATCH 2/6] libsepol/cil: make cil_post_fc_fill_data static
` [PATCH 3/6] libsepol/cil: remove stray printf
` [PATCH 4/6] libsepol/cil: replace printf with proper cil_tree_log
` [PATCH 5/6] libsepol/cil: fix NULL pointer dereference in __cil_insert_name
` [PATCH 6/6] libsepol/cil: do not leak avrulex_ioctl_table memory when an error occurs
[PATCH 1/1] libsepol: make num_* unsigned int in module_to_cil
2021-03-17 14:10 UTC (2+ messages)
[PATCH 1/4] libsepol/cil: Allow lists in constraint expressions
2021-03-17 14:04 UTC (7+ messages)
` [PATCH 2/4] secilc/docs: Lists are now allowed "
` [PATCH 3/4] libsepol: Enclose identifier lists in CIL "
` [PATCH 4/4] libsepol: Write "NO_IDENTIFIER" for empty CIL constraint expression
[PATCH 1/2] libsepol: Write "NO_IDENTIFIER" for empty constraint expression
2021-03-17 9:29 UTC (3+ messages)
` [PATCH 2/2] libsepol: Enclose identifier lists in constraint expressions
libsepol/cil: use after free with optional classpermissionset
2021-03-17 8:52 UTC
[PATCH 1/2 v2] checkpolicy: Do not automatically upgrade when using "-b" flag
2021-03-17 8:37 UTC (4+ messages)
` [PATCH 2/2 v2] libsepol: Check kernel to CIL and Conf functions for supported versions
[PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate
2021-03-16 20:50 UTC (2+ messages)
[PATCH] libsepol/cil: Check for duplicate blocks, optionals, and macros
2021-03-16 20:48 UTC (2+ messages)
[PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs
2021-03-16 18:59 UTC (3+ messages)
[PATCH] perf/core: fix unconditional security_locked_down() call
2021-03-16 15:12 UTC (4+ messages)
libsepol/cil: type confusion between macro and optional leads to heap-buffer-overflow in cil_copy_macro
2021-03-16 13:39 UTC (2+ messages)
[PATCH] IMA: Add test for selinux measurement
2021-03-16 11:54 UTC (2+ messages)
[PATCH] libsepol/checkpolicy: Set user roles using role value instead of dominance
2021-03-15 21:08 UTC (3+ messages)
[PATCH] libsepol: Remove unnecessary copying of declarations from link.c
2021-03-15 21:08 UTC (3+ messages)
[PATCH] libsepol: Properly handle types associated to role attributes
2021-03-15 21:07 UTC (3+ messages)
[PATCH] libsepol: Expand role attributes in constraint expressions
2021-03-15 21:06 UTC (4+ messages)
[PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount
2021-03-15 16:15 UTC (11+ messages)
` [PATCH v4 "
[PATCH 1/2] checkpolicy: Do not automatically upgrade when using "-b" flag
2021-03-15 15:01 UTC (5+ messages)
` [PATCH 2/2] libsepol: Check kernel to CIL and Conf functions for supported versions
[PATCH v6 00/40] idmapped mounts
2021-03-13 0:05 UTC (6+ messages)
` [PATCH v6 02/40] fs: add id translation helpers
` [PATCH v6 39/40] xfs: support idmapped mounts
[PATCH v25 00/25] LSM: Module stacking for AppArmor
2021-03-12 16:16 UTC (32+ messages)
` [PATCH v25 01/25] LSM: Infrastructure management of the sock security
` [PATCH v25 02/25] LSM: Add the lsmblob data structure
` [PATCH v25 03/25] LSM: provide lsm name and id slot mappings
` [PATCH v25 04/25] IMA: avoid label collisions with stacked LSMs
` [PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v25 06/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v25 07/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v25 08/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v25 09/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid
` [RFC PATCH] LSM: audit_sig_lsm can be static
` [PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v25 14/25] LSM: Specify which LSM to display
` [PATCH v25 15/25] LSM: Ensure the correct LSM context releaser
` [PATCH v25 16/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v25 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v25 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v25 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v25 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v25 21/25] audit: add support for non-syscall auxiliary records
` [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes
` [PATCH v25 23/25] Audit: Add a new record for multiple object "
` [PATCH v25 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v25 25/25] AppArmor: Remove the exclusive flag
[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
2021-03-12 15:42 UTC (3+ messages)
Role attributes in traditional language constraints
2021-03-10 18:08 UTC (2+ messages)
[PATCH] object_classes_permissions.md: Add anon_inode class
2021-03-09 16:46 UTC
[PATCH] security/selinux/include/: fix misspellings using codespell tool
2021-03-09 0:47 UTC (2+ messages)
[PATCH] security/selinux/ss: fix misspellings using codespell tool
2021-03-09 0:45 UTC (2+ messages)
[PATCH v3] selinux: measure state and policy capabilities
2021-03-09 0:43 UTC (10+ messages)
ANN: SPAN docker images
2021-03-07 4:55 UTC
Quick announcement on the selinux/next and audit/next branches
2021-03-06 15:20 UTC (4+ messages)
[PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-03-05 19:41 UTC (12+ messages)
ANN: SETools 4.4.0
2021-03-05 19:33 UTC
[PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
2021-03-05 2:21 UTC (2+ messages)
[PATCH][v2] selinux: Allow context mounts for unpriviliged overlayfs
2021-03-05 2:09 UTC (3+ messages)
[PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts
2021-03-04 23:30 UTC (6+ messages)
[PATCH testsuite 0/3] perf_event: fixes and cleanups
2021-03-04 20:24 UTC (6+ messages)
` [PATCH testsuite 1/3] perf_event: measure CPU 0 rather than CPU 1
` [PATCH testsuite 2/3] perf_event: fix wrong use of perf_event_open(2) API
` [PATCH testsuite 3/3] perf_event: fix CAP_SYS_ADMIN references
[PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode
2021-03-04 18:02 UTC (5+ messages)
ANN: SELinux userspace release 3.2
2021-03-04 16:36 UTC
[PATCH testsuite] lockdown: use debugfs/tracefs to test lockdown permissions
2021-03-04 10:27 UTC (2+ messages)
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-03-03 19:00 UTC (14+ messages)
[PATCH 1/1] restorecond: invalidate local_lock_fd properly when closing it
2021-03-03 15:08 UTC (2+ messages)
[PATCH v2 0/2] selinux: policy load fixes
2021-03-03 9:01 UTC (10+ messages)
` [PATCH v2 1/2] selinux: don't log MAC_POLICY_LOAD record on failed policy load
` [PATCH v2 2/2] selinux: fix variable scope issue in live sidtab conversion
[PATCH] libsepol: invalidate the pointer to the policydb if policydb_init fails
2021-03-03 7:45 UTC (3+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).