messages from 2022-01-27 17:01:20 to 2022-02-20 01:16:29 UTC [more...]
[PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
2022-02-20 1:15 UTC (32+ messages)
[PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
2022-02-18 21:17 UTC (2+ messages)
[PATCH 00/16 v2] Refactor and fix assertion checking
2022-02-18 21:16 UTC (2+ messages)
[PATCH v2] libsepol: Populate and use policy name
2022-02-18 21:15 UTC (2+ messages)
[PATCH testsuite] tests/bpf: use new API if version >= 0.6
2022-02-18 21:08 UTC
[PATCH] checkpolicy: allow wildcard permissions in constraints
2022-02-18 20:05 UTC (5+ messages)
` [PATCH v2] "
[PATCH 1/3] libsepol: use correct error type to please UBSAN
2022-02-18 18:42 UTC (5+ messages)
` [PATCH 2/3] libsepol: more strict constraint validation
` [PATCH 3/3] libsepol: validate several flags
[PATCH userspace v2 0/6] Optionally rebuild policy store only if there were external changes to modules
2022-02-18 18:42 UTC (9+ messages)
` [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
` [PATCH userspace v2 2/6] semodule,libsemanage: move module hashing into libsemanage
` [PATCH userspace v2 3/6] libsemanage: move compressed file handling into a separate object
` [PATCH userspace v2 4/6] libsemanage: clean up semanage_direct_commit() a bit
` [PATCH userspace v2 5/6] libsemanage: optionally rebuild policy when modules are changed externally
` [PATCH userspace v2 6/6] semodule: add command-line option to detect module changes
[PATCH 2/5] selinux: use correct type for context length
2022-02-18 17:31 UTC (12+ messages)
` [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
` [PATCH 4/5] selinux: declare data arrays const
` [PATCH 5/5] selinux: drop unnecessary NULL check
` [PATCH 1/5] selinux: drop return statement at end of void functions
[PATCH] policycoreutils/fixfiles: Use parallel relabeling
2022-02-18 9:20 UTC (3+ messages)
` [PATCH v2] "
[PATCH] security: declare member holding string literal const
2022-02-17 22:50 UTC (3+ messages)
[RFC PATCH] mm: create security context for memfd_secret inodes
2022-02-17 22:32 UTC (4+ messages)
[RFC PATCH 2/2] capability: use new capable_or functionality
2022-02-17 17:29 UTC (3+ messages)
` [RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
[PATCH] selinux: log anon inode class name
2022-02-17 14:34 UTC
[PATCH] libselinux: Strip spaces before values in config
2022-02-17 14:16 UTC (3+ messages)
` [PATCH v2] "
[PATCH net v3 0/2] security: fixups for the security hooks in sctp
2022-02-17 13:41 UTC (13+ messages)
` [PATCH net v3 1/2] security: add sctp_assoc_established hook
` [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
[PATCH] libsemanage: allow spaces in user/group names
2022-02-17 12:49 UTC
issues about selinux namespace
2022-02-16 20:47 UTC (5+ messages)
` [RFC PATCH 0/1] SELinux-namespaces
` [RFC PATCH 1/1] selinuxns: Replace state pointer with namespace id
[PATCH] python/sepolgen: accept square brackets in FILENAME token
2022-02-14 17:08 UTC (2+ messages)
[PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
2022-02-14 14:48 UTC (6+ messages)
[PATCH testsuite v3] tests/sctp: add client peeloff tests
2022-02-14 10:19 UTC
[PATCH testsuite v2] tests/sctp: add client peeloff tests
2022-02-12 21:34 UTC
[PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
2022-02-11 19:48 UTC (3+ messages)
[PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
2022-02-11 19:48 UTC (3+ messages)
[PATCH 1/2] libsepol/cil: Don't add constraint if there are no permissions
2022-02-11 18:46 UTC (2+ messages)
` [PATCH 2/2] libsepol: Don't write out constraint if it has "
[PATCH testsuite] tests/binder: Adjust kernel uapi headers check for building
2022-02-09 19:28 UTC (2+ messages)
[PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
2022-02-09 6:58 UTC (3+ messages)
[ANNOUNCE][CFP] Linux Security Summit North America 2022
2022-02-07 22:24 UTC
[PATCH] policycoreutils: handle argument counter of zero
2022-02-07 17:29 UTC (3+ messages)
[PATCH] libsepol: do not add gaps to string list
2022-02-07 17:30 UTC (3+ messages)
Semantics vs. usage of mutex_is_locked()
2022-02-07 16:52 UTC (3+ messages)
[PATCH] selinux: parse contexts for mount options early
2022-02-04 19:30 UTC (2+ messages)
[PATCH 1/2] libsepol: add sepol_av_perm_to_string
2022-02-04 14:09 UTC (3+ messages)
` [PATCH 2/2] libsepol: add policy utilities
[GIT PULL] SELinux fixes for v5.17 (#1)
2022-02-04 1:16 UTC (2+ messages)
[PATCH v32 00/28] LSM: Module stacking for AppArmor
2022-02-02 23:53 UTC (29+ messages)
` [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v32 02/28] LSM: Infrastructure management of the sock security
` [PATCH v32 03/28] LSM: Add the lsmblob data structure
` [PATCH v32 04/28] LSM: provide lsm name and id slot mappings
` [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
` [PATCH v32 06/28] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v32 07/28] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v32 08/28] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v32 09/28] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v32 10/28] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
` [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v32 14/28] LSM: Specify which LSM to display
` [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
` [PATCH v32 16/28] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v32 17/28] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
` [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
` [PATCH v32 23/28] Audit: Create audit_stamp structure
` [PATCH v32 24/28] Audit: Add framework for auxiliary records
` [PATCH v32 25/28] Audit: Add record for multiple task security contexts
` [PATCH v32 26/28] Audit: Add record for multiple object "
` [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v32 28/28] AppArmor: Remove the exclusive flag
[PATCH v2] selinux: fix double free of cond_list on error paths
2022-02-02 16:04 UTC (2+ messages)
[PATCH 0/3] selinux: Fix and clean policydb->cond_list error paths
2022-02-02 11:15 UTC (9+ messages)
` [PATCH 1/3] selinux: consistently clear cond_list on "
` [PATCH 2/3] selinux: fix double free of "
` [PATCH 3/3] selinux: remove duplicate cond_list clean up calls
[PATCH v2] selinux: various sparse fixes
2022-02-02 0:17 UTC (6+ messages)
[PATCH v3 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
2022-02-01 21:44 UTC (4+ messages)
` [PATCH v3 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
` [PATCH v3 2/2] selinux: try to use preparsed sid before calling parse_sid()
[PATCH RFC v2 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
2022-02-01 16:19 UTC (15+ messages)
` [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
kmod and unsigned modules
2022-02-01 12:34 UTC (2+ messages)
[PATCH] libsepol: Populate and use policy name
2022-01-31 10:48 UTC (2+ messages)
[PATCH] LSM: general protection fault in legacy_parse_param
2022-01-28 8:59 UTC (6+ messages)
` [PATCH v2] "
[RFC PATCH] selinux: split no transition execve check
2022-01-28 1:47 UTC (4+ messages)
[PATCH v2] selinux: fix a type cast problem in cred_init_security()
2022-01-28 1:33 UTC (2+ messages)
[PATCH] selinux: fix a type cast problem in cred_init_security()
2022-01-27 18:17 UTC (6+ messages)
[PATCH] selinux: various sparse fixes
2022-01-27 17:48 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).