selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-06-28 01:03:09 to 2022-08-01 01:57:42 UTC [more...]

Adjust sepolgen grammar to support allowxperm, et. al
 2022-08-01  1:57 UTC  (3+ messages)
` [PATCH 1/2] sepolgen: Update refparser to handle xperm
` [PATCH 2/2] sepolgen: Support named xperms

KVM / virtual networking access control
 2022-07-31 16:45 UTC  (2+ messages)

[PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t
 2022-07-30 20:13 UTC  (25+ messages)
` [PATCH testsuite 01/24] keys: change test_newcon_key_t to be just an object context
` [PATCH testsuite 02/24] test_global.te: remove unused role require
` [PATCH testsuite 03/24] test_global.te: don't add domains to system_r
` [PATCH testsuite 06/24] test_policy.if: remove weird rule from testsuite_domain_type_minimal()
` [PATCH testsuite 07/24] policy: move unconfined_t-related dontaudit rule to where it fits better
` [PATCH testsuite 08/24] policy: move userdom_sysadm_entry_spec_domtrans_to() to general policy
` [PATCH testsuite 09/24] policy: move miscfiles_domain_entry_test_files() "
` [PATCH testsuite 10/24] policy: substitute userdom_sysadm_entry_spec_domtrans_to()
` [PATCH testsuite 11/24] test_general.te: move sysadm-related rules into an optional block
` [PATCH testsuite 12/24] test_filesystem.te: remove redundant dontaudit rules
` [PATCH testsuite 13/24] test_filesystem.te: remove suspicious rules
` [PATCH testsuite 14/24] tests/nnp_nosuid: avoid hardcoding unconfined_t in the policy
` [PATCH testsuite 15/24] tests/*filesystem: remove weird uses of unconfined_t
` [PATCH testsuite 16/24] policy: remove last hardcoded references to unconfined_t
` [PATCH testsuite 17/24] test_general.te: generalize the dontaudit rule
` [PATCH testsuite 18/24] policy: don't audit testsuite programs searching the caller's keys
` [PATCH testsuite 19/24] ci: check for unconfined_t AVCs
` [PATCH testsuite 20/24] tests/binder: check only the type part of the context
` [PATCH testsuite 21/24] tests/overlay: don't hard-code SELinux user of the caller
` [PATCH testsuite 22/24] policy: give sysadm_t perms needed to run quotacheck(8)
` [PATCH testsuite 23/24] tests/vsock_socket: use modprobe to check vsock availability
` [PATCH testsuite 24/24] ci: add sysadm_t to the test matrix

[PATCH] tests/sctp: remove assumptions in the SCTP tests
 2022-07-26 19:16 UTC  (11+ messages)

[PATCH v3 0/4] Introduce security_create_user_ns()
 2022-07-26 14:41 UTC  (16+ messages)
` [PATCH v3 1/4] security, lsm: "
` [PATCH v3 2/4] bpf-lsm: Make bpf_lsm_userns_create() sleepable
` [PATCH v3 3/4] selftests/bpf: Add tests verifying bpf lsm userns_create hook
` [PATCH v3 4/4] selinux: Implement "

[PATCH v2 1/5] libsepol: rename validate_policydb to policydb_validate
 2022-07-21 15:24 UTC  (5+ messages)
` [PATCH v2 2/5] libsepol: support const avtab_t pointer in avtab_map()
` [PATCH v2 3/5] libsepol: operate on const pointers during validation
` [PATCH v2 4/5] libsepol: rename parameter name
` [PATCH v2 5/5] libsepol: more strict validation

[PATCH v3 1/8] libsepol: refactor ebitmap conversion in link.c
 2022-07-21 15:05 UTC  (8+ messages)
` [PATCH v3 2/8] libsepol: add ebitmap iterator wrapper with startnode
` [PATCH v3 3/8] libsepol: add compile-time constraint for mutual exclusive attributes
` [PATCH v3 4/8] checkpolicy: add front-end support for segregate attributes
` [PATCH v3 5/8] libsepol/tests: add test "
` [PATCH v3 6/8] libsepol/cil: add support "
` [PATCH v3 7/8] secilc: run tests against development version of libsepol
` [PATCH v3 8/8] secilc: include segregate attributes in tests

[PATCH v2 0/4] Introduce security_create_user_ns()
 2022-07-20 22:39 UTC  (17+ messages)
` [PATCH v2 1/4] security, lsm: "
` [PATCH v2 2/4] bpf-lsm: Make bpf_lsm_create_user_ns() sleepable
` [PATCH v2 3/4] selftests/bpf: Add tests verifying bpf lsm create_user_ns hook
` [PATCH v2 4/4] selinux: Implement "

[PATCH 1/5] libsepol: rename validate_policydb to policydb_validate
 2022-07-20 22:29 UTC  (7+ messages)
` [PATCH 2/5] libsepol: support const avtab_t pointer in avtab_map()
` [PATCH 3/5] libsepol: operator on const pointers during validation
` [PATCH 4/5] libsepol: rename parameter name
` [PATCH 5/5] libsepol: more strict validation

[PATCH v2 1/7] libsepol/tests: add ebitmap tests
 2022-07-20 19:51 UTC  (8+ messages)
` [PATCH v2 2/7] libsepol: add ebitmap_init_range
` [PATCH v2 3/7] libsepol/cil: use ebitmap_init_range
` [PATCH v2 4/7] libsepol: optimize ebitmap_not
` [PATCH v2 5/7] libsepol: optimize ebitmap_and
` [PATCH v2 6/7] libsepol: optimize ebitmap_xor
` [PATCH v2 7/7] libsepol: skip superfluous memset calls in ebitmap operations

[PATCH 1/3] libsepol: break circular include
 2022-07-19 16:29 UTC  (4+ messages)
` [PATCH 2/3] libsepol: include necessary headers in headers
` [PATCH 3/3] libsepol: enclose macro parameters and replacement lists in parentheses

[PATCH] python: remove IOError in certain cases
 2022-07-19  9:10 UTC  (3+ messages)

[PATCH 1/7] libsepol/tests: add ebitmap tests
 2022-07-18 20:48 UTC  (14+ messages)
` [PATCH 2/7] libsepol: add ebitmap_init_range
` [PATCH 3/7] libsepol/cil: use ebitmap_init_range
` [PATCH 4/7] libsepol: optimize ebitmap_not
` [PATCH 5/7] libsepol: optimize ebitmap_and
` [PATCH 6/7] libsepol: optimize ebitmap_xor
` [PATCH 7/7] libsepol: skip superfluous memset calls in ebitmap operations

[PATCH testsuite] tests/module_load: detect the linker to use for module build
 2022-07-18 10:51 UTC 

[PATCH v37 00/33] LSM: Module stacking for AppArmor
 2022-07-12 21:58 UTC  (33+ messages)
  ` [PATCH v37 07/33] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v37 08/33] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v37 09/33] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v37 10/33] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v37 14/33] LSM: Specify which LSM to display
  ` [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser
  ` [PATCH v37 16/33] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v37 17/33] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v37 18/33] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v37 19/33] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v37 20/33] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v37 21/33] binder: Pass LSM identifier for confirmation
  ` [PATCH v37 22/33] LSM: security_secid_to_secctx module selection
  ` [PATCH v37 23/33] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v37 24/33] Audit: Create audit_stamp structure
  ` [PATCH v37 25/33] LSM: Add a function to report multiple LSMs
  ` [PATCH v37 26/33] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v37 27/33] Audit: Add record for multiple task security contexts
  ` [PATCH v37 28/33] audit: multiple subject lsm values for netlabel
  ` [PATCH v37 29/33] Audit: Add record for multiple object contexts
  ` [PATCH v37 30/33] netlabel: Use a struct lsmblob in audit data
  ` [PATCH v37 31/33] LSM: Removed scaffolding function lsmcontext_init
  ` [PATCH v37 32/33] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v37 33/33] AppArmor: Remove the exclusive flag

[RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY
 2022-07-12 21:16 UTC  (3+ messages)

Bug in SELinux SCTP ASCONF handling
 2022-07-12 21:14 UTC  (9+ messages)

[PATCH] libselinux: set errno to EBADF on O_PATH emulation failure
 2022-07-07 17:44 UTC  (3+ messages)
` [PATCH v2] libselinux: set errno to EBADF on O_PATH emulation ENOENT failure

[PATCH] libsepol: do not modify policy during write
 2022-07-06 20:12 UTC  (3+ messages)

[PATCH] libsepol/utils: improve wording
 2022-07-06 20:12 UTC  (3+ messages)

[PATCH userspace 1/1] CircleCI: do not add Debian-specific parameter when invoking setup.py
 2022-07-06 20:11 UTC  (3+ messages)

[PATCH userspace 1/1] libsepol: initialize s in constraint_expr_eval_reason
 2022-07-06 20:11 UTC  (4+ messages)

[PATCH] libsepol: avoid potential NULL dereference on optional parameter
 2022-07-06 20:11 UTC  (3+ messages)

What is "fscon" statement in a base policy?
 2022-07-01 20:43 UTC  (4+ messages)

[PATCH v2 1/4] support Dash as default shell
 2022-07-01  8:59 UTC  (3+ messages)
` [PATCH v3 "

[PATCH testsuite 0/2] Make the keys test pass in FIPS mode
 2022-07-01  7:30 UTC  (4+ messages)
` [PATCH testsuite 1/2] tests/keys: use a longer prime in DH params
` [PATCH testsuite 2/2] tests/keys: fix Makefile dependencies

[PATCH 2/2] libselinux: restorecon: avoid printing NULL pointer
 2022-06-30 19:35 UTC  (5+ messages)
` [PATCH v2] "

[PATCH userspace 0/2] Refine semantics of libsemanage's check_ext_changes
 2022-06-30 19:34 UTC  (5+ messages)
` [PATCH userspace 1/2] libsemanage: always write kernel policy when check_ext_changes is specified

[syzbot] KASAN: use-after-free Read in selinux_socket_recvmsg
 2022-06-29 17:21 UTC  (2+ messages)

[PATCH] gettext: handle unsupported languages properly
 2022-06-29 13:52 UTC  (6+ messages)

[RFC PATCH 1/4] libsepol: refactor ebitmap conversion in link.c
 2022-06-28 22:01 UTC  (5+ messages)
` [RFC PATCH 2/4] libsepol: add ebitmap iterator wrapper with startnode
` [RFC PATCH 3/4] libsepol: add compile-time constraint for mutual exclusive attributes

[PATCH v2 1/8] capability: add capable_or to test for multiple caps with exactly one audit message
 2022-06-28 14:11 UTC  (5+ messages)
` [PATCH v3 2/8] capability: use new capable_any functionality
  ` [PATCH v3 5/8] fs: "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).