selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-02-28 22:20:27 to 2019-03-25 14:08:15 UTC [more...]

[pcmoore-selinux:next 8/10] htmldocs: include/linux/lsm_hooks.h:1814: warning: Function parameter or member 'kernfs_init_security' not described in 'security_list_options'
 2019-03-25 14:08 UTC  (4+ messages)
` [PATCH] LSM: lsm_hooks.h - fix missing colon in docstring

[PATCH] [v2] selinux: avoid uninitialized variable warning
 2019-03-25 12:40 UTC 

[PATCH] selinux: remove useless assignments
 2019-03-25  8:11 UTC 

[PATCH] selinux: fixed parse warning Using plain integer as NULL pointer
 2019-03-24 10:57 UTC  (2+ messages)

[PATCH] selinux: avoid uninitialized variable warning
 2019-03-22 21:00 UTC  (5+ messages)

[PATCH -next] selinux: Make selinux_kernfs_init_security static
 2019-03-22 20:02 UTC  (3+ messages)

[PATCH 0/4] Signal: Fix hard lockup problem in flush_sigqueue()
 2019-03-22 19:59 UTC  (17+ messages)
` [PATCH 1/4] mm: Implement kmem objects freeing queue
` [PATCH 2/4] signal: Make flush_sigqueue() use free_q to release memory
` [PATCH 3/4] signal: Add free_uid_to_q()
` [PATCH 4/4] mm: Do periodic rescheduling when freeing objects in kmem_free_up_q()

general protection fault in ebitmap_destroy (2)
 2019-03-21 22:20 UTC  (4+ messages)

[PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
 2019-03-21 21:21 UTC  (9+ messages)

v5.1-rc1 binder_alloc_do_buffer_copy() BUG_ON triggered by selinux-testsuite
 2019-03-21 20:24 UTC  (22+ messages)

[GIT PULL] SELinux fixes for v5.1 (#2)
 2019-03-21 19:05 UTC  (2+ messages)

[PATCH 1/1] restorecond: use /run instead of /var/run
 2019-03-21 13:31 UTC  (4+ messages)

[PATCH] restorecond: Do not link against libpcre
 2019-03-21 12:06 UTC  (2+ messages)

[PATCH] binder: fix BUG_ON found by selinux-testsuite
 2019-03-20 22:35 UTC 

[PATCH] scripts/selinux: fix build
 2019-03-19 17:05 UTC  (2+ messages)

[PATCH] selinux: use kernel definition of PF_MAX in scripts
 2019-03-18 22:59 UTC  (3+ messages)

[PATCH] selinux: use kernel linux/socket.h definitions for PF_MAX
 2019-03-18 22:58 UTC  (5+ messages)

[PATCH v6] scripts/selinux: modernize mdp
 2019-03-18 22:42 UTC  (6+ messages)

.desktop files installed by gui/
 2019-03-18 21:39 UTC  (8+ messages)
` [PATCH 1/2] gui: Install polgengui.py to /usr/bin/selinux-polgengui
  ` [PATCH 2/2] gui: Install .desktop files to /usr/share/applications by default
      ` [PATCH v2] "

[PATCH] selinux: fix NULL dereference in policydb_destroy()
 2019-03-18 16:29 UTC  (3+ messages)

ANN: SELinux userspace release 2019-03-15 / 2.9
 2019-03-17 12:09 UTC  (2+ messages)

[PATCH 36/38] vfs: Convert selinuxfs to fs_context
 2019-03-14 16:13 UTC 

[GIT PULL] SELinux fixes for v5.1 (#1)
 2019-03-13 18:40 UTC  (2+ messages)

[PATCH] Restorecon: factor out a lookup helper for context matches
 2019-03-13 18:06 UTC  (2+ messages)

[PATCH] libselinux: Do not define gettid() if glibc >= 2.30 is used
 2019-03-13 17:26 UTC  (5+ messages)

[PATCH net] selinux: add the missing walk_size + len check in selinux_sctp_bind_connect
 2019-03-11 23:49 UTC  (5+ messages)

Patch to the context lookup change
 2019-03-11 20:12 UTC  (3+ messages)

[PATCH] security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblock
 2019-03-11 20:12 UTC  (8+ messages)

[PATCH] libselinux: Add security_reject_unknown(3) man page
 2019-03-11 15:48 UTC  (9+ messages)
    ` [PATCH v2] "
          ` [PATCH v3] "

[PATCH net] net: selinux: fix memory leak in selinux_netlbl_socket_post_create()
 2019-03-08 13:39 UTC  (5+ messages)

[GIT PULL] SELinux patches for v5.1
 2019-03-07 20:55 UTC  (2+ messages)

overlayfs access checks on underlying layers
 2019-03-04 19:21 UTC  (14+ messages)

[PATCH 00/97] LSM: Complete module stacking
 2019-03-01 17:06 UTC  (33+ messages)
` [PATCH 01/97] LSM: Infrastructure management of the superblock
` [PATCH 05/97] LSM: Create an lsm_export data structure
` [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 25/97] LSM: FIXUP - security_secid_to_secctx
` [PATCH 28/97] LSM: REVERT Use lsm_export in the sk_getsecid hooks
` [PATCH 33/97] NET: Store LSM access information in the socket blob for UDS
` [PATCH 41/97] AppArmor: Remove unnecessary hook stub
` [PATCH 53/97] LSM: Use lsm_context in release_secctx hooks
` [PATCH 54/97] LSM: Use lsm_context in security_release_secctx
` [PATCH 55/97] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 56/97] fs: remove lsm_context scaffolding
` [PATCH 57/97] LSM: Add the release function to the lsm_context
` [PATCH 58/97] LSM: Use lsm_context in inode_setsecctx hooks
` [PATCH 60/97] kernfs: remove lsm_context scaffolding
` [PATCH 61/97] LSM: Remove unused macro
` [PATCH 62/97] LSM: Special handling for secctx lsm hooks
` [PATCH 63/97] SELinux: Use blob offset in current_sid
` [PATCH 64/97] LSM: Specify which LSM to display with /proc/self/attr/display
` [PATCH 65/97] AppArmor: Remove the exclusive flag
` [PATCH 66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
` [PATCH 67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
` [PATCH 68/97] netfilter: Fix memory leak introduced with lsm_context
` [PATCH 69/97] Smack: Consolidate secmark conversions
` [PATCH 70/97] netfilter: Remove unnecessary NULL check in lsm_context

ANN: SELinux userspace 2.9-rc2 release candidate
 2019-03-01 13:39 UTC 

[PATCH v3] libselinux: selinux_set_mapping: fix handling of unknown classes/perms
 2019-03-01 11:53 UTC  (2+ messages)

[PATCH 00/97] LSM: Complete module stacking
 2019-02-28 22:43 UTC  (28+ messages)
` [PATCH 71/97] LSM: Add secmark refcounting to call_one list
` [PATCH 72/97] LSM: Add secmark refcounting to call_one list - part 2
` [PATCH 73/97] LSM: refactor security_setprocattr
` [PATCH 74/97] Smack: Detect if secmarks can be safely used
` [PATCH 75/97] LSM: Support multiple LSMs using inode_init_security
` [PATCH 76/97] LSM: Use full security context in security_inode_setsecctx
` [PATCH 77/97] LSM: Correct handling of ENOSYS in inode_setxattr
` [PATCH 78/97] LSM: Infrastructure security blobs for mount options
` [PATCH 79/97] LSM: Fix for security_init_inode_security
` [PATCH 80/97] Smack: Advertise the secid to netlabel
` [PATCH 81/97] LSM: Change error detection for UDP peer security
` [PATCH 82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
` [PATCH 83/97] Smack: Set netlabel flags properly on new label import
` [PATCH 84/97] Netlabel: Add a secattr comparison API function
` [PATCH 85/97] Smack: Let netlabel do the work on the ambient domain
` [PATCH 86/97] Smack: Don't set the socket label on each send
` [PATCH 87/97] Smack: Let netlabel do the work on connections
` [PATCH 88/97] Netlabel: Return the labeling type on socket
` [PATCH 89/97] "
` [PATCH 90/97] "
` [PATCH 91/97] "
` [PATCH 92/97] LSM: Remember the NLTYPE of netlabel sockets
` [PATCH 93/97] Smack: Use the NLTYPE on output
` [PATCH 94/97] LSM: Hook for netlabel reconciliation
` [PATCH 95/97] LSM: Avoid network conflicts in SELinux and Smack
` [PATCH 96/97] LSM: Apply Netlabel consitancy checks on send and connect
` [PATCH 97/97] Smack: Remove the exclusive bit


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).