selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-30 12:00:13 to 2019-07-19 23:38:15 UTC [more...]

[PATCH v5 00/23] LSM: Module stacking for AppArmor
 2019-07-19 23:37 UTC  (32+ messages)
` [PATCH v5 01/23] LSM: Infrastructure management of the superblock
` [PATCH v5 02/23] LSM: Infrastructure management of the sock security
` [PATCH v5 03/23] LSM: Infrastructure management of the key blob
` [PATCH v5 04/23] LSM: Create and manage the lsmblob data structure
` [PATCH v5 05/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v5 06/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v5 07/23] net: Prepare UDS for secuirty module stacking
` [PATCH v5 08/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v5 09/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v5 10/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v5 11/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v5 12/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v5 13/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v5 14/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v5 15/23] LSM: Specify which LSM to display
` [PATCH v5 16/23] LSM: Ensure the correct LSM context releaser
` [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v5 18/23] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v5 20/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v5 21/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v5 22/23] AppArmor: Remove the exclusive flag
` [PATCH v5 23/23] SELinux: Verify LSM display sanity in binder

Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)
 2019-07-19 20:02 UTC 

Preferred subj= with multiple LSMs
 2019-07-18 18:48 UTC 

[RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
 2019-07-18 16:39 UTC  (3+ messages)

[PATCH 1/3] Add documentation key in systemd .service files
 2019-07-18 14:52 UTC  (6+ messages)
` [PATCH 2/3] mcstrans: Move setrans.conf manpage to section 5
` [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one

[RFC] libselinux: Use Python distutils to install SELinux python bindings
 2019-07-17 11:10 UTC  (4+ messages)
    ` [PATCH] "

[RFC PATCH] security,capability: pass object information to security_capable
 2019-07-16 15:08 UTC  (18+ messages)
  ` [RFC PATCH] security, capability: "

[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
 2019-07-15 22:23 UTC  (129+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
  ` [RFC PATCH v2 1/3] x86/sgx: Add "
  ` [RFC PATCH v3 0/4] security/x86/sgx: "
  ` [RFC PATCH v3 1/4] x86/sgx: Add "
  ` [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
  ` [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
  ` [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux

[PATCH AUTOSEL 5.2 097/249] selinux: fix empty write to keycreate file
 2019-07-15 13:44 UTC 

[PATCH AUTOSEL 5.1 085/219] selinux: fix empty write to keycreate file
 2019-07-15 14:01 UTC 

[PATCH AUTOSEL 4.19 064/158] selinux: fix empty write to keycreate file
 2019-07-15 14:16 UTC 

[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
 2019-07-12  3:29 UTC  (12+ messages)
  ` [Non-DoD Source] "

[PATCH] selinux-testsuite: add tests for fsnotify
 2019-07-10 13:50 UTC  (2+ messages)

RFC: BUG: overlayfs getxattr recursion leaves a poison sid
 2019-07-09 16:41 UTC  (3+ messages)

[GIT PULL] SELinux patches for v5.3
 2019-07-09  3:15 UTC  (2+ messages)

[PATCH V2] libselinux: Fix security_get_boolean_names build error
 2019-07-08 13:37 UTC 

[PATCH] libselinux: Fix security_get_boolean_names build error
 2019-07-07 21:02 UTC  (2+ messages)

[PATCH V3 0/2] Update restorecon to support new digest scheme
 2019-07-04 18:57 UTC 

[PATCH] libselinux: Fix security_get_boolean_names build error
 2019-07-07 17:24 UTC  (2+ messages)

[PATCH V4 0/2] Update restorecon to support new digest scheme
 2019-07-06 15:21 UTC  (3+ messages)
` [PATCH 1/2] libselinux: Save digest of all partial matches for directory
` [PATCH V4 2/2] setfiles: Update utilities for the new digest scheme

[PATCH V3 1/2] libselinux: Save digest of all partial matches for directory
 2019-07-06 10:20 UTC  (3+ messages)
` [PATCH V3 2/2] setfiles: Update utilities for the new digest scheme

[PATCH V3 2/2] setfiles: Update utilities for the new digest scheme
 2019-07-05 12:12 UTC 

[PATCH V3 0/2] Update restorecon to support new digest scheme
 2019-07-05  7:21 UTC 

[PATCH 1/2] Revert "mcstransd select correct colour range."
 2019-07-02 12:09 UTC  (2+ messages)
` [PATCH 2/2] Fix mcstrans secolor examples

[PATCH v4 00/23] LSM: Module stacking for AppArmor
 2019-07-02  1:20 UTC  (7+ messages)
` [PATCH v4 15/23] LSM: Specify which LSM to display
        ` Fwd: "

[PATCH ghak57 V2] selinux: format all invalid context as untrusted
 2019-07-01 20:40 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).