messages from 2019-12-10 15:04:34 to 2019-12-17 16:23:26 UTC [more...]
Looks like issue in handling active_nodes count in 4.19 kernel
2019-12-17 16:23 UTC (9+ messages)
[RFC PATCH 0/1] selinux-testsuite: Add filesystem tests
2019-12-17 15:36 UTC (4+ messages)
` [RFC PATCH 1/1] "
[PATCH v4] selinux-testsuite: add lockdown tests
2019-12-17 15:12 UTC (5+ messages)
[PATCH] selinux: move pkey sid cache based retrieval under defconfig
2019-12-17 15:11 UTC (3+ messages)
[PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
2019-12-17 15:02 UTC (11+ messages)
` [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v3 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
` [PATCH v3 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
` [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
` [Intel-gfx] "
` [PATCH v3 5/7] trace/bpf_trace: "
` [PATCH v3 6/7] powerpc/perf: "
` [PATCH v3 7/7] parisc/perf: "
[PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
2019-12-17 14:15 UTC
[PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
2019-12-17 13:44 UTC
[RFC PATCH] selinux: randomize layout of key structures
2019-12-17 13:44 UTC (5+ messages)
[RFC PATCH] selinux: clean up selinux_enabled/disabled
2019-12-16 23:39 UTC (3+ messages)
[PATCH v12 00/25] LSM: Module stacking for AppArmor
2019-12-16 22:36 UTC (26+ messages)
` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v12 05/25] net: Prepare UDS for security module stacking
` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v12 13/25] LSM: Specify which LSM to display
` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v12 22/25] Audit: Include object data for all security modules
` [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
` [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v12 25/25] AppArmor: Remove the exclusive flag
[PATCH v12 00/25] LSM: Module stacking for AppArmor
2019-12-16 22:33 UTC (16+ messages)
` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v12 05/25] net: Prepare UDS for security module stacking
` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v12 13/25] LSM: Specify which LSM to display
` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
[PATCH v12 00/25] LSM: Module stacking for AppArmor
2019-12-16 22:24 UTC (21+ messages)
` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v12 05/25] net: Prepare UDS for security module stacking
` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v12 13/25] LSM: Specify which LSM to display
` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
[PATCH] LSM: allow an LSM to disable all hooks at once
2019-12-16 18:55 UTC (28+ messages)
mcstrans doesn't translate for s0 level (thus, doesn't work in mcs policy)
2019-12-16 18:09 UTC
[PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
2019-12-16 17:12 UTC (12+ messages)
` [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
` [PATCH v2 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
` [PATCH v2 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
` [PATCH v2 5/7] trace/bpf_trace: "
` [PATCH v2 6/7] powerpc/perf: "
` [PATCH v2 7/7] parisc/perf: "
[PATCH testsuite] selinux-testsuite: fix tun_tap checks
2019-12-16 13:51 UTC (3+ messages)
"watch" - Problem when using kernel >= 5.4
2019-12-16 11:31 UTC (3+ messages)
[PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
2019-12-15 11:53 UTC (13+ messages)
Does anyone use RANDSTRUCT?
2019-12-15 0:33 UTC (6+ messages)
[PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
2019-12-12 22:04 UTC (3+ messages)
[PATCH v2] mcstrans: start early and stop late
2019-12-12 14:59 UTC (7+ messages)
[PATCH] selinux: remove unnecessary selinux cred request
2019-12-12 13:53 UTC (3+ messages)
SELinux namespaces working branch rebased
2019-12-12 13:22 UTC
[PATCH] python/semanage: check variable type of port before trying to split
2019-12-11 15:54 UTC (3+ messages)
[PATCH] mcstrans: start early and stop late
2019-12-11 13:32 UTC
[PATCH 2/8] afs: Fix SELinux setting security label on /afs
2019-12-11 10:27 UTC
[PATCH] selinux: reorder hooks to make runtime disable less broken
2019-12-10 19:57 UTC (11+ messages)
[RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
2019-12-10 19:19 UTC (5+ messages)
[V4 PATCH 1/1] selinux-testsuite: Add perf_event tests
2019-12-10 17:01 UTC (3+ messages)
[RFC PATCH] security: add an interface to lookup the lockdown reason
2019-12-10 16:50 UTC (7+ messages)
[PATCH V4] selinux-testsuite: Add kernel module tests
2019-12-10 15:31 UTC (3+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).