selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-12-17 16:23:26 to 2020-01-07 03:30:55 UTC [more...]

[PATCH v2] selinux: deprecate disabling SELinux and runtime
 2020-01-07  3:30 UTC 

[RFC PATCH] selinux: deprecate disabling SELinux and runtime
 2020-01-07  3:29 UTC  (8+ messages)

[PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND
 2020-01-07  2:28 UTC  (2+ messages)

[PATCH] security: selinux: allow per-file labelling for binderfs
 2020-01-07  2:13 UTC  (6+ messages)

[PATCH v2] selinuxfs: use scnprinft to get real length for inode
 2020-01-07  2:09 UTC  (2+ messages)

[PATCH] selinuxfs: use scnprinft to get real length in sel_read_class
 2020-01-06 20:49 UTC  (2+ messages)

[PATCH v13 00/25] LSM: Module stacking for AppArmor
 2020-01-06 18:45 UTC  (37+ messages)
  ` [PATCH v13 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v13 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
  ` [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v13 13/25] LSM: Specify which LSM to display
  ` [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v13 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v13 22/25] Audit: Include object data for all security modules
  ` [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v13 25/25] AppArmor: Remove the exclusive flag
  ` [PATCH v13 26/25] Audit: Multiple LSM support in audit rules

[PATCH 0/1] selinux-testsuite: Add filesystem tests
 2020-01-06 16:11 UTC  (3+ messages)
` [PATCH 1/1] "

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-31 17:36 UTC  (29+ messages)
  ` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v12 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v12 13/25] LSM: Specify which LSM to display
  ` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v12 22/25] Audit: Include object data for all security modules
  ` [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v12 25/25] AppArmor: Remove the exclusive flag

[PATCH -next] selinux: remove set but not used variable 'sidtab'
 2019-12-24 19:35 UTC  (2+ messages)

[selinux] 66f8e2f03c: RIP:sidtab_hash_stats
 2019-12-23 23:04 UTC  (3+ messages)

[PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats
 2019-12-23 23:03 UTC  (2+ messages)

Looks like issue in handling active_nodes count in 4.19 kernel 
 2019-12-21 16:02 UTC  (16+ messages)
                      `  "

[PATCH] netnode.c : fix sel_netnode_hash be destroyed
 2019-12-21 15:02 UTC  (4+ messages)

[RFC PATCH 0/8] systemd: improve SELinux support
 2019-12-20 14:53 UTC  (16+ messages)
` [RFC PATCH 1/8] selinux-util: increase log severity
` [RFC PATCH 2/8] selinux-access: log warning on context acquisition failure
` [RFC PATCH 3/8] core: bookkeeping withdrawal path of masked units
` [RFC PATCH 4/8] core: add missing SELinux checks for dbus methods
` [RFC PATCH 5/8] core: make SELinux access permissions more distinct
` [RFC PATCH 6/8] core: add support for MAC checks on unit install operations
` [RFC PATCH 7/8] core: implement the sd-bus generic callback for SELinux
` [RFC PATCH 8/8] core: add notes to D-Bus interfaces about adding SELinux checks

[PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs
 2019-12-20 14:29 UTC 

[PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs
 2019-12-20 14:34 UTC 

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-19 21:44 UTC  (67+ messages)
` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v12 05/25] net: Prepare UDS for security module stacking
` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v12 13/25] LSM: Specify which LSM to display
` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v12 22/25] Audit: Include object data for all security modules
` [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs

[RFC PATCH] selinux: randomize layout of key structures
 2019-12-19 18:29 UTC  (10+ messages)

[PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing
 2019-12-19 16:26 UTC  (3+ messages)

[PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND
 2019-12-19 14:18 UTC  (3+ messages)

incorrect sysfs contexts
 2019-12-19 14:16 UTC  (3+ messages)

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2019-12-19  9:10 UTC  (12+ messages)
` [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
` [PATCH v4 3/9] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
` [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
` [PATCH v4 5/9] trace/bpf_trace: "
` [PATCH v4 6/9] powerpc/perf: "
` [PATCH v4 7/9] parisc/perf: "
` [PATCH v4 8/9] drivers/perf: "
` [PATCH v4 9/9] drivers/oprofile: "

[PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot
 2019-12-19  2:25 UTC  (2+ messages)

[RFC PATCH 0/1] selinux-testsuite: Add filesystem tests
 2019-12-17 17:28 UTC  (7+ messages)
` [RFC PATCH 1/1] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).