SELinux Archive on lore.kernel.org
 help / color / Atom feed
[PATCH v3 00/19] Introduce partial kernel_read_file() support
 2020-07-24 21:36 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum

[PATCH v19 00/23] LSM: Module stacking for AppArmor
 2020-07-24 20:32 UTC  (24+ messages) - mbox.gz / Atom
  ` [PATCH v19 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v19 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v19 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v19 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v19 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v19 13/23] LSM: Specify which LSM to display
  ` [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v19 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v19 21/23] Audit: Add a new record for multiple object "
  ` [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v19 23/23] AppArmor: Remove the exclusive flag

[PATCH v4] libselinux: use kernel status page by default
 2020-07-24 20:25 UTC  (10+ messages) - mbox.gz / Atom

[RFC PATCH] Improve getcon man page
 2020-07-24 17:55 UTC  - mbox.gz / Atom

[PATCH] selinux: add tracepoint on denials
 2020-07-24 13:54 UTC  (4+ messages) - mbox.gz / Atom

[SELinux-notebook PATCH v3] objects.md: some clarifications
 2020-07-24 13:30 UTC  (29+ messages) - mbox.gz / Atom
` [SELinux-notebook PATCH v4] "
    ` [SELinux-notebook PATCH v5] "
    ` [SELinux-notebook PATCH v6] "
        ` [SELinux-notebook PATCH v7] "
          ` [SELinux-notebook PATCH v8] "
              ` [SELinux-notebook PATCH v9] "

getcon family: returning success while context is NULL
 2020-07-24 13:13 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v3] libselinux: use kernel status page by default
 2020-07-24 12:18 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v18 00/23] LSM: Module stacking for AppArmor
 2020-07-24  1:08 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context

[SELinux-notebook PATCH] lsm_selinux: document genfs_seclabel_symlinks policy capability
 2020-07-23  1:54 UTC  (5+ messages) - mbox.gz / Atom
  ` [SELinux-notebook PATCH v2] "

[PATCH v5 0/2] userspace: Implement new format of filename trans rules
 2020-07-22 22:15 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v5 1/2] libsepol,checkpolicy: optimize storage of filename transitions
` [PATCH v5 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS

[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-07-22 11:30 UTC  (10+ messages) - mbox.gz / Atom

[RESEND] [PATCHv4 1/2] uapi: fuse: Add FUSE_SECURITY_CTX
 2020-07-22  9:07 UTC  (2+ messages) - mbox.gz / Atom
` [RESEND] [PATCHv4 2/2] fuse: Call security hooks on new inodes

[PATCH 00/13] Introduce partial kernel_read_file() support
 2020-07-21 21:50 UTC  (27+ messages) - mbox.gz / Atom
` [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH 04/13] fs/kernel_read_file: Split into separate include file
` [PATCH 05/13] fs/kernel_read_file: Split into separate source file
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
` [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
` [PATCH 10/13] firmware_loader: Use security_post_load_data()
` [PATCH 11/13] module: Call security_kernel_post_load_data()
` [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads

[SELinux-notebook PATCH] adds CIL policy with makefile
 2020-07-21 21:08 UTC  (12+ messages) - mbox.gz / Atom
  ` [SELinux-notebook PATCH v2] "
  ` [SELinux-notebook PATCH v3] "
` [SELinux-notebook PATCH v4] "
  ` [SELinux-notebook PATCH v5] "

[SELinux-notebook PATCH] object_classes_permissions: describe bpf and perfmon capabilities
 2020-07-21 21:04 UTC  (3+ messages) - mbox.gz / Atom

[RFC] Porting glibc away from deprecated libselinux APIs
 2020-07-21 14:48 UTC  (5+ messages) - mbox.gz / Atom

[PATCH] policycoreutils: fix inaccurate description in sestatus
 2020-07-21 13:34 UTC  (4+ messages) - mbox.gz / Atom

[PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file
 2020-07-21  6:36 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c
 2020-07-21  6:35 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v3 0/5] LSM: Measure security module state
 2020-07-20 18:59 UTC  (21+ messages) - mbox.gz / Atom
` [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v3 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v3 4/5] LSM: Define SELinux function to measure security state
  ` [RFC PATCH] LSM: security_read_selinux_policy() can be static
` [PATCH v3 5/5] LSM: Define workqueue for measuring security module state

[PATCH v2] libselinux: Use sestatus if open
 2020-07-20 13:57 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 2020-07-20 12:58 UTC  (14+ messages) - mbox.gz / Atom
` [PATCH v6 1/7] "
` [PATCH v6 2/7] pid: use checkpoint_restore_ns_capable() for set_tid
` [PATCH v6 3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
` [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v6 5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe
` [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
` [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test

[RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
 2020-07-19 18:10 UTC  (6+ messages) - mbox.gz / Atom
` [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
` [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
` [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
` [RFC PATCH 5/5] keys: Implement a 'container' keyring

[PATCH] selinux: make use of variables when defining libdir and includedir
 2020-07-19 17:15 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v4 0/2] userspace: Implement new format of filename trans rules
 2020-07-19  9:33 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH v4 1/2] libsepol,checkpolicy: optimize storage of filename transitions
` [PATCH v4 2/2] libsepol: implement POLICYDB_VERSION_COMP_FTRANS

[PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 2020-07-18 17:47 UTC  (3+ messages) - mbox.gz / Atom

Reporting a use-after-free read bug in userfaultfd_release()
 2020-07-17 11:45 UTC  - mbox.gz / Atom

[PATCH v2 0/5] LSM: Measure security module state
 2020-07-16 22:03 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v2 4/5] LSM: Define SELinux function to measure security state

page:   latest

SELinux Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/selinux/0 selinux/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 selinux selinux/ https://lore.kernel.org/selinux \
		selinux@vger.kernel.org
	public-inbox-index selinux

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.selinux


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git