selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-05-27 13:34:49 to 2019-06-02 16:52:30 UTC [more...]

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-02 16:50 UTC  (22+ messages)
` [PATCH 01/58] LSM: Infrastructure management of the superblock
` [PATCH 03/58] LSM: Infrastructure management of the key security blob
` [PATCH 04/58] LSM: Create an lsm_export data structure
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid
` [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm

[PATCH] selinux: Fix strncpy in libselinux and libsepol
 2019-05-31 16:16 UTC  (3+ messages)

[PATCH V2] selinux: Fix strncpy in libselinux and libsepol
 2019-06-02  9:16 UTC 

[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
 2019-06-02  7:29 UTC  (11+ messages)
` [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
` [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-02  2:56 UTC  (61+ messages)
` [PATCH 01/58] LSM: Infrastructure management of the superblock
` [PATCH 02/58] LSM: Infrastructure management of the sock security
` [PATCH 03/58] LSM: Infrastructure management of the key security blob
` [PATCH 04/58] LSM: Create an lsm_export data structure
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid
` [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure
` [PATCH 24/58] Audit: Convert osid "
` [PATCH 25/58] IMA: Clean out lsm_export scaffolding
` [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export
` [PATCH 27/58] NET: Remove scaffolding on secmarks
` [PATCH 28/58] NET: Remove scaffolding on new secmarks
` [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 30/58] Netlabel: Replace secids with lsm_export
` [PATCH 31/58] LSM: Remove lsm_export scaffolding functions
` [PATCH 32/58] IMA: FIXUP prototype using lsm_export
` [PATCH 33/58] Smack: Restore the release_secctx hook
` [PATCH 34/58] AppArmor: Remove unnecessary hook stub
` [PATCH 35/58] LSM: Limit calls to certain module hooks
` [PATCH 36/58] LSM: Create a data structure for a security context
` [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks
` [PATCH 47/58] LSM: Use lsm_context in security_release_secctx
` [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 49/58] fs: remove lsm_context scaffolding
` [PATCH 50/58] LSM: Add the release function to the lsm_context

[PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts()
 2019-06-01  2:47 UTC  (5+ messages)

[PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
 2019-06-01  1:57 UTC  (3+ messages)

[PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt()
 2019-06-01  1:54 UTC  (9+ messages)
  ` [PATCH v2] "

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-05-31 23:31 UTC  (18+ messages)
` [PATCH 01/58] LSM: Infrastructure management of the superblock
` [PATCH 02/58] LSM: Infrastructure management of the sock security
` [PATCH 03/58] LSM: Infrastructure management of the key security blob
` [PATCH 04/58] LSM: Create an lsm_export data structure
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx

[PATCH] Add CONTRIBUTING
 2019-05-31 21:01 UTC  (7+ messages)
        ` [PATCH v2] Add CONTRIBUTING.md

[PATCH] selinux: Fix strncpy in libselinux and libsepol
 2019-05-31 19:35 UTC  (2+ messages)

[PATCH userspace v2 0/7] Remove redundant rules when building policydb
 2019-05-31  7:39 UTC  (14+ messages)
` [PATCH userspace v2 1/7] libsepol: add a function to optimize kernel policy
  ` [Non-DoD Source] "
` [PATCH userspace v2 2/7] libsemanage: optionally optimize policy on rebuild
` [PATCH userspace v2 3/7] semodule: add flag to enable policy optimization
` [PATCH userspace v2 4/7] secilc: "
` [PATCH userspace v2 5/7] checkpolicy: "
` [PATCH userspace v2 6/7] [RFC] lisepol: slightly more thorough optimization
` [PATCH userspace v2 7/7] [RFC] libsemanage: switch to config file entry

SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
 2019-05-30 22:24 UTC  (28+ messages)

[PATCH 0/3] Update restorecon to support new digest scheme
 2019-05-30 16:29 UTC  (4+ messages)

[PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts()
 2019-05-30 15:16 UTC  (7+ messages)
  ` [PATCH v2] "

[selinux.wiki] Mention Signed-off-by in Contributing.md
 2019-05-29 16:07 UTC  (2+ messages)

[PATCH userspace v3 0/7] Remove redundant rules when building policydb
 2019-05-29  7:37 UTC  (8+ messages)
` [PATCH userspace v3 1/7] libsepol: add a function to optimize kernel policy
` [PATCH userspace v3 2/7] libsemanage: optionally optimize policy on rebuild
` [PATCH userspace v3 3/7] semodule: add flag to enable policy optimization
` [PATCH userspace v3 4/7] secilc: "
` [PATCH userspace v3 5/7] checkpolicy: "
` [PATCH userspace v3 6/7] [RFC] lisepol: slightly more thorough optimization
` [PATCH userspace v3 7/7] [RFC] libsemanage: switch to config file entry

SELinux integration in sysVinit
 2019-05-29  3:40 UTC  (6+ messages)
      ` Bug#929063: "

[PATCH userspace 0/4] Remove redundant rules when building policydb
 2019-05-27 17:11 UTC  (3+ messages)
` [Non-DoD Source] "

SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
 2019-05-27 13:48 UTC  (14+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).