selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-04 11:40:16 to 2019-06-14 23:20:24 UTC [more...]

[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
 2019-06-14 23:19 UTC  (61+ messages)
` [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v2 2/5] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v2 3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v2 4/5] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation
` [RFC PATCH v1 0/3] security/x86/sgx: SGX specific LSM hooks
  ` [RFC PATCH v1 1/3] LSM/x86/sgx: Add "
  ` [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux
  ` [RFC PATCH v1 3/3] LSM/x86/sgx: Call new LSM hooks from SGX subsystem

[PATCH] libsepol: check strdup() failures and replace constant
 2019-06-14 23:16 UTC 

[PATCH] trivial kernel_to_conf.c checks
 2019-06-14 19:38 UTC  (2+ messages)

[PATCH] Add CONTRIBUTING
 2019-06-14 19:00 UTC  (3+ messages)
` [PATCH v2] Add CONTRIBUTING.md

[PATCH] libsepol: error in CIL if a permission cannot be resolved
 2019-06-14 15:35 UTC  (2+ messages)
` [Non-DoD Source] "

[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
 2019-06-14 15:18 UTC  (55+ messages)
` [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
` [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX

[PATCH userspace v4 0/4] Remove redundant rules when building policydb
 2019-06-14 13:38 UTC  (8+ messages)
` [PATCH userspace v4 1/4] libsepol: add a function to optimize kernel policy
` [PATCH userspace v4 2/4] libsemanage: optionally optimize policy on rebuild
  ` [Non-DoD Source] "
` [PATCH userspace v4 3/4] secilc: add flag to enable policy optimization
` [PATCH userspace v4 4/4] checkpolicy: "

[PATCH ghak57 V1] selinux: format all invalid context as untrusted
 2019-06-14  8:04 UTC  (2+ messages)

[GIT PULL] SELinux fixes for v5.2 (#2)
 2019-06-13  3:15 UTC  (2+ messages)

[PATCH 3/3] libsepol: remove unneeded int
 2019-06-13 16:00 UTC 

[PATCH 2/3] checkpolicy: remove redundant if-clause
 2019-06-13 15:59 UTC 

[PATCH 1/3] libsepol: more accurate error messages
 2019-06-13 15:59 UTC 

[PATCH] trivial: remove unneeded int
 2019-06-13 15:57 UTC  (6+ messages)

[PATCH] selinux: fix empty write to keycreate file
 2019-06-12 20:11 UTC  (3+ messages)

[PATCH 00/11] libsemanage: add tests
 2019-06-12 19:57 UTC  (13+ messages)
` [PATCH 01/11] libsemanage: add helper functions to tests
` [PATCH 02/11] libsemanage: test semanage_handle_* functions
` [PATCH 03/11] libsemanage: test semanage_bool_* functions
` [PATCH 04/11] libsemanage: test semanage_fcontext functions
` [PATCH 05/11] libsemanage: test semanage_iface_* functions
` [PATCH 06/11] libsemanage: test semanage_ibendport_* functions
` [PATCH 07/11] libsemanage: test semanage_node_* functions
` [PATCH 08/11] libsemanage: test semanage_port_* functions
` [PATCH 09/11] libsemanage: test semanage_user_* functions
` [PATCH 10/11] libsemanage: test semanage_context_* functions
` [PATCH 11/11] libsemanage: test semanage_msg_default_handler

[PATCH v5] selinux: fix a missing-check bug in selinux_sb_eat_lsm_opts()
 2019-06-12 16:32 UTC  (3+ messages)

[PATCH v4] selinux: fix a missing-check bug in selinux_add_mnt_opt( )
 2019-06-12 16:16 UTC  (2+ messages)

[PATCH] selinux: log raw contexts as untrusted strings
 2019-06-12 15:01 UTC  (5+ messages)

[PATCH v4] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_o pts()
 2019-06-11  3:05 UTC  (4+ messages)

[PATCH v3] selinux: lsm: fix a missing-check bug in selinux_add_mnt_opt( )
 2019-06-11  3:04 UTC  (5+ messages)

New Container vulnerability could potentially use an SELinux fix
 2019-06-10 17:01 UTC  (10+ messages)

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-10 10:20 UTC  (17+ messages)
` [PATCH 35/58] LSM: Limit calls to certain module hooks

ANN: Reference Policy 2.20190609
 2019-06-09 18:38 UTC 

[RFC] libselinux: Use Python distutils to install SELinux python bindings
 2019-06-07 15:35 UTC 

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-06 22:53 UTC  (13+ messages)
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm

[PATCH userspace v3 0/7] Remove redundant rules when building policydb
 2019-06-06 11:38 UTC  (3+ messages)
` [PATCH userspace v3 6/7] [RFC] lisepol: slightly more thorough optimization

[PATCH V2 0/2] Update restorecon to support new digest scheme
 2019-06-03  9:54 UTC 

[PATCH] selinux-testsuite: Correct address count for asconf sctp test
 2019-06-04 21:29 UTC  (2+ messages)

[PATCH] selinux: Fix strncpy in libselinux and libsepol
 2019-06-02 13:35 UTC  (3+ messages)

[RFC PATCH 1/1] selinux: Remove legacy local boolean and user code
 2019-06-04 17:08 UTC 

[PATCH V2 2/2] setfiles: Update utilities for the new digest scheme
 2019-06-03  9:55 UTC 

SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
 2019-06-04 11:39 UTC  (11+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).