messages from 2019-06-04 11:40:16 to 2019-06-14 23:20:24 UTC [more...]
[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
2019-06-14 23:19 UTC (61+ messages)
` [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v2 2/5] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v2 3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v2 4/5] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation
` [RFC PATCH v1 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v1 1/3] LSM/x86/sgx: Add "
` [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux
` [RFC PATCH v1 3/3] LSM/x86/sgx: Call new LSM hooks from SGX subsystem
[PATCH] libsepol: check strdup() failures and replace constant
2019-06-14 23:16 UTC
[PATCH] trivial kernel_to_conf.c checks
2019-06-14 19:38 UTC (2+ messages)
[PATCH] Add CONTRIBUTING
2019-06-14 19:00 UTC (3+ messages)
` [PATCH v2] Add CONTRIBUTING.md
[PATCH] libsepol: error in CIL if a permission cannot be resolved
2019-06-14 15:35 UTC (2+ messages)
` [Non-DoD Source] "
[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
2019-06-14 15:18 UTC (55+ messages)
` [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
` [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
[PATCH userspace v4 0/4] Remove redundant rules when building policydb
2019-06-14 13:38 UTC (8+ messages)
` [PATCH userspace v4 1/4] libsepol: add a function to optimize kernel policy
` [PATCH userspace v4 2/4] libsemanage: optionally optimize policy on rebuild
` [Non-DoD Source] "
` [PATCH userspace v4 3/4] secilc: add flag to enable policy optimization
` [PATCH userspace v4 4/4] checkpolicy: "
[PATCH ghak57 V1] selinux: format all invalid context as untrusted
2019-06-14 8:04 UTC (2+ messages)
[GIT PULL] SELinux fixes for v5.2 (#2)
2019-06-13 3:15 UTC (2+ messages)
[PATCH 3/3] libsepol: remove unneeded int
2019-06-13 16:00 UTC
[PATCH 2/3] checkpolicy: remove redundant if-clause
2019-06-13 15:59 UTC
[PATCH 1/3] libsepol: more accurate error messages
2019-06-13 15:59 UTC
[PATCH] trivial: remove unneeded int
2019-06-13 15:57 UTC (6+ messages)
[PATCH] selinux: fix empty write to keycreate file
2019-06-12 20:11 UTC (3+ messages)
[PATCH 00/11] libsemanage: add tests
2019-06-12 19:57 UTC (13+ messages)
` [PATCH 01/11] libsemanage: add helper functions to tests
` [PATCH 02/11] libsemanage: test semanage_handle_* functions
` [PATCH 03/11] libsemanage: test semanage_bool_* functions
` [PATCH 04/11] libsemanage: test semanage_fcontext functions
` [PATCH 05/11] libsemanage: test semanage_iface_* functions
` [PATCH 06/11] libsemanage: test semanage_ibendport_* functions
` [PATCH 07/11] libsemanage: test semanage_node_* functions
` [PATCH 08/11] libsemanage: test semanage_port_* functions
` [PATCH 09/11] libsemanage: test semanage_user_* functions
` [PATCH 10/11] libsemanage: test semanage_context_* functions
` [PATCH 11/11] libsemanage: test semanage_msg_default_handler
[PATCH v5] selinux: fix a missing-check bug in selinux_sb_eat_lsm_opts()
2019-06-12 16:32 UTC (3+ messages)
[PATCH v4] selinux: fix a missing-check bug in selinux_add_mnt_opt( )
2019-06-12 16:16 UTC (2+ messages)
[PATCH] selinux: log raw contexts as untrusted strings
2019-06-12 15:01 UTC (5+ messages)
[PATCH v4] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_o pts()
2019-06-11 3:05 UTC (4+ messages)
[PATCH v3] selinux: lsm: fix a missing-check bug in selinux_add_mnt_opt( )
2019-06-11 3:04 UTC (5+ messages)
New Container vulnerability could potentially use an SELinux fix
2019-06-10 17:01 UTC (10+ messages)
[PATCH 00/58] LSM: Module stacking for AppArmor
2019-06-10 10:20 UTC (17+ messages)
` [PATCH 35/58] LSM: Limit calls to certain module hooks
ANN: Reference Policy 2.20190609
2019-06-09 18:38 UTC
[RFC] libselinux: Use Python distutils to install SELinux python bindings
2019-06-07 15:35 UTC
[PATCH 00/58] LSM: Module stacking for AppArmor
2019-06-06 22:53 UTC (13+ messages)
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
[PATCH userspace v3 0/7] Remove redundant rules when building policydb
2019-06-06 11:38 UTC (3+ messages)
` [PATCH userspace v3 6/7] [RFC] lisepol: slightly more thorough optimization
[PATCH V2 0/2] Update restorecon to support new digest scheme
2019-06-03 9:54 UTC
[PATCH] selinux-testsuite: Correct address count for asconf sctp test
2019-06-04 21:29 UTC (2+ messages)
[PATCH] selinux: Fix strncpy in libselinux and libsepol
2019-06-02 13:35 UTC (3+ messages)
[RFC PATCH 1/1] selinux: Remove legacy local boolean and user code
2019-06-04 17:08 UTC
[PATCH V2 2/2] setfiles: Update utilities for the new digest scheme
2019-06-03 9:55 UTC
SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
2019-06-04 11:39 UTC (11+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).