selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-19 22:24:22 to 2019-06-27 18:56:28 UTC [more...]

[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
 2019-06-27 18:56 UTC  (38+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 02/12] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH v4 03/12] selftests: x86/sgx: Mark the enclave loader as not needing an exec stack
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 06/12] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX
` [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v2 1/3] x86/sgx: Add "

[PATCH v4 00/23] LSM: Module stacking for AppArmor
 2019-06-27 18:10 UTC  (74+ messages)
` [PATCH v4 01/23] LSM: Infrastructure management of the superblock
` [PATCH v4 02/23] LSM: Infrastructure management of the sock security
` [PATCH v4 03/23] LSM: Infrastructure management of the key blob
` [PATCH v4 04/23] LSM: Create and manage the lsmblob data structure
` [PATCH v4 05/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v4 06/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v4 07/23] net: Prepare UDS for secuirty module stacking
` [PATCH v4 08/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v4 09/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v4 10/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v4 11/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v4 12/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v4 13/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v4 14/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v4 15/23] LSM: Specify which LSM to display
` [PATCH v4 16/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v4 17/23] "
` [PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v4 19/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v4 20/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v4 21/23] Audit: Store LSM audit information in an lsmblob
` [PATCH v4 22/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v4 23/23] AppArmor: Remove the exclusive flag

[PATCH ghak57 V2] selinux: format all invalid context as untrusted
 2019-06-27 16:48 UTC 

[RFC PATCH v3 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
 2019-06-26 20:39 UTC  (2+ messages)

[PATCH 1/1] libsepol: include module.c internal header in module_to_cil.c
 2019-06-26  6:54 UTC  (3+ messages)

[PATCH v3 00/24] LSM: Module stacking for AppArmor
 2019-06-25 15:30 UTC  (81+ messages)
` [PATCH v3 01/24] LSM: Infrastructure management of the superblock
` [PATCH v3 02/24] LSM: Infrastructure management of the sock security
` [PATCH v3 03/24] LSM: Infrastructure management of the key blob
` [PATCH v3 04/24] LSM: Create and manage the lsmblob data structure
` [PATCH v3 05/24] Use lsmblob in security_audit_rule_match
` [PATCH v3 06/24] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v3 07/24] net: Prepare UDS for secuirty module stacking
` [PATCH v3 08/24] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v3 09/24] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v3 10/24] Use lsmblob in security_ipc_getsecid
` [PATCH v3 11/24] LSM: Use lsmblob in security_task_getsecid
` [PATCH v3 12/24] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v3 13/24] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v3 14/24] IMA: Change internal interfaces to use lsmblobs
` [PATCH v3 15/24] LSM: Specify which LSM to display
` [PATCH v3 16/24] LSM: Ensure the correct LSM context releaser
` [PATCH v3 17/24] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v3 18/24] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v3 19/24] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v3 20/24] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v3 21/24] Audit: Store LSM audit information in an lsmblob
` [PATCH v3 22/24] LSM: Return the lsmblob slot on initialization
` [PATCH v3 23/24] NET: Store LSM netlabel data in a lsmblob
` [PATCH v3 24/24] AppArmor: Remove the exclusive flag

[PATCH userspace v4 0/4] Remove redundant rules when building policydb
 2019-06-25 15:01 UTC  (3+ messages)
` [Non-DoD Source] "

[PATCH V3 0/2] selinux: Remove legacy local boolean and user code
 2019-06-24 18:02 UTC  (2+ messages)
` [PATCH V3 1/2] "

[PATCH V2 1/2] selinux: Remove legacy local boolean and user code
 2019-06-23 19:46 UTC  (2+ messages)

[PATCH] selinux-testsuite: fix old python shebang in tests/overlay/access
 2019-06-23 17:01 UTC  (5+ messages)

[PATCH v2 00/25] LSM: Module stacking for AppArmor
 2019-06-22 14:15 UTC  (3+ messages)
` Stacked LSMs (was Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor)

[PATCH V2 2/2] selinux: Update manpages after removing legacy boolean and user code
 2019-06-21 15:40 UTC 

[PATCH v2 00/25] LSM: Module stacking for AppArmor
 2019-06-20 17:25 UTC  (5+ messages)
` [PATCH v2 18/25] LSM: Use lsmcontext in security_dentry_init_security


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).