selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-17 12:02:43 to 2019-06-25 21:01:26 UTC [more...]

[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
 2019-06-25 21:01 UTC  (33+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 02/12] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH v4 03/12] selftests: x86/sgx: Mark the enclave loader as not needing an exec stack
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 06/12] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX
` [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 11/12] security/apparmor: "
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG

[PATCH 1/1] libsepol: include module.c internal header in module_to_cil.c
 2019-06-25 16:00 UTC  (2+ messages)

[PATCH v3 00/24] LSM: Module stacking for AppArmor
 2019-06-25 15:30 UTC  (81+ messages)
` [PATCH v3 01/24] LSM: Infrastructure management of the superblock
` [PATCH v3 02/24] LSM: Infrastructure management of the sock security
` [PATCH v3 03/24] LSM: Infrastructure management of the key blob
` [PATCH v3 04/24] LSM: Create and manage the lsmblob data structure
` [PATCH v3 05/24] Use lsmblob in security_audit_rule_match
` [PATCH v3 06/24] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v3 07/24] net: Prepare UDS for secuirty module stacking
` [PATCH v3 08/24] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v3 09/24] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v3 10/24] Use lsmblob in security_ipc_getsecid
` [PATCH v3 11/24] LSM: Use lsmblob in security_task_getsecid
` [PATCH v3 12/24] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v3 13/24] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v3 14/24] IMA: Change internal interfaces to use lsmblobs
` [PATCH v3 15/24] LSM: Specify which LSM to display
` [PATCH v3 16/24] LSM: Ensure the correct LSM context releaser
` [PATCH v3 17/24] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v3 18/24] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v3 19/24] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v3 20/24] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v3 21/24] Audit: Store LSM audit information in an lsmblob
` [PATCH v3 22/24] LSM: Return the lsmblob slot on initialization
` [PATCH v3 23/24] NET: Store LSM netlabel data in a lsmblob
` [PATCH v3 24/24] AppArmor: Remove the exclusive flag

[PATCH userspace v4 0/4] Remove redundant rules when building policydb
 2019-06-25 15:01 UTC  (3+ messages)
` [Non-DoD Source] "

[PATCH V3 0/2] selinux: Remove legacy local boolean and user code
 2019-06-24 18:02 UTC  (2+ messages)
` [PATCH V3 1/2] "

[PATCH V2 1/2] selinux: Remove legacy local boolean and user code
 2019-06-23 19:46 UTC  (2+ messages)

[RFC PATCH v3 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
 2019-06-23 17:16 UTC 

[PATCH] selinux-testsuite: fix old python shebang in tests/overlay/access
 2019-06-23 17:01 UTC  (5+ messages)

[PATCH v2 00/25] LSM: Module stacking for AppArmor
 2019-06-22 14:15 UTC  (53+ messages)
` [PATCH v2 01/25] LSM: Infrastructure management of the superblock
` [PATCH v2 02/25] LSM: Infrastructure management of the sock security
` [PATCH v2 03/25] LSM: Infrastructure management of the key blob
` [PATCH v2 04/25] LSM: Create and manage the lsmblob data structure
` [PATCH v2 05/25] Use lsmblob in security_audit_rule_match
` [PATCH v2 06/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v2 07/25] net: Prepare UDS for secuirty module stacking
` [PATCH v2 08/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v2 09/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v2 10/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v2 11/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v2 12/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v2 13/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v2 14/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v2 15/25] LSM: Specify which LSM to display
` [PATCH v2 16/25] LSM: Ensure the correct LSM context releaser
` [PATCH v2 17/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v2 18/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v2 19/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v2 20/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v2 21/25] Audit: Store LSM audit information in an lsmblob
` [PATCH v2 22/25] LSM: Return the lsmblob slot on initialization
` [PATCH v2 23/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v2 24/25] Fix slotted list and getpeersec_d
` [PATCH v2 25/25] AppArmor: Remove the exclusive flag
    ` Stacked LSMs (was Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor)

[PATCH V2 2/2] selinux: Update manpages after removing legacy boolean and user code
 2019-06-21 15:40 UTC 

[RFC PATCH 1/1] selinux: Remove legacy local boolean and user code
 2019-06-19 18:08 UTC  (3+ messages)

[PATCH] libsepol/cil: fix mlsconstrain segfault
 2019-06-19 16:04 UTC  (3+ messages)

[PATCH 2/2] libsepol: Replace constant with sizeof()
 2019-06-19 16:04 UTC  (3+ messages)

[PATCH 00/11] libsemanage: add tests
 2019-06-19 16:04 UTC  (3+ messages)

[PATCH 3/3] libsepol: remove unneeded int
 2019-06-19 16:04 UTC  (3+ messages)

[PATCH] Restorecon: factor out a lookup helper for context matches
 2019-06-19 14:44 UTC  (2+ messages)

[RFC PATCH v1 0/3] security/x86/sgx: SGX specific LSM hooks
 2019-06-18 15:40 UTC  (11+ messages)
` [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux

[PATCH ghak57 V1] selinux: format all invalid context as untrusted
 2019-06-17 22:15 UTC  (4+ messages)

[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
 2019-06-17 16:38 UTC  (3+ messages)
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation

[PATCH] libsepol: check strdup() failures and replace constant
 2019-06-17 12:06 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).