selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-21 18:53:33 to 2019-06-30 12:00:13 UTC [more...]

[RFC] libselinux: Use Python distutils to install SELinux python bindings
 2019-06-30 11:54 UTC  (2+ messages)

[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
 2019-06-29 23:46 UTC  (41+ messages)
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX
` [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v2 1/3] x86/sgx: Add "
` [RFC PATCH v2 2/3] x86/sgx: Call LSM hooks from SGX subsystem/module
` [RFC PATCH v2 3/3] x86/sgx: Implement SGX specific hooks in SELinux

[PATCH v4 00/23] LSM: Module stacking for AppArmor
 2019-06-29 19:45 UTC  (94+ messages)
` [PATCH v4 01/23] LSM: Infrastructure management of the superblock
` [PATCH v4 02/23] LSM: Infrastructure management of the sock security
` [PATCH v4 03/23] LSM: Infrastructure management of the key blob
` [PATCH v4 04/23] LSM: Create and manage the lsmblob data structure
` [PATCH v4 05/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v4 06/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v4 07/23] net: Prepare UDS for secuirty module stacking
` [PATCH v4 08/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v4 09/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v4 10/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v4 11/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v4 12/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v4 13/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v4 14/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v4 15/23] LSM: Specify which LSM to display
        ` Fwd: "
` [PATCH v4 16/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v4 17/23] "
` [PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v4 19/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v4 20/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v4 21/23] Audit: Store LSM audit information in an lsmblob
` [PATCH v4 22/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v4 23/23] AppArmor: Remove the exclusive flag

[PATCH V2 1/2] libselinux: Save digest of all partial matches for directory
 2019-06-29 17:20 UTC  (2+ messages)

[PATCH ghak57 V2] selinux: format all invalid context as untrusted
 2019-06-27 16:48 UTC 

[RFC PATCH v3 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
 2019-06-26 20:39 UTC  (2+ messages)

[PATCH 1/1] libsepol: include module.c internal header in module_to_cil.c
 2019-06-26  6:54 UTC  (3+ messages)

[PATCH v3 00/24] LSM: Module stacking for AppArmor
 2019-06-25 15:30 UTC  (81+ messages)
` [PATCH v3 01/24] LSM: Infrastructure management of the superblock
` [PATCH v3 02/24] LSM: Infrastructure management of the sock security
` [PATCH v3 03/24] LSM: Infrastructure management of the key blob
` [PATCH v3 04/24] LSM: Create and manage the lsmblob data structure
` [PATCH v3 05/24] Use lsmblob in security_audit_rule_match
` [PATCH v3 06/24] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v3 07/24] net: Prepare UDS for secuirty module stacking
` [PATCH v3 08/24] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v3 09/24] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v3 10/24] Use lsmblob in security_ipc_getsecid
` [PATCH v3 11/24] LSM: Use lsmblob in security_task_getsecid
` [PATCH v3 12/24] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v3 13/24] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v3 14/24] IMA: Change internal interfaces to use lsmblobs
` [PATCH v3 15/24] LSM: Specify which LSM to display
` [PATCH v3 16/24] LSM: Ensure the correct LSM context releaser
` [PATCH v3 17/24] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v3 18/24] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v3 19/24] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v3 20/24] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v3 21/24] Audit: Store LSM audit information in an lsmblob
` [PATCH v3 22/24] LSM: Return the lsmblob slot on initialization
` [PATCH v3 23/24] NET: Store LSM netlabel data in a lsmblob
` [PATCH v3 24/24] AppArmor: Remove the exclusive flag

[PATCH userspace v4 0/4] Remove redundant rules when building policydb
 2019-06-25 15:01 UTC  (3+ messages)
` [Non-DoD Source] "

[PATCH V3 0/2] selinux: Remove legacy local boolean and user code
 2019-06-24 18:02 UTC  (2+ messages)
` [PATCH V3 1/2] "

[PATCH V2 1/2] selinux: Remove legacy local boolean and user code
 2019-06-23 19:46 UTC  (2+ messages)

[PATCH] selinux-testsuite: fix old python shebang in tests/overlay/access
 2019-06-23 17:01 UTC  (5+ messages)

Stacked LSMs (was Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor)
 2019-06-22 14:15 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).