messages from 2019-06-29 21:35:30 to 2019-07-18 16:39:37 UTC [more...]
[RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
2019-07-18 16:39 UTC (3+ messages)
[PATCH 1/3] Add documentation key in systemd .service files
2019-07-18 14:52 UTC (6+ messages)
` [PATCH 2/3] mcstrans: Move setrans.conf manpage to section 5
` [PATCH 3/3] mcstrans: Add reference to setools.conf man page in the daemon one
[RFC] libselinux: Use Python distutils to install SELinux python bindings
2019-07-17 11:10 UTC (4+ messages)
` [PATCH] "
[RFC PATCH] security,capability: pass object information to security_capable
2019-07-16 15:08 UTC (18+ messages)
` [RFC PATCH] security, capability: "
[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
2019-07-15 22:23 UTC (129+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v2 1/3] x86/sgx: Add "
` [RFC PATCH v3 0/4] security/x86/sgx: "
` [RFC PATCH v3 1/4] x86/sgx: Add "
` [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
` [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
` [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
[PATCH AUTOSEL 5.2 097/249] selinux: fix empty write to keycreate file
2019-07-15 13:44 UTC
[PATCH AUTOSEL 5.1 085/219] selinux: fix empty write to keycreate file
2019-07-15 14:01 UTC
[PATCH AUTOSEL 4.19 064/158] selinux: fix empty write to keycreate file
2019-07-15 14:16 UTC
[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
2019-07-12 3:29 UTC (12+ messages)
` [Non-DoD Source] "
[PATCH] selinux-testsuite: add tests for fsnotify
2019-07-10 13:50 UTC (2+ messages)
[PATCH v5 00/23] LSM: Module stacking for AppArmor
2019-07-09 21:34 UTC (31+ messages)
` [PATCH v5 01/23] LSM: Infrastructure management of the superblock
` [PATCH v5 02/23] LSM: Infrastructure management of the sock security
` [PATCH v5 03/23] LSM: Infrastructure management of the key blob
` [PATCH v5 04/23] LSM: Create and manage the lsmblob data structure
` [PATCH v5 05/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v5 06/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v5 07/23] net: Prepare UDS for secuirty module stacking
` [PATCH v5 08/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v5 09/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v5 10/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v5 11/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v5 12/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v5 13/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v5 14/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v5 15/23] LSM: Specify which LSM to display
` [PATCH v5 16/23] LSM: Ensure the correct LSM context releaser
` [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v5 18/23] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v5 20/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v5 21/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v5 22/23] AppArmor: Remove the exclusive flag
` [PATCH v5 23/23] SELinux: Verify LSM display sanity in binder
RFC: BUG: overlayfs getxattr recursion leaves a poison sid
2019-07-09 16:41 UTC (3+ messages)
[GIT PULL] SELinux patches for v5.3
2019-07-09 3:15 UTC (2+ messages)
[PATCH V2] libselinux: Fix security_get_boolean_names build error
2019-07-08 13:37 UTC
[PATCH] libselinux: Fix security_get_boolean_names build error
2019-07-07 21:02 UTC (2+ messages)
[PATCH V3 0/2] Update restorecon to support new digest scheme
2019-07-04 18:57 UTC
[PATCH] libselinux: Fix security_get_boolean_names build error
2019-07-07 17:24 UTC (2+ messages)
[PATCH V4 0/2] Update restorecon to support new digest scheme
2019-07-06 15:21 UTC (3+ messages)
` [PATCH 1/2] libselinux: Save digest of all partial matches for directory
` [PATCH V4 2/2] setfiles: Update utilities for the new digest scheme
[PATCH V3 1/2] libselinux: Save digest of all partial matches for directory
2019-07-06 10:20 UTC (3+ messages)
` [PATCH V3 2/2] setfiles: Update utilities for the new digest scheme
[PATCH V3 2/2] setfiles: Update utilities for the new digest scheme
2019-07-05 12:12 UTC
[PATCH V3 0/2] Update restorecon to support new digest scheme
2019-07-05 7:21 UTC
[PATCH 1/2] Revert "mcstransd select correct colour range."
2019-07-02 12:09 UTC (2+ messages)
` [PATCH 2/2] Fix mcstrans secolor examples
[PATCH v4 00/23] LSM: Module stacking for AppArmor
2019-07-02 1:20 UTC (7+ messages)
` [PATCH v4 15/23] LSM: Specify which LSM to display
` Fwd: "
[PATCH ghak57 V2] selinux: format all invalid context as untrusted
2019-07-01 20:40 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).