Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [RFC PATCH 0/6] fs, lsm: mediate O_PATH fd creation in file_open hook,
Ryan Lee
- [PATCH] selinux: get netlabel_wildcard policycap from policy instead of cache,
Christian Göttsche
- [PATCH v2] selinux: support wildcard match in genfscon,
Takaya Saeki
- [PATCH v7 bpf-next 0/2] security: Propagate caller information in bpf hooks,
Blaise Boscaccy
- [PATCH] mailmap: map my old email addresses,
Stephen Smalley
- SeLinux, Heal thyself.,
Darvond
- [PATCH v6 bpf-next 0/2] security: Propagate caller information in bpf hooks,
Blaise Boscaccy
- [syzbot] [selinux?] KCSAN: data-race in selinux_socket_post_create / selinux_socket_sock_rcv_skb,
syzbot
- [PATCH v5 bpf-next 0/2] security: Propagate caller information in bpf hooks,
Blaise Boscaccy
- [PATCH v2 0/6] Audit: Records for multiple security contexts,
Casey Schaufler
- [PATCH] selinux: Chain up tool resolving errors in install_policy.sh,
Tim Schumacher
- ANN: SELinux userspace 3.8.1, Petr Lautrbach
- [RFC PATCH 0/2] mm: introduce anon_vma flags, reduce kernel allocs,
Lorenzo Stoakes
- [PATCH v4 bpf-next 0/2] security: Propagate caller information in bpf hooks,
Blaise Boscaccy
- [PATCH 0/1 v3] security: Propagate caller information in bpf hooks,
Blaise Boscaccy
- [PATCH v16 0/3] binder: report txn errors via generic netlink,
Li Li
- [PATCH v16 3/3] binder: generic netlink binder_features flag, Li Li
[PATCH] selinux: support wildcard network interface names,
Christian Göttsche
[PATCH 0/1] v2 security: Propagate caller information in bpf hooks,
Blaise Boscaccy
Userspace: 3.8.1 release next week?,
Petr Lautrbach
[PATCH] Don't inject matchpathcon_filespec_add64() ifdef __x86_64__, наб
[PATCH] Insert -I../../libselinux/include and -L../../libselinux/src into subprograms where needed, наб
[PATCH v15 0/3] binder: report txn errors via generic netlink,
Li Li
[PATCH 2/2] mcstrans: make use of context_to_str(3),
Christian Göttsche
[PATCH 2/2] setfiles: add option to modify user and role portions,
Christian Göttsche
[PATCH 0/1] security: Propagate universal pointer data in bpf hooks,
Blaise Boscaccy
[PATCH 2/3] checkpolicy: abort on mismatched declarations,
Christian Göttsche
[PATCH] libsemanage: improve performance of semanage store rebuild,
Petr Lautrbach
[PATCH] selinux: add FILE__WATCH_MOUNTNS,
Miklos Szeredi
[PATCH] checkpolicy: rework cleanup in define_te_avtab_xperms_helper(), Christian Göttsche
[PATCH] libsemanage: define basename macro for non-glibc systems,
Rahul Sandhu
nfsd 6.14-rc1 __fh_verify NULL ptr deref,
Stephen Smalley
ANN: Reference Policy 2.20250213, Chris PeBenito
[PATCH] libselinux: warn on identical duplicate properties,
Thiébaud Weksteen
[PATCH] Switch from bison name-prefix to api.prefix,
Daniel Burgener
[PATCH v3] Support static-only builds,
Alyssa Ross
[PATCH v2] selinux: add permission checks for loading other kinds of kernel files,
kippndavis . work
A duo of annoying SEalert checks., Darvond
[PATCH] selinux: always check the file label in selinux_kernel_read_file(),
Paul Moore
[PATCH testsuite] policy,tests: add tests for new permissions for loading files/data,
kippndavis . work
[PATCH] selinux: add permission checks for loading other kinds of kernel files,
kippndavis . work
[PATCH 1/4] libselinux: constify global strings,
Christian Göttsche
[PATCH testsuite] tests/inet_socket: enable MPTCP if it's disabled via sysctl,
Ondrej Mosnacek
ANN: SELinux userspace 3.8, Petr Lautrbach
[PATCH v5 0/3] mount notification,
Miklos Szeredi
ls from coreutils 9.6 doesn't show labels of some files,
Ondrej Mosnacek
[PATCH v3 1/2] io_uring: refactor io_uring_allowed(),
Hamza Mahfooz
Possible mistake in commit 3ca459eaba1b ("tun: fix group permission check"),
Ondrej Mosnacek
Re: [PATCH v4 2/4] fanotify: notify on mount attach and detach,
Paul Moore
[PATCH] selinux: fix spelling error,
Tanya Agarwal
3.8 postponed to the next week, Petr Lautrbach
[RFC PATCH 0/2] Possible solution to possible regression,
James Carter
[GIT PULL] selinux/selinux-pr-20250121,
Paul Moore
Possible regression by commit d96f27bf7cb9 ("libsemanage: Preserve file context and ownership in policy store"), Petr Lautrbach
[PATCH] selinux: Handle NULL return from selinux_inode in inode_security_rcu,
Ingyu Jang
[PATCH userspace] README: fix broken testsuite run status badge,
Ondrej Mosnacek
[PATCH v2] libselinux: limit node depth while parsing compiled fcontexts,
Christian Göttsche
ANN: SELinux userspace 3.8-rc4 release, Petr Lautrbach
[PATCH 2/5] checkpolicy: check identifier before copying,
Christian Göttsche
[PATCH v2] semanage: improve -e documentation and fix delete operation, Christian Göttsche
[PATCH] CONTRIBUTING.md: Drop dependency and build instructions,
Daniel Burgener
[PATCH] libselinux: limit node depth while parsing compiled fcontexts,
Christian Göttsche
[PATCH] selinux: map RTM_DELNSID to nlmsg_write,
Thiébaud Weksteen
3.8-rc4 or 3.8 release next week,
Petr Lautrbach
[PATCH 2/2] libselinux/fuzz: handle inputs with trailing data,
Christian Göttsche
selinux: error: ‘NETLINK_ROUTE_SOCKET__NLMSG’ undeclared,
Sebastian Andrzej Siewior
[GIT PULL] selinux/selinux-pr-20250107,
Paul Moore
[RFC PATCH v2 01/17] Fix typos,
Christian Göttsche
- [RFC PATCH v2 09/17] tests/extended_socket_class: work with CONFIG_CRYPTO_USER_API disabled, Christian Göttsche
- [RFC PATCH v2 15/17] tests: test code tweaks, Christian Göttsche
- [RFC PATCH v2 07/17] test: overlayfs related tweaks, Christian Göttsche
- [RFC PATCH v2 06/17] Makefile: add PHONY targets, Christian Göttsche
- [RFC PATCH v2 10/17] tests/tun_tap: skip if not supported, Christian Göttsche
- [RFC PATCH v2 11/17] tests/inet_socket: skip mptcp if not supported, Christian Göttsche
- [RFC PATCH v2 08/17] tests/notify: work with CONFIG_FANOTIFY disabled, Christian Göttsche
- [RFC PATCH v2 12/17] tests/filesystem: improve fsnotify check and preload loop module, Christian Göttsche
- [RFC PATCH v2 13/17] defconfig: enable CONFIG_XFRM_USER, Christian Göttsche
- [RFC PATCH v2 16/17] tests: fail on compiler warnings and enable Wextra, Christian Göttsche
- [RFC PATCH v2 14/17] defconfig: enable CONFIG_NETFILTER_NETLINK_LOG, Christian Göttsche
- [RFC PATCH v2 17/17] tests: drop headers from Makefile dependencies, Christian Göttsche
- [RFC PATCH v2 00/17] testsuite: misc fixes and virtme-ng support, Christian Göttsche
- [RFC PATCH v2 03/17] tools: quote command to prevent word splitting, Christian Göttsche
- [RFC PATCH v2 05/17] tests: enable strictness for perl scripts, Christian Göttsche
- [RFC PATCH v2 04/17] tests: port scripts to sh and please shellcheck, Christian Göttsche
- [RFC PATCH v2 02/17] Makefile: use $(MAKE) to pass options, Christian Göttsche
[PATCH userspace 0/4] ci: fix and migrate the testsuite part to Testing Farm,
Ondrej Mosnacek
[no subject], Unknown
[RFC PATCH 00/44] SELinux namespace support,
Stephen Smalley
- [RFC PATCH 05/44] netstate,selinux: create the selinux netlink socket per network namespace, Stephen Smalley
- [RFC PATCH 04/44] selinux: dynamically allocate selinux namespace, Stephen Smalley
- [RFC PATCH 03/44] selinux: support multiple selinuxfs instances, Stephen Smalley
- [RFC PATCH 06/44] selinux: support per-task/cred selinux namespace, Stephen Smalley
- [RFC PATCH 08/44] selinux: add a selinuxfs interface to unshare selinux namespace, Stephen Smalley
- [RFC PATCH 02/44] selinux: introduce current_selinux_state, Stephen Smalley
- [RFC PATCH 09/44] selinuxfs: restrict write operations to the same selinux namespace, Stephen Smalley
- [RFC PATCH 07/44] selinux: introduce cred_selinux_state() and use it, Stephen Smalley
- [RFC PATCH 01/44] selinux: restore passing of selinux_state, Stephen Smalley
- [RFC PATCH 14/44] selinux: introduce cred_has_extended_perms(), Stephen Smalley
- [RFC PATCH 12/44] selinux: update hook functions to use correct selinux namespace, Stephen Smalley
- [RFC PATCH 17/44] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm(), Stephen Smalley
- [RFC PATCH 15/44] selinux: introduce cred_self_has_perm(), Stephen Smalley
- [RFC PATCH 10/44] selinux: introduce a global SID table, Stephen Smalley
- [RFC PATCH 18/44] selinux: introduce task_obj_perm(), Stephen Smalley
- [RFC PATCH 13/44] selinux: introduce cred_task_has_perm(), Stephen Smalley
- [RFC PATCH 19/44] selinux: fix selinux_lsm_getattr() check, Stephen Smalley
- [RFC PATCH 20/44] selinux: update bprm hooks for selinux namespaces, Stephen Smalley
- [RFC PATCH 16/44] selinux: introduce cred_has_perm(), Stephen Smalley
- [RFC PATCH 11/44] selinux: wrap security server interfaces to use the global SID table, Stephen Smalley
- [RFC PATCH 22/44] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper, Stephen Smalley
- [RFC PATCH 21/44] selinux: add kerneldoc to new permission checking functions, Stephen Smalley
- [RFC PATCH 26/44] selinux: annotate selinuxfs permission checks, Stephen Smalley
- [RFC PATCH 24/44] selinux: convert additional checks to cred_ssid_has_perm(), Stephen Smalley
- [RFC PATCH 23/44] selinux: rename cred_has_perm*() to cred_tsid_has_perm*(), Stephen Smalley
- [RFC PATCH 27/44] selinux: annotate process transition permission checks, Stephen Smalley
- [RFC PATCH 29/44] selinux: switch selinux_lsm_setattr() checks to current namespace, Stephen Smalley
- [RFC PATCH 31/44] selinux: fix namespace creation, Stephen Smalley
- [RFC PATCH 28/44] selinux: convert xfrm and netlabel permission checks, Stephen Smalley
- [RFC PATCH 25/44] selinux: introduce selinux_state_has_perm(), Stephen Smalley
- [RFC PATCH 30/44] selinux: add limits for SELinux namespaces, Stephen Smalley
- [RFC PATCH 32/44] selinux: limit selinux netlink notifications to init namespace, Stephen Smalley
- [RFC PATCH 33/44] selinux: refactor selinux_state_create(), Stephen Smalley
- [RFC PATCH 37/44] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces, Stephen Smalley
- [RFC PATCH 36/44] selinux: set initial SID context for init to "kernel" in global SID table, Stephen Smalley
- [RFC PATCH 38/44] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware, Stephen Smalley
- [RFC PATCH 34/44] selinux: make open_perms namespace-aware, Stephen Smalley
- [RFC PATCH 35/44] selinux: split cred_ssid_has_perm() into two cases, Stephen Smalley
- [RFC PATCH 39/44] selinux: defer inode init on current selinux state, Stephen Smalley
- [RFC PATCH 41/44] selinux: allow userspace to detect non-init SELinux namespace, Stephen Smalley
- [RFC PATCH 40/44] selinux: init inode from nearest initialized namespace, Stephen Smalley
- [RFC PATCH 42/44] selinux: exempt creation of init SELinux namespace from limits, Stephen Smalley
- [RFC PATCH 43/44] selinux: introduce a Kconfig option for SELinux namespaces, Stephen Smalley
- [RFC PATCH 44/44] selinux: fix inode initialization when no namespace is initialized, Stephen Smalley
- Re: [RFC PATCH 00/44] SELinux namespace support, Stephen Smalley
[PATCH 2/2] python: fix typos,
Christian Göttsche
[PATCH] libselinux: avoid quadratic complexity for many regex specs validation,
Christian Göttsche
[PATCH] semanage: improve -e documentation and fix delete operation,
Christian Göttsche
[PATCH] libselinux: update max node depth,
Christian Göttsche
[PATCH linux-next 0/2] Fix perf security check problem,
Luo Gengkun
[PATCH v2] selinux: match extended permissions to their base permissions,
Thiébaud Weksteen
[PATCH 1/2] lsm: add LSM hooks for io_uring_setup(), Hamza Mahfooz
[PATCH] lsm,io_uring: add LSM hooks for io_uring_setup(),
Hamza Mahfooz
selinux@xxxxxxxxxxxxxxx CDIF Comprobante 15:02, pago214
ANN: SELinux userspace 3.8-rc3 release, Petr Lautrbach
[GIT PULL] selinux/selinux-pr-20241217,
Paul Moore
[PATCH 0/6] Audit: Records for multiple security contexts,
Casey Schaufler
[PATCH] libselinux/fuzz: readjust load_mmap() update,
Christian Göttsche
Re: kernel-secnext aarch64 builds missing?,
Paul Moore
[RFC PATCH 2/3] checkpolicy: add support for wildcard netifcon names,
Christian Göttsche
[RFC PATCH] selinux: support wildcard network interface names,
Christian Göttsche
[syzbot] [selinux?] [mm?] [overlayfs?] INFO: rcu detected stall in sys_mkdirat (2), syzbot
[RFC PATCH v2 01/22] selinux: supply missing field initializers,
Christian Göttsche
- [RFC PATCH v2 04/22] selinux: rework match_ipv6_addrmask(), Christian Göttsche
- [RFC PATCH v2 02/22] selinux: avoid using types indicating user space interaction, Christian Göttsche
- [RFC PATCH v2 05/22] selinux: avoid nontransitive comparison, Christian Göttsche
- [RFC PATCH v2 03/22] selinux: align and constify functions, Christian Göttsche
- [RFC PATCH v2 06/22] selinux: rename comparison functions for clarity, Christian Göttsche
- [RFC PATCH v2 07/22] selinux: use known type instead of void pointer, Christian Göttsche
- [RFC PATCH v2 08/22] selinux: avoid unnecessary indirection in struct level_datum, Christian Göttsche
- [RFC PATCH v2 10/22] selinux: use u16 for security classes, Christian Göttsche
- [RFC PATCH v2 09/22] selinux: make use of str_read(), Christian Göttsche
- [RFC PATCH v2 12/22] selinux: check length fields in policies, Christian Göttsche
- [RFC PATCH v2 13/22] selinux: validate constraints, Christian Göttsche
- [RFC PATCH v2 11/22] selinux: more strict policy parsing, Christian Göttsche
- [RFC PATCH v2 14/22] selinux: pre-validate conditional expressions, Christian Göttsche
- [RFC PATCH v2 16/22] selinux: check type attr map overflows, Christian Göttsche
- [RFC PATCH v2 15/22] selinux: introduce ebitmap_highest_set_bit(), Christian Göttsche
- [RFC PATCH v2 17/22] selinux: reorder policydb_index(), Christian Göttsche
- [RFC PATCH v2 19/22] selinux: validate symbols, Christian Göttsche
- [RFC PATCH v2 18/22] selinux: beef up isvalid checks, Christian Göttsche
- [RFC PATCH v2 21/22] selinux: check for simple types, Christian Göttsche
- [RFC PATCH v2 20/22] selinux: more strict bounds check, Christian Göttsche
- [RFC PATCH v2 00/22] selinux: harden against malformed policies, Christian Göttsche
- [RFC PATCH v2 22/22] selinux: restrict policy strings, Christian Göttsche
- Re: [PATCH RFC v2 1/22] selinux: supply missing field initializers, Paul Moore
[RFC PATCH v2] libselinux: restore previous regex spec ordering,
Christian Göttsche
[PATCH] libsemanage: Mute error messages from selinux_restorecon,
Vit Mojzis
[PATCH] selinux: Read sk->sk_family once in selinux_socket_bind(),
Mikhail Ivanov
3.8-rc2 will become rc3, Petr Lautrbach
The curious case of pidfs and pidfds,
Paul Moore
[RFC PATCH] libselinux: restore previous regex spec ordering,
Christian Göttsche
[PATCH 1/9] Revert "libselinux/utils: drop reachable assert in sefcontext_compile",
James Carter
[PATCH] selinux: support wildcard match in genfscon,
Takaya Saeki
Incompatible file_contexts precedence in 3.8-rc1,
Takaya Saeki
[PATCH] selinux: KASAN; slab-out-of-bounds in avc_lookup,
Joey Jiao
[PATCH] libselinux/fuzz: update for lookup_all() change,
Christian Göttsche
[RFC] genfscon wildcard support for faster sysfs labeling,
Takaya Saeki
[PATCH] selinux: match extended permissions to their base permissions,
Thiébaud Weksteen
[PATCH v2] selinux: add netlink nlmsg_type audit message,
Thiébaud Weksteen
[PATCH v2] selinux: ignore unknown extended permissions,
Thiébaud Weksteen
Re: [PATCH v2] selinux: ignore unknown extended permissions, Paul Moore
[PATCH] libsepol: add missing word separators in error message,
Christian Göttsche
[PATCH] selinux: ignore unknown extended permissions,
Thiébaud Weksteen
Systemd socket labeling issue,
Daniel Burgener
[PATCH] libselinux/utils: drop reachable assert in sefcontext_compile, Christian Göttsche
[PATCH v2] libselinux/utils: drop reachable assert in sefcontext_compile,
Christian Göttsche
Regression in 92306daf5219 ("libselinux: rework selabel_file(5) database"),
Petr Lautrbach
[RFC PATCH] Introduce POLICYDB_VERSION_KERNEL_MAX,
Christian Göttsche
[PATCH] checkpolicy: drop host bits in IPv6 CIDR address,
Christian Göttsche
[PATCH] libsepol: avoid unnecessary memset(3) calls in hashtab,
Christian Göttsche
[PATCH] libselinux/utils: use correct error handling,
Christian Göttsche
[RFC PATCH] ioctl: add test for conditional xperms,
Christian Göttsche
ANN: SELinux userspace 3.8-rc1 release, Petr Lautrbach
[PATCH v2] selinux: add generated av_permissions.h to targets,
Thomas Weißschuh
[PATCH net] selinux: use sk_to_full_sk() in selinux_ip_output(),
Eric Dumazet
[syzbot] [selinux?] KASAN: slab-out-of-bounds Read in selinux_ip_output, syzbot
[PATCH v3 1/3] libselinux: avoid memory allocation in common file label lookup,
Christian Göttsche
[PATCH v2] bpf, lsm: Remove getlsmprop hooks BTF IDs,
Thomas Weißschuh
[PATCH v2 1/9] libsemanage: set O_CLOEXEC flag for file descriptors,
Christian Göttsche
[PATCH v2 1/3] libselinux: avoid memory allocation in common file label lookup,
Christian Göttsche
[PATCH] selinux: use native iterator types,
Christian Göttsche
[PATCH] bpf, lsm: Fix getlsmprop hooks BTF IDs,
Thomas Weißschuh
[PATCH 1/2] libselinux: avoid memory allocation in common file label lookup,
Christian Göttsche
Re: [PATCH] mm/kmemleak: Fix sleeping function called from invalid context in kmemleak_seq_show, Alessandro Carminati
[PATCH 1/2] libsepol: harden availability check against user CFLAGS,
Christian Göttsche
[PATCH v3 2/3] libselinux: avoid dynamic allocation in openattr(), Christian Göttsche
[PATCH v2 1/3] libselinux: make use of calloc(3),
Christian Göttsche
[PATCH] selinux: explicitly clean generated av_permissions.h,
Thomas Weißschuh
[PATCH 00/17] testsuite: misc fixes and virtme-ng support,
Christian Göttsche
- [PATCH 03/17] tools: quote command to prevent word splitting, Christian Göttsche
- [PATCH 04/17] tests: port scripts to sh and please shellcheck, Christian Göttsche
- [PATCH 02/17] Makefile: use $(MAKE) to pass options, Christian Göttsche
- [PATCH 06/17] Makefile: add PHONY targets, Christian Göttsche
- [PATCH 08/17] tests/notify: work with CONFIG_FANOTIFY disabled, Christian Göttsche
- [PATCH 12/17] tests/filesystem: improve fsnotify check and preload loop module, Christian Göttsche
- [PATCH 07/17] test: overlayfs related tweaks, Christian Göttsche
- [PATCH 13/17] defconfig: enable CONFIG_XFRM_USER, Christian Göttsche
- [PATCH 14/17] defconfig: enable CONFIG_NETFILTER_NETLINK_LOG, Christian Göttsche
- [PATCH 15/17] tests: test code tweaks, Christian Göttsche
- [PATCH 16/17] tests: fail on compiler warnings and enable Wextra, Christian Göttsche
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]