Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
context of socket passed between processes,
Ted Toth
[PATCH] Update translations,
Vit Mojzis
[v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls,
Paul Moore
[PATCH testsuite] tests/Makefile: add missing condition for userfaultfd test,
Ondrej Mosnacek
[PATCH 0/2] fs: fix capable() call in simple_xattr_list(),
Ondrej Mosnacek
[PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing,
David Howells
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Christian Brauner
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Jeff Layton
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
- <Possible follow-ups>
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
[PATCH v2] tests/secretmem: add test,
Christian Göttsche
[PATCH] tests/secretmem: add test, Christian Göttsche
[PATCH] libselinux: support objname in compute_create,
Christian Göttsche
[PATCH] selinux: declare read-only parameters const,
Christian Göttsche
[PATCH] selinux: use int arrays for boolean values,
Christian Göttsche
[RFC PATCH 2/2] fs/xattr: wire up syscalls,
Christian Göttsche
[PATCH linux-next] selinux: remove redundant variables rc,
cgel . zte
[PATCH linux-next] selinux: Remove the unneeded result variable,
cgel . zte
[GIT PULL] LSM fixes for v6.0 (#1),
Paul Moore
[PATCH] checkpolicy: avoid passing NULL pointer to memset(),
Juraj Marcin
[PATCH 3/3] secilc/docs: disable pandoc default css for html docs,
bauen1
[PATCH 2/3] secilc/docs: fix syntax highlighting,
bauen1
[PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier,
bauen1
[PATCH testsuite] tests: remove more stray flag/temporary files with 'make clean',
Ondrej Mosnacek
[PATCH] libsepol: fix missing double quotes in typetransition CIL rule,
Juraj Marcin
Fwd: [systemd-devel] socket activation selinux context on create,
Ted Toth
[PATCH] tests/filesystem/xfs: use a 300M xfs filesystem image,
Paul Moore
[PATCH testsuite 0/2] Prepare userfaultfd policy for Fedora policy changes,
Ondrej Mosnacek
[PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing,
David Howells
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Christian Brauner
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Al Viro
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Anna Schumaker
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
[PATCH 0/3] LSM hooks for IORING_OP_URING_CMD,
Paul Moore
Re: SELinux testsuite on 6.0-rc2 binder BUG,
Paul Moore
[PATCH v1] selinux/ss/services.c: check the return value of audit_log_start() in security_sid_mls_copy(),
lily
[PATCH] selinux: Variable type completion, Xin Gao
[syzbot] KASAN: use-after-free Read in sock_has_perm,
syzbot
[selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean',
Paul Moore
[PATCH v5 0/4] Introduce security_create_user_ns(),
Frederick Lawler
[BUG] (fsuse xattr "fuse" mycontext) causes deadlock for mount/sync syscall, bauen1
[PATCH] tests/sctp: reenable the SCTP ASCONF tests, Paul Moore
[PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors,
Paul Moore
[PATCH] selinux: SCTP fixes, including ASCONF,
Paul Moore
[PATCH 1/4] ci: bump versions in GitHub Actions,
Christian Göttsche
[PATCH 1/2] checkpolicy: use strict function prototype for definitions,
Christian Göttsche
[PATCH] libselinux/utils: install into bin PATH,
Christian Göttsche
[PATCH] libselinux: avoid newline in avc message,
Christian Göttsche
[PATCH] selinux: add a new warn_on_audited debug flag to selinuxfs,
Ondrej Mosnacek
Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules,
Guozihua (Scott)
[PATCH AUTOSEL 4.9 8/8] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 4.14 12/12] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.4 23/23] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 4.19 16/16] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.15 42/45] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.10 29/29] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.15 43/45] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.18 51/53] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.18 50/53] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.19 53/58] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.19 54/58] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
[PATCH v2] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
[PATCH] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
LSM stacking in next for 6.1?,
Casey Schaufler
[GIT PULL] SELinux patches for v6.0,
Paul Moore
[PATCH v4 0/4] Introduce security_create_user_ns(),
Frederick Lawler
Adjust sepolgen grammar to support allowxperm, et. al.,
chris . lindee
KVM / virtual networking access control,
Karl MacMillan
[PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t,
Ondrej Mosnacek
- [PATCH testsuite 01/24] keys: change test_newcon_key_t to be just an object context, Ondrej Mosnacek
- [PATCH testsuite 02/24] test_global.te: remove unused role require, Ondrej Mosnacek
- [PATCH testsuite 03/24] test_global.te: don't add domains to system_r, Ondrej Mosnacek
- [PATCH testsuite 06/24] test_policy.if: remove weird rule from testsuite_domain_type_minimal(), Ondrej Mosnacek
- [PATCH testsuite 07/24] policy: move unconfined_t-related dontaudit rule to where it fits better, Ondrej Mosnacek
- [PATCH testsuite 09/24] policy: move miscfiles_domain_entry_test_files() to general policy, Ondrej Mosnacek
- [PATCH testsuite 08/24] policy: move userdom_sysadm_entry_spec_domtrans_to() to general policy, Ondrej Mosnacek
- [PATCH testsuite 11/24] test_general.te: move sysadm-related rules into an optional block, Ondrej Mosnacek
- [PATCH testsuite 12/24] test_filesystem.te: remove redundant dontaudit rules, Ondrej Mosnacek
- [PATCH testsuite 13/24] test_filesystem.te: remove suspicious rules, Ondrej Mosnacek
- [PATCH testsuite 14/24] tests/nnp_nosuid: avoid hardcoding unconfined_t in the policy, Ondrej Mosnacek
- [PATCH testsuite 10/24] policy: substitute userdom_sysadm_entry_spec_domtrans_to(), Ondrej Mosnacek
- [PATCH testsuite 15/24] tests/*filesystem: remove weird uses of unconfined_t, Ondrej Mosnacek
- [PATCH testsuite 17/24] test_general.te: generalize the dontaudit rule, Ondrej Mosnacek
- [PATCH testsuite 18/24] policy: don't audit testsuite programs searching the caller's keys, Ondrej Mosnacek
- [PATCH testsuite 16/24] policy: remove last hardcoded references to unconfined_t, Ondrej Mosnacek
- [PATCH testsuite 19/24] ci: check for unconfined_t AVCs, Ondrej Mosnacek
- [PATCH testsuite 22/24] policy: give sysadm_t perms needed to run quotacheck(8), Ondrej Mosnacek
- [PATCH testsuite 23/24] tests/vsock_socket: use modprobe to check vsock availability, Ondrej Mosnacek
- [PATCH testsuite 24/24] ci: add sysadm_t to the test matrix, Ondrej Mosnacek
- [PATCH testsuite 21/24] tests/overlay: don't hard-code SELinux user of the caller, Ondrej Mosnacek
- [PATCH testsuite 20/24] tests/binder: check only the type part of the context, Ondrej Mosnacek
- Re: [PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t, Ondrej Mosnacek
[PATCH v3 0/4] Introduce security_create_user_ns(),
Frederick Lawler
[PATCH v2 1/5] libsepol: rename validate_policydb to policydb_validate,
Christian Göttsche
[PATCH v3 1/8] libsepol: refactor ebitmap conversion in link.c,
Christian Göttsche
[PATCH v2 1/7] libsepol/tests: add ebitmap tests,
Christian Göttsche
[PATCH] tests/sctp: remove assumptions in the SCTP tests,
Paul Moore
[PATCH testsuite] tests/module_load: detect the linker to use for module build,
Ondrej Mosnacek
[PATCH 1/5] libsepol: rename validate_policydb to policydb_validate,
Christian Göttsche
[PATCH 1/3] libsepol: break circular include,
Christian Göttsche
[PATCH 1/7] libsepol/tests: add ebitmap tests,
Christian Göttsche
[RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY,
Ondrej Mosnacek
[PATCH v2 0/4] Introduce security_create_user_ns(),
Frederick Lawler
Re: [PATCH v2 0/4] Introduce security_create_user_ns(), Christian Göttsche
[PATCH] libselinux: set errno to EBADF on O_PATH emulation failure,
Christian Göttsche
What is "fscon" statement in a base policy?,
Nicolas Iooss
[PATCH] libsepol: do not modify policy during write,
Christian Göttsche
[syzbot] KASAN: use-after-free Read in selinux_socket_recvmsg,
syzbot
[PATCH] libsepol/utils: improve wording,
Christian Göttsche
[PATCH userspace 1/1] CircleCI: do not add Debian-specific parameter when invoking setup.py,
Nicolas Iooss
[PATCH userspace 1/1] libsepol: initialize s in constraint_expr_eval_reason,
Nicolas Iooss
[PATCH testsuite 0/2] Make the keys test pass in FIPS mode,
Ondrej Mosnacek
[PATCH v37 00/33] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v37 01/33] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v37 02/33] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v37 05/33] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v37 04/33] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v37 03/33] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v37 06/33] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v37 07/33] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v37 08/33] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v37 09/33] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v37 10/33] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v37 14/33] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v37 16/33] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v37 17/33] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v37 20/33] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v37 18/33] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v37 19/33] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v37 22/33] LSM: security_secid_to_secctx module selection, Casey Schaufler
- [PATCH v37 23/33] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v37 21/33] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v37 24/33] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v37 25/33] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v37 26/33] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v37 29/33] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v37 27/33] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v37 28/33] audit: multiple subject lsm values for netlabel, Casey Schaufler
- [PATCH v37 31/33] LSM: Removed scaffolding function lsmcontext_init, Casey Schaufler
- [PATCH v37 30/33] netlabel: Use a struct lsmblob in audit data, Casey Schaufler
- [PATCH v37 32/33] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v37 33/33] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH v37 00/33] LSM: Module stacking for AppArmor, John Johansen
[PATCH] gettext: handle unsupported languages properly,
Vit Mojzis
[PATCH -next] selinux: Cleanup the enum SEL_COMPAT_NET,
Xiu Jianfeng
[PATCH RESEND -next] selinux: Let the caller free the momory in *mnt_opts on error,
Xiu Jianfeng
[GIT PULL] SELinux fixes for v5.19 (#1),
Paul Moore
PHP-FPM restriction bug, Father Vlasie
[RFC PATCH 1/4] libsepol: refactor ebitmap conversion in link.c,
Christian Göttsche
[PATCH -next] selinux: Let the caller free the momory in *mnt_opts on error,
Xiu Jianfeng
[PATCH] python: remove IOError in certain cases,
Elijah Conners
hack, Mikhail
[PATCH] selinux: free contexts previously transferred in selinux_add_opt(),
Christian Göttsche
[PATCH -next] selinux: Fix memleak in security_read_policy,
Xiu Jianfeng
[PATCH 1/4] support Dash as default shell,
Christian Göttsche
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]