Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] Makefile: always include and link with DESTDIR, (continued)
- [PATCH] python/audit2allow: close file stream on error,
Christian Göttsche
- ANN: SELinux userspace 3.4 release, Petr Lautrbach
- [GIT PULL] SELinux fixes for v5.18 (#1),
Paul Moore
- [ANNOUNCE][CFP] Linux Security Summit Europe 2022, Reshetova, Elena
- [PATCH] selinux: add __randomize_layout to selinux_audit_data,
GONG, Ruiqi
- [PATCH 1/2] libselinux: restorecon: add fallback for pre 3.6 Linux,
Christian Göttsche
- [PATCH] ci: declare git repository a safe directory,
Christian Göttsche
- [PATCH] selinux: fix bad cleanup on error in hashtab_duplicate(),
Ondrej Mosnacek
- [PATCH userspace v4 0/2] Support the 'self' keyword in type transitions,
Ondrej Mosnacek
- [PATCH] libselinux: preserve errno in selinux_log(),
Christian Göttsche
- [RFC PATCH 1/4] libselinux: simplify policy path logic to avoid uninitialized read,
Christian Göttsche
- [PATCH] libselinux: free memory in error branch,
Christian Göttsche
- [PATCH userspace v3 0/2] Support the 'self' keyword in type transitions,
Ondrej Mosnacek
- [PATCH] gettext: set _ on module level instead of builtins namespace,
Vit Mojzis
- [PATCH] libselinux/utils: print errno on failure,
Christian Göttsche
- [PATCH] libselinux: update man page of setfilecon(3) family about context parameter,
Christian Göttsche
- [RFC PATCH] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon,
Christian Göttsche
- ANN: SELinux userspace 3.4-rc3 release candidate,
Petr Lautrbach
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers,
Kees Cook
- [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary, Kees Cook
- [PATCH 02/32] Introduce flexible array struct memcpy() helpers, Kees Cook
- [PATCH 07/32] iwlwifi: calib: Use mem_to_flex_dup() with struct iwl_calib_result, Kees Cook
- [PATCH 05/32] brcmfmac: Use mem_to_flex_dup() with struct brcmf_fweh_queue_item, Kees Cook
- [PATCH 23/32] Bluetooth: Use mem_to_flex_dup() with struct hci_op_configure_data_path, Kees Cook
- [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies, Kees Cook
- [PATCH 06/32] iwlwifi: calib: Prepare to use mem_to_flex_dup(), Kees Cook
- [PATCH 11/32] nl80211: Use mem_to_flex_dup() with struct cfg80211_cqm_config, Kees Cook
- [PATCH 08/32] iwlwifi: mvm: Use mem_to_flex_dup() with struct ieee80211_key_conf, Kees Cook
- [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg, Kees Cook
- [PATCH 26/32] ima: Use mem_to_flex_dup() with struct modsig, Kees Cook
- [PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy(), Kees Cook
- [PATCH 03/32] flex_array: Add Kunit tests, Kees Cook
- [PATCH 16/32] 802/mrp: Use mem_to_flex_dup() with struct mrp_attr, Kees Cook
- [PATCH 14/32] af_unix: Use mem_to_flex_dup() with struct unix_address, Kees Cook
- [PATCH 21/32] soc: qcom: apr: Use mem_to_flex_dup() with struct apr_rx_buf, Kees Cook
- [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl, Kees Cook
- [PATCH 25/32] Drivers: hv: utils: Use mem_to_flex_dup() with struct cn_msg, Kees Cook
- [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property, Kees Cook
- [PATCH 15/32] 802/garp: Use mem_to_flex_dup() with struct garp_attr, Kees Cook
- [PATCH 18/32] firewire: Use __mem_to_flex_dup() with struct iso_interrupt_event, Kees Cook
- [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data, Kees Cook
- [PATCH 17/32] net/flow_offload: Use mem_to_flex_dup() with struct flow_action_cookie, Kees Cook
- [PATCH 13/32] mac80211: Use mem_to_flex_dup() with several structs, Kees Cook
- [PATCH 09/32] p54: Use mem_to_flex_dup() with struct p54_cal_database, Kees Cook
- [PATCH 22/32] atags_proc: Use mem_to_flex_dup() with struct buffer, Kees Cook
- [PATCH 27/32] KEYS: Use mem_to_flex_dup() with struct user_key_payload, Kees Cook
- [PATCH 24/32] IB/hfi1: Use mem_to_flex_dup() for struct tid_rb_node, Kees Cook
- [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab, Kees Cook
- [PATCH 31/32] xenbus: Use mem_to_flex_dup() with struct read_buffer, Kees Cook
- [PATCH 32/32] esas2r: Use __mem_to_flex() with struct atto_ioctl, Kees Cook
- [PATCH 30/32] usb: gadget: f_fs: Use mem_to_flex_dup() with struct ffs_buffer, Kees Cook
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl, David Howells
- Re: [PATCH 00/32] Introduce flexible array struct memcpy() helpers, David Howells
- [PATCH] fsnotify: add generic perm check for unlink/rmdir,
Guowei Du
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir, kernel test robot
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir, kernel test robot
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir, kernel test robot
- Re: [PATCH] fsnotify: add generic perm check for unlink/rmdir, Paul Moore
[PATCH] gui: Make sure sepolicy calls are translated properly,
Vit Mojzis
[PATCH v2 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors,
Laszlo Ersek
[PATCH] selinux: include necessary headers in headers,
Christian Göttsche
[PATCH] selinux: avoid extra semicolon,
Christian Göttsche
[PATCH] selinux: fix indentation level of mls_ops block,
Christian Göttsche
[PATCH] selinux: update parameter documentation,
Christian Göttsche
[PATCH] selinux: use unsigned char for boolean values,
Christian Göttsche
[PATCH] selinux: resolve checkpatch errors,
Christian Göttsche
[PATCH v4] firmware_loader: use kernel credentials when reading firmware,
Thiébaud Weksteen
[PATCH] libselinux/utils/getsebool: add options to display en-/disabled booleans,
Christian Göttsche
[PATCH] Update missing sandbox translations,
Petr Lautrbach
[PATCH for-3.5 0/5] selinux_restorecon(3), setfiles(8): skip relabeling errors,
Laszlo Ersek
[PATCH v3] firmware_loader: use kernel credentials when reading firmware,
Thiébaud Weksteen
[PATCH] checkpolicy: mention class name on invalid permission,
Christian Göttsche
[PATCH userspace v2 0/2] Support the 'self' keyword in type transitions,
Ondrej Mosnacek
[PATCH userspace 0/2] Support the 'self' keyword in type transitions,
Ondrej Mosnacek
[PATCH v2] firmware_loader: use kernel credentials when reading firmware,
Thiébaud Weksteen
SELinux userspace 3.4-rc2 release candidate, Petr Lautrbach
[PATCH testsuite 0/2] FIOQSIZE followup fixes,
Ondrej Mosnacek
[PATCH v35 00/29] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v35 02/29] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v35 04/29] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v35 03/29] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v35 14/29] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v35 20/29] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v35 23/29] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v35 27/29] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v35 29/29] AppArmor: Remove the exclusive flag, Casey Schaufler
[PATCH] selinux: don't sleep when CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is true,
Paul Moore
boot failures as of "selinux: checkreqprot is deprecated, add some ssleep() discomfort",
J. Bruce Fields
[PATCH 1/5] libsepol/test Include policydb.h header for policydb_t declaration,
James Carter
[PATCH testsuite 0/2] Make SCTP and Bluetooth support optional,
Ondrej Mosnacek
[PATCH] libsepol/tests: adjust IPv6 netmasks,
Christian Göttsche
[PATCH 1/3] libselinux: correct parameter type in selabel_open(3),
Christian Göttsche
[PATCH testsuite v4] tests/sctp: add client peeloff tests,
Ondrej Mosnacek
[PATCH 1/5] libsepol/cil: declare file local function pointer static,
Christian Göttsche
[PATCH] Correct misc typos,
Christian Göttsche
[PATCH v34 00/29] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v34 03/29] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v34 14/29] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v34 23/29] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v34 27/29] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- <Possible follow-ups>
- [PATCH v34 00/29] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v34 03/29] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v34 14/29] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v34 23/29] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v34 27/29] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH v34 00/29] LSM: Module stacking for AppArmor, Casey Schaufler
ANN: SELinux userspace 3.4-rc1 release candidate,
Petr Lautrbach
Re: [PATCH V3 Notebook] How to add a new policy capability, Paul Moore
[PATCH] policycoreutils: drop usage of egrep in fixfiles,
Christian Göttsche
[PATCH] github: add some basic GH Actions to build the notebook,
Paul Moore
Re: [PATCH Notebook] checkreqprot is being deprecated, Paul Moore
Re: [PATCH Notebook] SELINUX=disabled is being deprecated, Paul Moore
Re: [PATCH Notebook] Reference Policy: Module versioning now optional, Paul Moore
Re: [PATCH V2 Notebook] How to add a new policy capability, Daniel Burgener
Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request,
Ondrej Mosnacek
[PATCH] firmware_loader: use kernel credentials when reading firmware,
Thiébaud Weksteen
[PATCH] sepolgen: Update permission map,
Petr Lautrbach
[PATCH v2] libsepol: Replace calls to mallocarray() with calls to calloc(),
James Carter
[PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info(),
Petr Lautrbach
[PATCH] policycoreutils/setfiles: Improve description of -d switch,
Petr Lautrbach
Translate or not?,
Petr Lautrbach
[PATCH 4/5] selinux: Remove redundant assignments,
Michal Orzel
[RFC PATCH 1/4] libsepol/cil: declare file local functions static,
Christian Göttsche
[PATCH] libselinux/utils: check for valid contexts to improve error causes,
Christian Göttsche
[PATCH 1/2] libsepol: mark immutable mls and context parameter const,
Christian Göttsche
[PATCH] libsepol: add missing oom checks,
Christian Göttsche
[PATCH] libsepol/cil: silence GCC 12 array-bounds false positive,
Christian Göttsche
[PATCH] libsepol: Replace calls to mallocarray() with calls to calloc(), James Carter
Lets start with 3.4 userspace release,
Petr Lautrbach
[PATCH AUTOSEL 4.9 1/8] selinux: use correct type for context length, Sasha Levin
[PATCH AUTOSEL 4.14 1/8] selinux: use correct type for context length, Sasha Levin
[PATCH AUTOSEL 4.19 01/12] selinux: use correct type for context length, Sasha Levin
[PATCH AUTOSEL 5.4 01/16] LSM: general protection fault in legacy_parse_param,
Sasha Levin
[PATCH AUTOSEL 5.15 01/29] LSM: general protection fault in legacy_parse_param,
Sasha Levin
[PATCH AUTOSEL 5.10 01/21] LSM: general protection fault in legacy_parse_param,
Sasha Levin
[PATCH AUTOSEL 5.16 01/35] LSM: general protection fault in legacy_parse_param,
Sasha Levin
[PATCH AUTOSEL 5.17 01/43] LSM: general protection fault in legacy_parse_param,
Sasha Levin
[PATCH] Add a file describing the security vulnerability handling process,
James Carter
[PATCH] libsemanage: Fallback to semanage_copy_dir when rename() failed,
Petr Lautrbach
[GIT PULL] SELinux patches for v5.18,
Paul Moore
[PATCH] optional statement is not valid in if and require statement,
Dominick Grift
Pwnkit and SELinux,
Daniel Burgener
[PATCH] libsepol: Validate conditional expressions,
James Carter
[PATCH] libsepol: Use calloc when initializing bool_val_to_struct array,
James Carter
Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD,
Paul Moore
[PATCH] gui: do not recreate /etc/selinux/config,
Mikhail Novosyolov
[PATCH] libselinux: Close leaked FILEs,
Petr Lautrbach
[PATCH v33 00/29] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v33 02/29] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v33 03/29] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v33 04/29] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v33 14/29] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v33 20/29] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v33 23/29] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v33 24/29] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v33 26/29] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v33 29/29] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v33 27/29] Audit: Add record for multiple object security contexts, Casey Schaufler
[PATCH] libsepol/cil: Write a message when a log message is truncated,
James Carter
Re: [PATCH v1] fs: Fix inconsistent f_mode,
Paul Moore
[RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort,
Paul Moore
[PATCH 1/2] libsepol: reject xperm av rules in conditional statements,
Christian Göttsche
libsemanage rename calls fail on containers, Joseph Marrero Corchado
Recently fixed neverallowx checks report (range 0x),
bauen1
[PATCH] libsepol: Shorten the policy capability enum names,
Richard Haines
[PATCH] libsepol: Do a more thorough validation of constraints,
James Carter
[PATCH] libsepol: fix reallocarray imports,
Thiébaud Weksteen
[PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC,
Petr Lautrbach
[PATCH] selinux: shorten the policy capability enum names,
Paul Moore
[PATCH] docs: selinux: add '=' signs to kernel boot options,
Randy Dunlap
[PATCH RESEND] xfs: don't generate selinux audit messages for capability testing,
Darrick J. Wong
Re: [PATCH] docs: fix 'make htmldocs' warning in SCTP.rst, Paul Moore
[PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability,
Richard Haines
[PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX,
Richard Haines
[PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD,
Axel Rasmussen
[PATCH Notebook] policy_config_statements.md: How to add a new capability,
Richard Haines
[PATCH testsuite] tests/ioctl: Update ioctl tests,
Richard Haines
[PATCH] libsepol: Add 'ioctl_skip_cloexec' policy capability, Richard Haines
[PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX,
Richard Haines
[GIT PULL] SELinux fixes for v5.17 (#2),
Paul Moore
[PATCH 1/4] newrole: add Makefile target to test build options,
Christian Göttsche
[PATCH] libsepol: validate expressions by evaluating,
Christian Göttsche
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]