Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v2] security: Return xattr name from security_dentry_init_security(), (continued)
- [PATCH selinux v3] selinux: remove unneeded ipv6 hook wrappers,
Florian Westphal
- [PATCH] selinux: consilidate comments from inode_doinit_with_dentry wrt !dentry,
Davidlohr Bueso
- [RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies,
Christian Göttsche
- [RFC PATCH 01/35] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [RFC PATCH 02/35] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [RFC PATCH 03/35] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [RFC PATCH 04/35] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH 05/35] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [RFC PATCH 07/35] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [RFC PATCH 06/35] libsepol: use logging framework in conditional.c, Christian Göttsche
- [RFC PATCH 08/35] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH 09/35] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH 10/35] libsepol: add checks for read sizes, Christian Göttsche
- [RFC PATCH 11/35] libsepol: enforce avtab item limit, Christian Göttsche
- [RFC PATCH 12/35] libsepol: clean memory on conditional read failure, Christian Göttsche
- [RFC PATCH 13/35] libsepol: validate MLS levels, Christian Göttsche
- [RFC PATCH 14/35] libsepol: reject invalid fsuse types, Christian Göttsche
- [RFC PATCH 15/35] libsepol: reject invalid default targets, Christian Göttsche
- [RFC PATCH 16/35] libsepol: validate expanded user range and level, Christian Göttsche
- [RFC PATCH 18/35] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [RFC PATCH 17/35] libsepol: validate types, Christian Göttsche
- [RFC PATCH 19/35] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [RFC PATCH 22/35] libsepol: validate permission count of classes, Christian Göttsche
- [RFC PATCH 20/35] libsepol: do not crash on class gaps, Christian Göttsche
- [RFC PATCH 21/35] libsepol: do not crash on user gaps, Christian Göttsche
- [RFC PATCH 24/35] libsepol: zero member before potential dereference, Christian Göttsche
- [RFC PATCH 23/35] libsepol: resolve log message mismatch, Christian Göttsche
- [RFC PATCH 25/35] libsepol: validate avtab types, Christian Göttsche
- [RFC PATCH 26/35] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [RFC PATCH 27/35] libsepol: validate type of avtab type rules, Christian Göttsche
- [RFC PATCH 28/35] libsepol: validate ocontexts, Christian Göttsche
- [RFC PATCH 29/35] libsepol: validate genfs contexts, Christian Göttsche
- [RFC PATCH 30/35] libsepol: validate permissive types, Christian Göttsche
- [RFC PATCH 31/35] libsepol: validate policy properties, Christian Göttsche
- [RFC PATCH 32/35] libsepol: do not underflow on short format arguments, Christian Göttsche
- [RFC PATCH 33/35] libsepol: validate categories, Christian Göttsche
- [RFC PATCH 34/35] libsepol: use correct size for initial string list, Christian Göttsche
- [RFC PATCH 35/35] libsepol: do not create a string list with initial size zero, Christian Göttsche
- Re: [RFC PATCH 00/35] libsepol: add fuzzer for reading binary policies, James Carter
- [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH v2 01/36] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [RFC PATCH v2 02/36] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [RFC PATCH v2 03/36] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [RFC PATCH v2 04/36] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [RFC PATCH v2 05/36] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [RFC PATCH v2 06/36] libsepol: use logging framework in conditional.c, Christian Göttsche
- [RFC PATCH v2 07/36] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [RFC PATCH v2 08/36] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH v2 10/36] libsepol: add checks for read sizes, Christian Göttsche
- [RFC PATCH v2 09/36] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [RFC PATCH v2 11/36] libsepol: enforce avtab item limit, Christian Göttsche
- [RFC PATCH v2 13/36] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [RFC PATCH v2 12/36] libsepol: clean memory on conditional insertion failure, Christian Göttsche
- [RFC PATCH v2 14/36] libsepol: reject invalid filetrans source type, Christian Göttsche
- [RFC PATCH v2 16/36] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [RFC PATCH v2 15/36] libsepol: zero member before potential dereference, Christian Göttsche
- [RFC PATCH v2 17/36] libsepol: do not underflow on short format arguments, Christian Göttsche
- [RFC PATCH v2 19/36] libsepol: do not crash on user gaps, Christian Göttsche
- [RFC PATCH v2 20/36] libsepol: use correct size for initial string list, Christian Göttsche
- [RFC PATCH v2 21/36] libsepol: do not create a string list with initial size zero, Christian Göttsche
- [RFC PATCH v2 22/36] libsepol: split validation of datum array gaps and entries, Christian Göttsche
- [RFC PATCH v2 23/36] libsepol: validate MLS levels, Christian Göttsche
- [RFC PATCH v2 18/36] libsepol: do not crash on class gaps, Christian Göttsche
- [RFC PATCH v2 25/36] libsepol: validate permission count of classes, Christian Göttsche
- [RFC PATCH v2 24/36] libsepol: validate expanded user range and level, Christian Göttsche
- [RFC PATCH v2 26/36] libsepol: resolve log message mismatch, Christian Göttsche
- [RFC PATCH v2 28/36] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [RFC PATCH v2 27/36] libsepol: validate avtab and avrule types, Christian Göttsche
- [RFC PATCH v2 29/36] libsepol: validate type of avtab type rules, Christian Göttsche
- [RFC PATCH v2 30/36] libsepol: validate ocontexts, Christian Göttsche
- [RFC PATCH v2 31/36] libsepol: validate genfs contexts, Christian Göttsche
- [RFC PATCH v2 32/36] libsepol: validate permissive types, Christian Göttsche
- [RFC PATCH v2 34/36] libsepol: validate categories, Christian Göttsche
- [RFC PATCH v2 33/36] libsepol: validate policy properties, Christian Göttsche
- [RFC PATCH v2 36/36] libsepol: validate class default targets, Christian Göttsche
- [RFC PATCH v2 35/36] libsepol: validate fsuse types, Christian Göttsche
- [RFC PATCH v2 37/40] [WIP] libsepol: export policydb_validate, Christian Göttsche
- [RFC PATCH v2 38/40] [WIP] checkpolicy: validate generated policies, Christian Göttsche
- [RFC PATCH v2 40/40] [CROSS-PATCH] libsepol: do not pass NULL to memcpy, Christian Göttsche
- [RFC PATCH v2 39/40] [CROSS-PATCH] libsepol: avoid passing NULL pointer to memcpy, Christian Göttsche
- Re: [RFC PATCH v2 00/36] libsepol: add fuzzer for reading binary policies, James Carter
- [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies, Christian Göttsche
- [PATCH v3 09/36] libsepol: use reallocarray wrapper to avoid overflows, Christian Göttsche
- [PATCH v3 10/36] libsepol: add checks for read sizes, Christian Göttsche
- [PATCH v3 15/36] libsepol: zero member before potential dereference, Christian Göttsche
- [PATCH v3 29/36] libsepol: validate type of avtab type rules, Christian Göttsche
- [PATCH v3 04/36] libsepol: add libfuzz based fuzzer for reading binary policies, Christian Göttsche
- [PATCH v3 07/36] libsepol: use logging framework in ebitmap.c, Christian Göttsche
- [PATCH v3 02/36] cifuzz: use the default runtime of 600 seconds, Christian Göttsche
- [PATCH v3 12/36] libsepol: clean memory on conditional insertion failure, Christian Göttsche
- [PATCH v3 08/36] libsepol: use mallocarray wrapper to avoid overflows, Christian Göttsche
- [PATCH v3 20/36] libsepol: use correct size for initial string list, Christian Göttsche
- [PATCH v3 28/36] libsepol: validate constraint expression operators and attributes, Christian Göttsche
- [PATCH v3 18/36] libsepol: do not crash on class gaps, Christian Göttsche
- [PATCH v3 26/36] libsepol: resolve log message mismatch, Christian Göttsche
- [PATCH v3 22/36] libsepol: split validation of datum array gaps and entries, Christian Göttsche
- [PATCH v3 36/36] libsepol: validate class default targets, Christian Göttsche
- [PATCH v3 33/36] libsepol: validate policy properties, Christian Göttsche
- [PATCH v3 32/36] libsepol: validate permissive types, Christian Göttsche
- [PATCH v3 34/36] libsepol: validate categories, Christian Göttsche
- [PATCH v3 01/36] cifuzz: enable report-unreproducible-crashes, Christian Göttsche
- [PATCH v3 21/36] libsepol: do not create a string list with initial size zero, Christian Göttsche
- [PATCH v3 14/36] libsepol: reject invalid filetrans source type, Christian Göttsche
- [PATCH v3 03/36] libsepol/fuzz: silence secilc-fuzzer, Christian Göttsche
- [PATCH v3 05/36] libsepol/fuzz: limit element sizes for fuzzing, Christian Göttsche
- [PATCH v3 23/36] libsepol: validate MLS levels, Christian Göttsche
- [PATCH v3 11/36] libsepol: enforce avtab item limit, Christian Göttsche
- [PATCH v3 27/36] libsepol: validate avtab and avrule types, Christian Göttsche
- [PATCH v3 16/36] libsepol: use size_t for indexes in strs helpers, Christian Göttsche
- [PATCH v3 06/36] libsepol: use logging framework in conditional.c, Christian Göttsche
- [PATCH v3 17/36] libsepol: do not underflow on short format arguments, Christian Göttsche
- [PATCH v3 24/36] libsepol: validate expanded user range and level, Christian Göttsche
- [PATCH v3 30/36] libsepol: validate ocontexts, Christian Göttsche
- [PATCH v3 31/36] libsepol: validate genfs contexts, Christian Göttsche
- [PATCH v3 19/36] libsepol: do not crash on user gaps, Christian Göttsche
- [PATCH v3 13/36] libsepol: reject abnormal huge sid ids, Christian Göttsche
- [PATCH v3 25/36] libsepol: validate permission count of classes, Christian Göttsche
- [PATCH v3 35/36] libsepol: validate fsuse types, Christian Göttsche
- Re: [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies, James Carter
- [PATCH] selinux: make better use of the nf_hook_state passed to the NF hooks,
Paul Moore
- [PATCH v2 selinux] selinux: remove unneeded ipv6 hook wrappers,
Florian Westphal
- [PATCH security-next] selinux: remove ipv6 hook wrappers,
Florian Westphal
- [PATCH 1/4] libsepol: Fix potential undefined shifts,
James Carter
- [PATCH] libsepol/cil: Fix potential undefined shifts,
James Carter
- [PATCH v4 0/3] binder: use cred instead of task for security context,
Todd Kjos
- [PATCH v3 0/3] binder: use cred instead of task for security context,
Todd Kjos
- ANN: SELinux userspace 3.3-rc3 release candidate, Petr Lautrbach
- [PATCH] libselinux/semodule: Improve extracting message,
Petr Lautrbach
- [PATCH v2] binder: use cred instead of task for selinux checks,
Todd Kjos
- [PATCH] binder: use cred instead of task for selinux checks,
Todd Kjos
- [PATCH] security: Return xattr name from security_dentry_init_security(),
Vivek Goyal
- [PATCH testsuite] Remove the lockdown test,
Ondrej Mosnacek
- [PATCH] libsepol/cil: Do not skip macros when resolving until later passes,
James Carter
- [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj(),
Paul Moore
- [PATCH] selinux: remove the SELinux lockdown implementation,
Paul Moore
- [PATCH] libsepol/cil: Limit the amount of reporting for bounds failures,
James Carter
- [PATCH 1/9] libsepol: ebitmap: mark nodes of const ebitmaps const,
Christian Göttsche
- [PATCH] Correct some typos,
Christian Göttsche
- [PATCH userspace] README: update continuous integration badges,
Nicolas Iooss
- [PATCH userspace] GitHub Actions: do not use macOS latest runner for now,
Nicolas Iooss
- [PATCH 0/2] fuse: Send file/inode security context during creation,
Vivek Goyal
- [PATCH v29 00/28] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v29 01/28] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v29 02/28] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v29 03/28] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v29 14/28] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v29 20/28] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v29 23/28] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v29 24/28] Audit: Add framework for auxiliary records, Casey Schaufler
- [PATCH v29 25/28] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v29 26/28] Audit: Add record for multiple object security contexts, Casey Schaufler
- [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v29 28/28] AppArmor: Remove the exclusive flag, Casey Schaufler
- [RFC PATCH] selinux: use SECINITSID_KERNEL as the subj/obj in the lockdown hook,
Paul Moore
- [GIT PULL] SELinux/Smack fixes for v5.15 (#2),
Paul Moore
- [PATCH] selinux,smack: fix subjective/objective credential use mixups,
Paul Moore
- [PATCH testsuite] tests/perf_event: don't assume CPU#0 is online,
Ondrej Mosnacek
- ANN: SELinux userspace 3.3-rc2 release candidate,
Petr Lautrbach
- [PATCH setools] __init__.py: Make NetworkX dep optional,
Jason Zaman
- [GIT PULL] SELinux fixes for v5.15 (#1),
Paul Moore
- [PATCH] libsepol/cil: Handle operations in a class mapping when verifying,
James Carter
- Re: [selinuxproject-selinux:stable-5.15 1/1] include/linux/rcupdate.h:395:2: warning: passing argument 1 of 'security_locked_down' discards 'const' qualifier from pointer target type, Paul Moore
- [PATCH v4 0/8] Add LSM access controls and auditing to io_uring,
Paul Moore
- [PATCH v4 1/8] audit: prepare audit_context for use in calling contexts beyond syscalls, Paul Moore
- [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring, Paul Moore
- [PATCH v4 3/8] audit: add filtering for io_uring records, Paul Moore
- [PATCH v4 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure(), Paul Moore
- [PATCH v4 5/8] io_uring: convert io_uring to the secure anon inode interface, Paul Moore
- [PATCH v4 6/8] lsm,io_uring: add LSM hooks to io_uring, Paul Moore
- [PATCH v4 7/8] selinux: add support for the io_uring access controls, Paul Moore
- [PATCH v4 8/8] Smack: Brutalist io_uring support, Paul Moore
- Re: [PATCH v4 0/8] Add LSM access controls and auditing to io_uring, Paul Moore
- [PATCH] selinux: enable genfscon labeling for securityfs,
Christian Göttsche
- [PATCH 00/13] checkpolicy improvements,
Christian Göttsche
- [PATCH 01/13] libsepol: avoid implicit conversions, Christian Göttsche
- [PATCH 02/13] libsepol: free memory after policy validation, Christian Göttsche
- [PATCH 03/13] checkpolicy: enclose macro argument in parentheses, Christian Göttsche
- [PATCH 04/13] checkpolicy: misc checkmodule tweaks, Christian Göttsche
- [PATCH 05/13] checkpolicy: misc checkpolicy tweaks, Christian Göttsche
- [PATCH 06/13] checkpolicy: mark read-only parameters in module compiler const, Christian Göttsche
- [PATCH 07/13] checkpolicy: mark file local functions in policy_define static, Christian Göttsche
- [PATCH 08/13] checkpolicy: add missing function declarations, Christian Göttsche
- [PATCH 09/13] checkpolicy: resolve dismod memory leaks, Christian Göttsche
- [PATCH 10/13] checkpolicy: avoid implicit conversion, Christian Göttsche
- [PATCH 11/13] checkpolicy: error out on parsing too big integers, Christian Göttsche
- [PATCH 12/13] checkpolicy: print warning on source line overflow, Christian Göttsche
- [PATCH 13/13] checkpolicy: free extended permission memory, Christian Göttsche
- Re: [PATCH 00/13] checkpolicy improvements, James Carter
- [PATCH v3 0/8] Add LSM access controls and auditing to io_uring,
Paul Moore
- [PATCH v3 1/8] audit: prepare audit_context for use in calling contexts beyond syscalls, Paul Moore
- [PATCH v3 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring, Paul Moore
- [PATCH v3 3/8] audit: add filtering for io_uring records, Paul Moore
- [PATCH v3 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure(), Paul Moore
- [PATCH v3 5/8] io_uring: convert io_uring to the secure anon inode interface, Paul Moore
- [PATCH v3 6/8] lsm,io_uring: add LSM hooks to io_uring, Paul Moore
- [PATCH v3 7/8] selinux: add support for the io_uring access controls, Paul Moore
- [PATCH v3 8/8] Smack: Brutalist io_uring support with debug, Paul Moore
- [RFC] Signals upon avc denial,
Josh Gao
- [PATCH] libsepol/cil: Do not use original type and typeattribute datums,
James Carter
- [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks,
Ondrej Mosnacek
- [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage,
Eugene Syromiatnikov
- [PATCH] libsepol: fix typo,
Topi Miettinen
- [PATCH] libsepol/cil: Free duplicate datums in original calling function,
James Carter
- Another libsepol USE_AFTER_FREE defects detected,
Petr Lautrbach
- [PATCH] libsepol/cil: Fix detected RESOURCE_LEAK (CWE-772),
Petr Lautrbach
- ANN: Reference Policy 2.20210908, Chris PeBenito
- [PATCH testsuite v2] tests: exclude vsock_socket test where it wouldn't build,
Ondrej Mosnacek
- ANN: SELinux userspace 3.3-rc1 release candidate, Petr Lautrbach
- [PATCH 1/2] libsepol/cil: Add function to get number of items in a stack,
James Carter
- [PATCH testsuite] tests: exclude vsock_socket test where it wouldn't build, Ondrej Mosnacek
- [PATCH] libsepol: Fix detected RESOURCE_LEAKs,
Petr Lautrbach
- PATH_MAX + 1 in realpath_not_final(), Petr Lautrbach
- [PATCH testsuite 1/2] tests/module_load: simplify the clean target,
Ondrej Mosnacek
- [PATCH v3 0/1] Relax restrictions on user.* xattr,
Vivek Goyal
- [PATCH 1/3 v2] libsepol/cil: Remove redundant syntax checking,
James Carter
- libselinux issue,
Dominick Grift
- [PATCH 1/3] libsepol/cil: Don't destroy optionals whose parent will be destroyed,
James Carter
- [GIT PULL] SELinux patches for v5.15,
Paul Moore
- [PATCH 1/3] libsepol/cil: Properly check parse tree when printing error messages,
James Carter
- Cil block inheritance,
Vit Mojzis
- Re: There is an interesting conversation going on about virtiofsd and SELinux,
Stephen Smalley
- [PATCH] python: Import specific modules from setools for less deps,
Michał Górny
- security/selinux/hooks.c: FILE__ perms used as DIR__ perms,
Topi Miettinen
- [PATCH] selinux: remove duplicated initialization of 'i' for clean-up,
Austin Kim
- [PATCH] libsepol/cil: Properly check parse tree when printing error messages,
James Carter
- [PATCH 1/2] libsepol/cil: Remove redundant syntax checking,
James Carter
- [PATCH 8/8 v2] libsepol/cil: When writing AST use line marks for src_info nodes, James Carter
- [PATCH v2] libsepol/cil: Allow some duplicate macro and block declarations,
James Carter
- [PATCH 0/7 v2] libsepol/cil: Line mark cleanup and fix,
James Carter
- [PATCH] Improve error message for label file validation,
Kelvin Zhang
- [PATCH] cil_container_statements.md: clarify in-statement limitations,
Dominick Grift
- [PATCH] libsepol/cil: Allow some duplicate macro and block declarations,
James Carter
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring,
Paul Moore
- [RFC PATCH v2 1/9] audit: prepare audit_context for use in calling contexts beyond syscalls, Paul Moore
- [RFC PATCH v2 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring, Paul Moore
- [RFC PATCH v2 4/9] audit: add filtering for io_uring records, Paul Moore
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure(), Paul Moore
- [RFC PATCH v2 6/9] io_uring: convert io_uring to the secure anon inode interface, Paul Moore
- [RFC PATCH v2 7/9] lsm,io_uring: add LSM hooks to io_uring, Paul Moore
- [RFC PATCH v2 8/9] selinux: add support for the io_uring access controls, Paul Moore
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug, Paul Moore
- [RFC PATCH v2 3/9] audit: dev/test patch to force io_uring auditing, Paul Moore
- Re: [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring, Richard Guy Briggs
- [PATCH 0/8] libsepol/cil: Line mark cleanup and fix,
James Carter
- [RFC PATCH 1/2] libselinux: replace strerror by %m,
Christian Göttsche
- lets think about 3.3 release,
Petr Lautrbach
- [PATCH] mcstrans: Improve mlstrans-test output,
Petr Lautrbach
- [GIT PULL] SELinux fixes for v5.14 (#1),
Paul Moore
- [PATCH SYSTEMD 0/7] Re-add SELinux checks for unit install operations,
Christian Göttsche
- [PATCH userspace] libsepol/cil: remove obsolete comment,
Ondrej Mosnacek
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]