Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH testsuite] policy: only define anon_inode class if not defined in system policy,
Ondrej Mosnacek
- [PATCH 0/5] Fix bugs identified by the secilc-fuzzer,
James Carter
- [bug report?] other unexpected behaviours in secilc and CIL semantics,
lorenzo ceragioli
- [PATCH] selinux: Remove redundant assignment to rc,
Jiapeng Chong
- [PATCH] libsepol/cil: Properly reset an anonymous classperm set,
James Carter
- [PATCH 2] testsuite: fix cap_userns for kernels >= v5.12,
Paul Moore
- [PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
- [GIT PULL] SELinux patches for v5.13,
Paul Moore
- [PATCH] testsuite: fix cap_userns for kernels >= v5.12,
Paul Moore
- [PATCH v2] selinux: Corrected comment to match kernel-doc comment,
Souptick Joarder
- [PATCH] selinux: Corrected comment to match kernel-doc comment,
Souptick Joarder
- [PATCH] libselinux android: Add keystore2_key label module.,
Jeff Vander Stoep
- [PATCH 1/4] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH] libsepol: use checked arithmetic builtin to perform safe addition,
Nicolas Iooss
- [PATCH] libselinux: do not duplicate make target when going into subdirectory,
Nicolas Iooss
- [PATCH] selinux: add proper NULL termination to the secclass_map permissions,
Paul Moore
- [PATCH 0/3 v3] Create secil2tree to write CIL AST,
James Carter
- [RFC PATCH testsuite] Add extended_anon_inode_class policy capability support, Ondrej Mosnacek
- [RFC PATCH 0/2] selinux,anon_inodes: Use a separate SELinux class for each type of anon inode,
Ondrej Mosnacek
- [PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
- no SELinux common criteria?,
Ted Toth
- [PATCH 0/3 v2] Create secil2tree to write CIL AST,
James Carter
- [PATCH 00/11 v2] Various CIL patches,
James Carter
- [PATCH 01/11 v2] libsepol/cil: Fix out-of-bound read of file context pattern ending with "\", James Carter
- [PATCH 02/11 v2] libsepol/cil: Destroy classperms list when resetting classpermission, James Carter
- [PATCH 03/11 v2] libsepol/cil: Destroy classperm list when resetting map perms, James Carter
- [PATCH 04/11 v2] libsepol/cil: cil_reset_classperms_set() should not reset classpermission, James Carter
- [PATCH 05/11 v2] libsepol/cil: Set class field to NULL when resetting struct cil_classperms, James Carter
- [PATCH 06/11 v2] libsepol/cil: More strict verification of constraint leaf expressions, James Carter
- [PATCH 07/11 v2] libsepol/cil: Exit with an error if declaration name is a reserved word, James Carter
- [PATCH 08/11 v2] libsepol/cil: Allow permission expressions when using map classes, James Carter
- [PATCH 09/11 v2] libsepol/cil: Refactor helper function for cil_gen_node(), James Carter
- [PATCH 10/11 v2] libsepol/cil: Create function cil_add_decl_to_symtab() and refactor, James Carter
- [PATCH 11/11 v2] libsepol/cil: Move check for the shadowing of macro parameters, James Carter
- Re: [PATCH 00/11 v2] Various CIL patches, James Carter
- MCS NetLabel,
Paul R. Tagliamonte
- [PATCH 0/3] Create secil2tree to write CIL AST,
James Carter
- [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
- [PATCH] secilc.c: Don't fail if input file is empty,
Yi-Yo Chiang
- [RFC SHADOW PATCH 0/7] SELinux modernizations,
Christian Göttsche
- Re: [PATCH 7/7 v2] tracing: Do not create tracefs files if tracefs lockdown is in effect,
Ondrej Mosnacek
- Re: [PATCH v6 24/40] fs: make helpers idmap mount aware,
Anton Altaparmakov
- [GIT PULL] SELinux fixes for v5.12 (#2),
Paul Moore
- [PATCH 0/2] vfs/security/NFS/btrfs: clean up and fix LSM option handling,
Ondrej Mosnacek
- [PATCH 2/2] selinux:Delete selinux_xfrm_policy_lookup() useless argument,
Zhongjun Tan
- [PATCH 00/11] Various CIL patches,
James Carter
- [PATCH 01/11] libsepol/cil: Fix out-of-bound read of file context pattern ending with "\", James Carter
- [PATCH 02/11] libsepol/cil: Destroy classperms list when resetting classpermission, James Carter
- [PATCH 03/11] libsepol/cil: Destroy classperm list when resetting map perms, James Carter
- [PATCH 04/11] libsepol/cil: cil_reset_classperms_set() should not reset classpermission, James Carter
- [PATCH 05/11] libsepol/cil: Set class field to NULL when resetting struct cil_classperms, James Carter
- [PATCH 06/11] libsepol/cil: More strict verification of constraint leaf expressions, James Carter
- [PATCH 07/11 v2] libsepol/cil: Exit with an error if declaration name is a reserved word, James Carter
- [PATCH 08/11] libsepol/cil: Allow permission expressions when using map classes, James Carter
- [PATCH 09/11] libsepol/cil: Refactor helper function for cil_gen_node(), James Carter
- [PATCH 11/11] libsepol/cil: Move check for the shadowing of macro parameters, James Carter
- [PATCH 10/11] libsepol/cil: Create function cil_add_decl_to_symtab() and refactor, James Carter
- Re: [PATCH 00/11] Various CIL patches, James Carter
- Detect SELinux by checking if policy is loaded,
Kai Lüke
- [PATCH] selinux:Delete selinux_xfrm_policy_lookup() useless argument,
Zhongjun Tan
- [PATCH v2 4/4] selinux: add "mls" binary version of the policy,
Vit Mojzis
- [PATCH v2 3/4] selinux: Remove 'make' dependency, Vit Mojzis
- [PATCH v2 2/4] [DO NOT MERGE] Install selinux-policy-devel in test environment, Vit Mojzis
- [PATCH v3] selinux: fix race between old and new sidtab,
Ondrej Mosnacek
- [PATCH testsuite] Deactivate userfaultfd test policy if no xperm support,
Ondrej Mosnacek
[PATCH v2] selinux: fix race between old and new sidtab, Ondrej Mosnacek
[PATCH] selinux: fix race between old and new sidtab,
Ondrej Mosnacek
Re: [BUG] Oops in sidtab_context_to_sid,
Paul Moore
[Request] CIL configurations,
lorenzo ceragioli
[PATCH v3 0/2] selinux: fix changing booleans,
Ondrej Mosnacek
[PATCH v2 0/2] selinux: fix changing booleans,
Ondrej Mosnacek
[PATCH 10/12] libsepol/cil: Make invalid statement error messages consistent,
James Carter
[PATCH 00/12] Update checks for invalid rules in blocks,
James Carter
- [PATCH 03/12] libsepol/cil: Create new first child helper function for building AST, James Carter
- [PATCH 04/12] libsepol/cil: Use AST to track blocks and optionals when resolving, James Carter
- [PATCH 02/12] libsepol/cil: Cleanup build AST helper functions, James Carter
- [PATCH 01/12] libsepol/cil: Reorder checks for invalid rules when building AST, James Carter
- [PATCH 05/12] libsepol/cil: Reorder checks for invalid rules when resolving AST, James Carter
- [PATCH 07/12] libsepol/cil: Check for statements not allowed in optional blocks, James Carter
- [PATCH 06/12] libsepol/cil: Sync checks for invalid rules in booleanifs, James Carter
- [PATCH 09/12] libsepol/cil: Do not allow tunable declarations in in-statements, James Carter
- [PATCH 08/12] libsepol/cil: Sync checks for invalid rules in macros, James Carter
- Re: [PATCH 00/12] Update checks for invalid rules in blocks, James Carter
- Re: [PATCH 00/12] Update checks for invalid rules in blocks, James Carter
[PATCH 0/3] selinux: fix changing booleans,
Ondrej Mosnacek
[PATCH testsuite] Add AF_VSOCK SOCK_STREAM client/server tests,
David Brazdil
typechange silently dropped in some cases,
Dominick Grift
[PATCH] cil_conditional_statements.md: fix expr definition,
Dominick Grift
[PATCH testsuite] tests/userfaultfd: handle __NR_userfaultfd not being defined,
Ondrej Mosnacek
[RFC PATCH userspace 0/6] Parallel setfiles/restorecon,
Ondrej Mosnacek
[GIT PULL] SELinux fixes for v5.12 (#1),
Paul Moore
[PATCH] libsepol/cil: Allow permission expressions when using map classes,
James Carter
[PATCH V2] libsepol/cil: Exit with an error if declaration name is a reserved word, James Carter
[PATCH userspace] policycoreutils/setfiles: do not create useless setfiles.8.man file,
Ondrej Mosnacek
[PATCH v2] selinux: vsock: Set SID for socket returned by accept(),
David Brazdil
[PATCH v2] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\", Nicolas Iooss
[PATCH v3 0/3] selinux: policy load fixes,
Ondrej Mosnacek
[PATCH v2 0/3] Split security_task_getsecid() into subj and obj variants,
Paul Moore
[PATCH] libsepol/cil: More strict verification of constraint leaf expressions, James Carter
[PATCH] libsepol/cil: Exit with an error if declaration name is a reserved word,
James Carter
Re: deadlock bug related to bpf,audit subsystems,
Paul Moore
[PATCH] libsepol/cil: Set class field to NULL when resetting struct cil_classperms, James Carter
[PATCH] libsepol/cil: cil_reset_classperms_set() should not reset classpermission, James Carter
Weird bug in NFS/SELinux,
Ondrej Mosnacek
[PATCH] libsepol/cil: Destroy classperm list when resetting map perms, James Carter
[PATCH] libsepol/cil: Destroy classperms list when resetting classpermission,
James Carter
[PATCH] selinux: vsock: Set SID for socket returned by accept(),
David Brazdil
libsepol/cil: use after free with optional classpermissionset, Nicolas Iooss
[PATCH 1/1] libsepol: make num_* unsigned int in module_to_cil,
Nicolas Iooss
[PATCH 1/4] libsepol/cil: Allow lists in constraint expressions,
James Carter
[PATCH 1/2] libsepol: Write "NO_IDENTIFIER" for empty constraint expression,
James Carter
[PATCH] xfs: use has_capability_noaudit() instead of capable() where appropriate,
Ondrej Mosnacek
[PATCH] libsepol/cil: Check for duplicate blocks, optionals, and macros,
James Carter
[PATCH v2] vfs: fix fsconfig(2) LSM mount option handling for btrfs,
Ondrej Mosnacek
libsepol/cil: type confusion between macro and optional leads to heap-buffer-overflow in cil_copy_macro,
Nicolas Iooss
[PATCH 1/2 v2] checkpolicy: Do not automatically upgrade when using "-b" flag,
James Carter
[PATCH 1/6] libsepol/cil: fix out-of-bound read of a file context pattern ending with "\",
Nicolas Iooss
[PATCH] libsepol: Remove unnecessary copying of declarations from link.c,
James Carter
[PATCH 1/2] checkpolicy: Do not automatically upgrade when using "-b" flag,
James Carter
[PATCH] libsepol: Expand role attributes in constraint expressions,
James Carter
Role attributes in traditional language constraints,
Christian Göttsche
[PATCH] libsepol: Properly handle types associated to role attributes,
James Carter
[PATCH] object_classes_permissions.md: Add anon_inode class,
Richard Haines
[PATCH v25 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v25 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v25 02/25] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v25 03/25] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v25 04/25] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v25 06/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v25 07/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v25 08/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v25 09/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v25 14/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v25 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v25 16/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v25 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v25 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v25 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v25 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v25 21/25] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v25 23/25] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v25 24/25] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v25 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
[PATCH] libsepol/checkpolicy: Set user roles using role value instead of dominance,
James Carter
[PATCH] security/selinux/include/: fix misspellings using codespell tool,
menglong8 . dong
[PATCH] security/selinux/ss: fix misspellings using codespell tool,
menglong8 . dong
ANN: SPAN docker images, Karl MacMillan
ANN: SETools 4.4.0, Chris PeBenito
Quick announcement on the selinux/next and audit/next branches,
Paul Moore
[PATCH] cipso,calipso: resolve a number of problems with the DOI refcounts,
Paul Moore
ANN: SELinux userspace release 3.2, Petr Lautrbach
[PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise,
Suren Baghdasaryan
[PATCH testsuite 0/3] perf_event: fixes and cleanups,
Ondrej Mosnacek
[PATCH testsuite] lockdown: use debugfs/tracefs to test lockdown permissions,
Ondrej Mosnacek
[PATCH userspace] fixfiles: do not exclude /dev and /run in -C mode,
Ondrej Mosnacek
[PATCH 09/11] pragma once: convert scripts/selinux/genheaders/genheaders.c,
Alexey Dobriyan
[PATCH] libsepol: invalidate the pointer to the policydb if policydb_init fails,
Nicolas Iooss
[PATCH 1/1] restorecond: invalidate local_lock_fd properly when closing it,
Nicolas Iooss
[PATCH] libsepol/cil: fix NULL pointer dereference in cil_fill_ipaddr,
lutianxiong
[PATCH] perf/core: fix unconditional security_locked_down() call,
Ondrej Mosnacek
Rename 'master' branch to 'main',
Petr Lautrbach
ANN: SELinux userspace 3.2-rc3 release candidate,
Petr Lautrbach
[BUG] Race between policy reload sidtab conversion and live conversion,
Tyler Hicks
[PATCH] sepolicy: Do not try to load policy on import,
Petr Lautrbach
Re: [PATCH] powerpc/perf: Fix handling of privilege level checks in perf interrupt context, Ondrej Mosnacek
[PATCH] IMA: Add test for selinux measurement,
Lakshmi Ramasubramanian
[PATCH v3] policycoreutils: sestatus belongs to bin not sbin,
bauen1
[PATCH] libsepol/cil: handle SID without assigned context when writing policy.conf,
Christian Göttsche
[RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants,
Paul Moore
[PATCH v3 1/3] [security] Add new hook to compare new mount to an existing mount,
Olga Kornievskaia
[PATCH v3 1/2] [security] Add new hook to compare new mount to an existing mount,
Olga Kornievskaia
[PATCH v2 1/2] [security] Add new hook to compare new mount to an existing mount,
Olga Kornievskaia
security_task_getsecid() and subjective vs objective task creds,
Paul Moore
[PATCH] secilc: fixes cil_role_statements.md example,
Dominick Grift
[PATCH] libselinux: rename gettid() to something which never conflicts with the libc,
Nicolas Iooss
[PATCH] gui: fix "file type" selection in fcontextPage,
Vit Mojzis
[PATCH 1/2] libselinux: fix segfault in add_xattr_entry(),
Petr Lautrbach
[PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page,
Preeti Nagar
[GIT PULL] SELinux patches for v5.12,
Paul Moore
selinux-testsuite failures with selinux-policy-3.14.8-1,
Paul Moore
[PATCH] policycoretuils: sestatus belongs to bin not sbin,
bauen1
[PATCH 1/2] [security] Add new hook to compare new mount to an existing mount,
Olga Kornievskaia
[PATCH v2 0/2] selinux: policy load fixes,
Ondrej Mosnacek
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]