Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH v24 14/25] LSM: Specify which LSM to display, (continued)
- [PATCH v24 14/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v24 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v24 02/25] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v24 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v24 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v24 23/25] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- Re: [PATCH v24 00/25] LSM: Module stacking for AppArmor, Topi Miettinen
- [PATCH] selinux-notebook: Fix document links,
Richard Haines
- [PATCH testsuite] ci: run testsuite also against the secnext kernel,
Ondrej Mosnacek
- [PATCH testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE,
Ondrej Mosnacek
- [PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU, Stephen Brennan
- [PATCH testsuite 0/2] Migrate CI to GH Actions,
Ondrej Mosnacek
- [PATCH] selinux: measure state and policy capabilities,
Lakshmi Ramasubramanian
- [PATCH v6 00/40] idmapped mounts,
Christian Brauner
- [PATCH v6 10/40] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v6 08/40] acl: handle idmapped mounts, Christian Brauner
- [PATCH v6 04/40] capability: handle idmapped mounts, Christian Brauner
- [PATCH v6 03/40] fs: add file and path permissions helpers, Christian Brauner
- [PATCH v6 11/40] stat: handle idmapped mounts, Christian Brauner
- [PATCH v6 17/40] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v6 14/40] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v6 19/40] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v6 18/40] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v6 13/40] namei: introduce struct renamedata, Christian Brauner
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v6 37/40] fat: handle idmapped mounts, Christian Brauner
- [PATCH v6 36/40] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v6 22/40] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v6 23/40] exec: handle idmapped mounts, Christian Brauner
- [PATCH v6 34/40] fs: add mount_setattr(), Christian Brauner
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v6 39/40] xfs: support idmapped mounts, Christian Brauner
- [PATCH v6 21/40] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v6 25/40] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper, Christian Brauner
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v6 32/40] fs: split out functions to hold writers, Christian Brauner
- [PATCH v6 26/39] ima: handle idmapped mounts, Christian Brauner
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v6 38/40] ext4: support idmapped mounts, Christian Brauner
- [PATCH v6 20/40] init: handle idmapped mounts, Christian Brauner
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v6 16/40] open: handle idmapped mounts, Christian Brauner
- [PATCH v6 07/40] attr: handle idmapped mounts, Christian Brauner
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware, Christian Brauner
- [PATCH v6 09/40] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v6 01/40] mount: attach mappings to mounts, Christian Brauner
- [PATCH v6 02/40] fs: add id translation helpers, Christian Brauner
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware, Christian Brauner
- Re: [PATCH v6 00/40] idmapped mounts, Serge E. Hallyn
- [PATCH 1/1] process_madvise.2: Add process_madvise man page,
Suren Baghdasaryan
[PATCH v2 1/1] libsepol: do not decode out-of-bound rolebounds,
Nicolas Iooss
ANN: SELinux userspace 3.2-rc1 release candidate, Petr Lautrbach
[RFC PATCH 0/1] selinux-notebook: Add new section for Embedded Systems,
Richard Haines
[PATCH testsuite] Makefile: unload policy when testsuite fails,
Ondrej Mosnacek
VSOCK & getpeercon(),
Marc-André Lureau
[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label(),
Ondrej Mosnacek
[PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc,
Lukas Bulwahn
[PATCH] selinux: include a consumer of the new IMA critical data hook,
Lakshmi Ramasubramanian
[PATCH v2] libselinux: Always close status page fd,
Petr Lautrbach
[PATCH] libselinux: Always close status page fd,
Petr Lautrbach
can't unmount /sys/fs/selinux,
Petr Lautrbach
[PATCH v2 1/2] setfiles: Do not abort on labeling error,
Petr Lautrbach
[PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support,
Ondrej Mosnacek
[PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe,
Ondrej Mosnacek
[PATCH] setfiles: Do not abort on labeling error,
Petr Lautrbach
[PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability,
Ondrej Mosnacek
Why every file context is "system_u:object_r",
Ashish Mishra
[PATCH v5 00/42] idmapped mounts,
Christian Brauner
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v5 04/42] fs: split out functions to hold writers, Christian Brauner
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper, Christian Brauner
- [PATCH v5 06/42] fs: add mount_setattr(), Christian Brauner
- [PATCH v5 09/42] mount: attach mappings to mounts, Christian Brauner
- [PATCH v5 10/42] capability: handle idmapped mounts, Christian Brauner
- [PATCH v5 07/42] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware, Christian Brauner
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware, Christian Brauner
- [PATCH v5 08/42] fs: add id translation helpers, Christian Brauner
- [PATCH v5 14/42] acl: handle idmapped mounts, Christian Brauner
- [PATCH v5 17/42] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v5 28/42] init: handle idmapped mounts, Christian Brauner
- [PATCH v5 25/42] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v5 18/42] stat: handle idmapped mounts, Christian Brauner
- [PATCH v5 16/42] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v5 31/42] exec: handle idmapped mounts, Christian Brauner
- [PATCH v5 37/42] xfs: support idmapped mounts, Christian Brauner
- [PATCH v5 36/42] ext4: support idmapped mounts, Christian Brauner
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v5 15/42] fs: add file_user_ns() helper, Christian Brauner
- [PATCH v5 13/42] attr: handle idmapped mounts, Christian Brauner
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v5 20/42] namei: introduce struct renamedata, Christian Brauner
- [PATCH v5 24/42] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v5 27/42] notify: handle idmapped mounts, Christian Brauner
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v5 41/42] tests: extend mount_setattr tests, Christian Brauner
- [PATCH v5 21/42] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v5 34/42] ima: handle idmapped mounts, Christian Brauner
- [PATCH v5 30/42] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v5 35/42] fat: handle idmapped mounts, Christian Brauner
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v5 23/42] open: handle idmapped mounts, Christian Brauner
- [PATCH v5 26/42] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v5 33/42] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v5 29/42] ioctl: handle idmapped mounts, Christian Brauner
- Re: [PATCH v5 00/42] idmapped mounts, Darrick J. Wong
- Message not available
[PATCH testsuite] perf_event: update perf_event test for the new CAP_PERFMON capability, Ondrej Mosnacek
[PATCH] python/sepolgen: allow any policy statement in ifndef,
Vit Mojzis
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise,
Suren Baghdasaryan
[PATCH v15 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise,
Suren Baghdasaryan
[PATCH 1/2] libselinux: accept const fromcon in get_context API,
Christian Göttsche
[RFC PATCH v2] selinux: security: Move selinux_state to a separate page,
Preeti Nagar
[RFC PATCH] selinux: ARM64: Move selinux_state to a separate page, Preeti Nagar
[PATCH v14 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH v10 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH v3 1/1] selinux-testsuite: Add userfaultfd test,
Lokesh Gidra
[PATCH 1/2] libsepol/cil: Update symtab nprim field when adding or removing datums,
James Carter
Git link to get semanage , sesearch source code,
Ashish Mishra
[PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR,
Christian Göttsche
[PATCH 0/5] Clean up SELinux global variables,
Ondrej Mosnacek
[PATCH] libsepol: destroy filename_trans list properly,
Nicolas Iooss
[PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer,
Nicolas Iooss
[PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy,
Nicolas Iooss
[PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values(),
James Carter
[PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support,
Ondrej Mosnacek
[PATCH] python/semanage: empty stdout before exiting on BrokenPipeError,
Vit Mojzis
Intent to release 3.2-rc1,
Petr Lautrbach
[PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
Selinux context type is same for root & normal user both,
Ashish Mishra
[PATCH 1/4] libsepol/cil: remove useless print statement,
Nicolas Iooss
[PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine,
Nicolas Iooss
libsepol/cil: infinite loop using invalid block/blockabstract,
Nicolas Iooss
[PATCH 1/6] libsepol: do not decode out-of-bound rolebounds,
Nicolas Iooss
[RFC DBUS PATCH] selinux: add option to control checking of reply messages,
Christian Göttsche
libsepol/cil: heap-use-after-free in __class_reset_perm_values, Nicolas Iooss
Inputs w.r.t understanding of selinux notification and systemcall,
Ashish Mishra
useless debug output by secilc when using expandtypeattribute in containers, bauen1
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38],
Ondrej Mosnacek
[PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity,
Amir Goldstein
[PATCH v3 1/2] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
[PATCH] Revert "libsemanage/genhomedircon: check usepasswd",
Petr Lautrbach
[PATCH] libsemanage: Free contents of modkey in semanage_direct_remove,
Jakub Hrozek
[PATCH] linux: handle MPTCP consistently with TCP,
Paolo Abeni
[GIT PULL] SELinux patches for v5.11,
Paul Moore
[PATCH v9 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH v8 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH v2 1/1] selinux-testsuite: Add userfaultfd test,
Lokesh Gidra
New release of The SELinux Notebook (20201209), Paul Moore
[PATCH v7 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
virtiofs and its optional xattr support vs. fs_use_xattr,
Ondrej Mosnacek
[PATCH 1/2] GitHub Actions: upgrade to Python 3.9,
Nicolas Iooss
[PATCH] libsepol/cil: always destroy the lexer state,
Nicolas Iooss
[PATCH] reference_policy.md: Remove Ref Policy 'contributed modules',
Richard Haines
How is policy.31 created from modules under /usr/share/selinux,
Ashish Mishra
[PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
[PATCH v4 00/40] idmapped mounts,
Christian Brauner
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]