Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH v2 30/39] apparmor: handle idmapped mounts, (continued)
- [PATCH v2 30/39] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v2 23/39] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v2 26/39] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v2 34/39] ext4: support idmapped mounts, Christian Brauner
- [PATCH v2 27/39] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v2 21/39] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- Re: [PATCH v2 00/39] fs: idmapped mounts, Jonathan Corbet
- Re: [PATCH v2 00/39] fs: idmapped mounts, Stephen Barber
- Re: [PATCH v2 00/39] fs: idmapped mounts, Darrick J. Wong
- Message not available
[GIT PULL] SELinux fixes for v5.10 (#1),
Paul Moore
[PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist(),
Paul Moore
[PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH userspace] ci: add new dependencies needed by selinux-testsuite,
Ondrej Mosnacek
[PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH v13 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/1] libsepol: free memory when realloc() fails,
Nicolas Iooss
[PATCH userspace v2 0/3] Update manpages to reflect that runtime SELinux disable is deprecated,
Ondrej Mosnacek
[PATCH userspace] selinux(8): explain that runtime disable is deprecated,
Ondrej Mosnacek
SElinux bug with docker custom path, Louis MILCENT
[RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs,
Casey Schaufler
Bug (?) report for secilc and CIL semantics: some unexpected behaviours,
Lorenzo Ceragioli
[PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist(),
Paul Moore
Inputs for error " libselinux.so.1: cannot open shared object file: No such file or directory ",
Ashish Mishra
[PATCH v12 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
Selinux policy for x509_ima.der public certificate loaded by kernel during boot,
rishi gupta
[PATCH v11 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality,
Olga Kornievskaia
Possibly unwanted rootcontext= behavior?,
Ondrej Mosnacek
[PATCH] selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling,
Paul Moore
[PATCH v22 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- <Possible follow-ups>
- [PATCH v22 00/23] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v22 18/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v22 17/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v22 19/23] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v22 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v22 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v22 00/23] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v23 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v23 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v23 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v23 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v23 15/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v23 16/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v23 17/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v23 18/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v23 19/23] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v23 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v23 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
[RFC PATCH 0/1] selinux-testsuite: Reduce sctp test runtime,
Richard Haines
Changes to Travis Usage,
William Roberts
[PATCH] selinux: drop super_block backpointer from superblock_security_struct,
Ondrej Mosnacek
[PATCH testsuite] tests/overlay: replace Python script with a C program,
Ondrej Mosnacek
[PATCH testsuite] tests/Makefile: silence modprobe output,
Ondrej Mosnacek
[PATCH V2 0/1] selinux-testsuite: Add btrfs support for filesystem tests,
Richard Haines
homedir file context definitions,
Vit Mojzis
[PATCH testsuite] travis: handle the case of multiple rawhide images,
Ondrej Mosnacek
[PATCH testsuite] travis: fix kernel update check,
Ondrej Mosnacek
[PATCH userspace] ci: bump Fedora image version to 33,
Ondrej Mosnacek
[PATCH testsuite v2 0/4] Test all filesystems by default,
Ondrej Mosnacek
[PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data,
Tushar Sugandhi
[PATCH testsuite] travis: bump stable fedora version to 33,
Ondrej Mosnacek
[PATCH testsuite 0/3] Test all filesystems by default,
Ondrej Mosnacek
[PATCH] python/sepolicy: allow to override manpage date,
Bernhard M. Wiedemann
[PATCH testsuite] travis: skip kernel update+reboot if it's not necessary,
Ondrej Mosnacek
[PATCH userspace v2] ci: use parallel build,
Ondrej Mosnacek
[PATCH userspace] ci: use parallel build, Ondrej Mosnacek
[RFC] Finding the right target branch for patches that span IMA and SeLinux,
Tushar Sugandhi
[PATCH] test_sctp.te: avoid use of corenet_sctp_bind_generic_node(),
Ondrej Mosnacek
[RFC PATCH v2] selinux: Fix kmemleak after disabling selinux runtime,
Chen Jun
[PATCH 00/34] fs: idmapped mounts,
Christian Brauner
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH 07/34] capability: handle idmapped mounts, Christian Brauner
- [PATCH 03/34] fs: add mount_setattr(), Christian Brauner
- [PATCH 04/34] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH 11/34] acl: handle idmapped mounts, Christian Brauner
- [PATCH 22/34] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH 31/34] expfs: handle idmapped mounts, Christian Brauner
- [PATCH 25/34] exec: handle idmapped mounts, Christian Brauner
- [PATCH 18/34] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking, Christian Brauner
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest, Christian Brauner
- [PATCH 24/34] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH 23/34] utimes: handle idmapped mounts, Christian Brauner
- [PATCH 20/34] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH 28/34] audit: handle idmapped mounts, Christian Brauner
- [PATCH 17/34] namei: introduce struct renamedata, Christian Brauner
- [PATCH 32/34] overlayfs: handle idmapped lower directories, Christian Brauner
- [PATCH 27/34] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH 10/34] attr: handle idmapped mounts, Christian Brauner
- [PATCH 21/34] open: handle idmapped mounts, Christian Brauner
- [PATCH 34/34] fat: handle idmapped mounts, Christian Brauner
- [PATCH 29/34] ima: handle idmapped mounts, Christian Brauner
- [PATCH 33/34] overlayfs: handle idmapped merged mounts, Christian Brauner
- [PATCH 26/34] fs: add helpers for idmap mounts, Christian Brauner
- [PATCH 30/34] ext4: support idmapped mounts, Christian Brauner
- [PATCH 14/34] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH 12/34] xattr: handle idmapped mounts, Christian Brauner
- [PATCH 15/34] stat: add mapped_generic_fillattr(), Christian Brauner
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH 08/34] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH 09/34] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH 06/34] fs: add id translation helpers, Christian Brauner
- Re: [PATCH 00/34] fs: idmapped mounts, Sargun Dhillon
- Re: [PATCH 00/34] fs: idmapped mounts, Dave Chinner
- Re: [PATCH 00/34] fs: idmapped mounts, Eric W. Biederman
- Message not available
Re: [PATCH 00/34] fs: idmapped mounts, Andy Lutomirski
selinux_file_permission() on pipes/pseudo-files - performance issue,
Ondrej Mosnacek
[PATCH] libsemanage/genhomedircon: check usepasswd in add_user,
Vit Mojzis
[PATCH AUTOSEL 5.9 068/147] selinux: access policycaps with READ_ONCE/WRITE_ONCE, Sasha Levin
[PATCH AUTOSEL 5.8 060/132] selinux: access policycaps with READ_ONCE/WRITE_ONCE, Sasha Levin
[Travis/GitHub] Migrating SELinuxProject projects to travis-ci.com (vs. travis-ci.org),
Ondrej Mosnacek
How to avoid relabeling rootfs at every boot,
Ian M
[RESEND PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv, Mark Salyzyn
[PATCH 0/2] Fix ASCONF test and ensure it can be always run,
Ondrej Mosnacek
[PATCH testsuite] travis: update the kernel and reboot before running the suite,
Ondrej Mosnacek
[RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix,
Mark Salyzyn
[PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix,
Mark Salyzyn
Re: [PATCH v17 1/4] Add flags option to get xattr method paired to __vfs_getxattr,
Paul Moore
Re: [PATCH v17 0/4] overlayfs override_creds=off & nested get xattr fix, Paul Moore
[PATCH V2] libsepol/cil: Give error for more than one true or false block,
James Carter
[PATCH] libselinux: Add build option to disable X11 backend,
Björn Bidar
[PATCH] libselinux: LABEL_BACKEND_ANDROID add option to enable it,
Björn Bidar
[PATCH v5.4 v2 0/4] Update SELinuxfs out of tree and then swapover,
Daniel Burgener
[PATCH] libsepol/cil: Give error for more than one true or false block,
James Carter
[PATCH v5.4 0/3] Update SELinuxfs out of tree and then swapover,
Daniel Burgener
[PATCH] lsm_selinux: Convert to Markdown,
Richard Haines
[PATCH testsuite 0/1],
Ondrej Mosnacek
[PATCH 0/1] selinux-testsuite: Add btrfs support for filesystem tests,
Richard Haines
[GIT PULL] SELinux patches for v5.10,
Paul Moore
[PATCH 00/22] SELinux Notebook: Convert batch 3 to markdown/tidy up,
Richard Haines
- [PATCH 11/22] subjects: Convert to markdown, Richard Haines
- [PATCH 03/22] object_classes_permissions: : Tidy up formatting, Richard Haines
- [PATCH 08/22] selinux_cmds: Convert to markdown, Richard Haines
- [PATCH 09/22] selinux_overview: Convert to markdown, Richard Haines
- [PATCH 15/22] types_of_policy: Convert to markdown, Richard Haines
- [PATCH 22/22] xperm_rules: Tidy up formatting, Richard Haines
- [PATCH 18/22] userspace_libraries: Tidy up formatting, add toc, Richard Haines
- [PATCH 21/22] xen_statements: Tidy up formatting, Richard Haines
- [PATCH 19/22] vm_support: Tidy up formatting, Richard Haines
- [PATCH 01/22] kernel_policy_language: Tidy up formatting, Richard Haines
- [PATCH 06/22] postgresql: Tidy up formatting, Richard Haines
- [PATCH 12/22] toc: Tidy up formatting, Richard Haines
- [PATCH 13/22] type_enforcement: Convert to markdown, Richard Haines
- [PATCH 07/22] security_context: Convert to markdown, Richard Haines
- [PATCH 02/22] mls_statements: Convert to markdown, Richard Haines
- [PATCH 04/22] policy_config_files: Tidy up formatting, Richard Haines
- Re: [PATCH 00/22] SELinux Notebook: Convert batch 3 to markdown/tidy up, Paul Moore
- [PATCH 16/22] user_statements:: Tidy up formatting, Richard Haines
- [PATCH 20/22] x_windows: Tidy up formatting, Richard Haines
- [PATCH 14/22] type_statements: Add toc, tidy up formatting, Richard Haines
- [PATCH 05/22] policy_validation_example: Tidy up formatting, Richard Haines
- [PATCH 17/22] users: Tidy up formatting, Richard Haines
- [PATCH 10/22] sid_statement: Convert to markdown, Richard Haines
[PATCH v21 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v21 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v21 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v21 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v21 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v21 05/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v21 06/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v21 07/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v21 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v21 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v21 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v21 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v21 12/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v21 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v21 14/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v21 15/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v21 16/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v21 17/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v21 18/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v21 19/23] audit: add support for non-syscall auxiliary records, Casey Schaufler
- [PATCH v21 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v21 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v21 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v21 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH v21 00/23] LSM: Module stacking for AppArmor, John Johansen
[PATCH v10 0/3] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
libsepol, libsemanage: drop duplicate and deprecated symbols,
Petr Lautrbach
Re: selinux: how to query if selinux is enabled,
Paul Moore
Re: [PATCH 4/4] libsemanage: Bump libsemanage.so version,
Petr Lautrbach
[PATCH 1/1] libselinux: convert matchpathcon to selabel_lookup(),
Nicolas Iooss
[PATCH 1/2] libsepol: drop confusing BUG_ON macro,
Nicolas Iooss
[PATCH userspace] libsepol/cil: fix signed overflow caused by using (1 << 31) - 1,
Nicolas Iooss
[PATCH v5 00/16] Introduce partial kernel_read_file() support,
Kees Cook
- [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum, Kees Cook
- [PATCH v5 03/16] fs/kernel_read_file: Split into separate include file, Kees Cook
- [PATCH v5 05/16] fs/kernel_read_file: Remove redundant size argument, Kees Cook
- [PATCH v5 10/16] module: Call security_kernel_post_load_data(), Kees Cook
- [PATCH v5 09/16] firmware_loader: Use security_post_load_data(), Kees Cook
- [PATCH v5 15/16] firmware: Add request_partial_firmware_into_buf(), Kees Cook
- [PATCH v5 13/16] fs/kernel_file_read: Add "offset" arg for partial reads, Kees Cook
- [PATCH v5 14/16] firmware: Store opt_flags in fw_priv, Kees Cook
- [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook, Kees Cook
- [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file, Kees Cook
- [PATCH v5 12/16] IMA: Add support for file reads without contents, Kees Cook
- [PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument, Kees Cook
- [PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook, Kees Cook
- [PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t, Kees Cook
- [PATCH v5 02/16] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum, Kees Cook
- [PATCH v5 16/16] test_firmware: Test partial read support, Kees Cook
[PATCH][selinux-notebook] Link to Reference policy,
Topi Miettinen
[PATCH 1/4] libsepol: Get rid of the old and duplicated symbols,
Petr Lautrbach
[PATCH 0/3] Add LSM/SELinux support for GPRS Tunneling Protocol (GTP),
Richard Haines
[PATCH v2 0/1] selinux: fix error initialization in inode_doinit_with_dentry(), rentianyue
[RFC PATCH] lsm,selinux: pass the family information along with xfrm flow,
Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]