Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH] newrole: preserve environment variable XDG_RUNTIME_DIR,
Christian Göttsche
- [PATCH 0/5] Clean up SELinux global variables,
Ondrej Mosnacek
- [PATCH] libsepol: destroy filename_trans list properly,
Nicolas Iooss
- [PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer,
Nicolas Iooss
- [PATCH v2] libsepol: ensure that decls hold consistent symbols when loading a binary policy,
Nicolas Iooss
- [PATCH] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values(),
James Carter
- [PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support,
Ondrej Mosnacek
- [PATCH] python/semanage: empty stdout before exiting on BrokenPipeError,
Vit Mojzis
- Intent to release 3.2-rc1,
Petr Lautrbach
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
- Selinux context type is same for root & normal user both,
Ashish Mishra
[PATCH 1/4] libsepol/cil: remove useless print statement,
Nicolas Iooss
[PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine,
Nicolas Iooss
libsepol/cil: infinite loop using invalid block/blockabstract,
Nicolas Iooss
[PATCH 1/6] libsepol: do not decode out-of-bound rolebounds,
Nicolas Iooss
[RFC DBUS PATCH] selinux: add option to control checking of reply messages,
Christian Göttsche
libsepol/cil: heap-use-after-free in __class_reset_perm_values, Nicolas Iooss
Inputs w.r.t understanding of selinux notification and systemcall,
Ashish Mishra
useless debug output by secilc when using expandtypeattribute in containers, bauen1
Re: [kernel-secnext] Automated Testing Results Linux 5.11.0-0.rc0.20201217gite994cc240a3b.102.1.secnext.fc34.x86_64 [12/17/2020 16:38],
Ondrej Mosnacek
[PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity,
Amir Goldstein
[PATCH v3 1/2] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
[PATCH] Revert "libsemanage/genhomedircon: check usepasswd",
Petr Lautrbach
[PATCH] libsemanage: Free contents of modkey in semanage_direct_remove,
Jakub Hrozek
[PATCH] linux: handle MPTCP consistently with TCP,
Paolo Abeni
[GIT PULL] SELinux patches for v5.11,
Paul Moore
[PATCH v9 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH v8 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH v2 1/1] selinux-testsuite: Add userfaultfd test,
Lokesh Gidra
New release of The SELinux Notebook (20201209), Paul Moore
[PATCH v7 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
virtiofs and its optional xattr support vs. fs_use_xattr,
Ondrej Mosnacek
[PATCH 1/2] GitHub Actions: upgrade to Python 3.9,
Nicolas Iooss
[PATCH] libsepol/cil: always destroy the lexer state,
Nicolas Iooss
[PATCH] reference_policy.md: Remove Ref Policy 'contributed modules',
Richard Haines
How is policy.31 created from modules under /usr/share/selinux,
Ashish Mishra
[PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
[PATCH v4 00/40] idmapped mounts,
Christian Brauner
- [PATCH v4 04/40] fs: split out functions to hold writers, Christian Brauner
- [PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper, Christian Brauner
- [PATCH v4 06/40] fs: add mount_setattr(), Christian Brauner
- [PATCH v4 08/40] fs: add id translation helpers, Christian Brauner
- [PATCH v4 09/40] mount: attach mappings to mounts, Christian Brauner
- [PATCH v4 10/40] capability: handle idmapped mounts, Christian Brauner
- [PATCH v4 07/40] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware, Christian Brauner
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware, Christian Brauner
- [PATCH v4 19/40] namei: introduce struct renamedata, Christian Brauner
- [PATCH v4 14/40] acl: handle idmapped mounts, Christian Brauner
- [PATCH v4 15/40] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v4 17/40] stat: handle idmapped mounts, Christian Brauner
- [PATCH v4 13/40] attr: handle idmapped mounts, Christian Brauner
- [PATCH v4 16/40] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v4 24/40] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v4 29/40] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v4 23/40] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v4 20/40] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v4 33/40] ima: handle idmapped mounts, Christian Brauner
- [PATCH v4 22/40] open: handle idmapped mounts, Christian Brauner
- [PATCH v4 35/40] ext4: support idmapped mounts, Christian Brauner
- [PATCH v4 39/40] tests: extend mount_setattr tests, Christian Brauner
- [PATCH v4 27/40] init: handle idmapped mounts, Christian Brauner
- [PATCH v4 32/40] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v4 25/40] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v4 26/40] notify: handle idmapped mounts, Christian Brauner
- [PATCH v4 28/40] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v4 30/40] exec: handle idmapped mounts, Christian Brauner
- [PATCH v4 34/40] fat: handle idmapped mounts, Christian Brauner
[PATCH v2 1/1] scripts/ci: add configuration for a Vagrant virtual machine,
Nicolas Iooss
[PATCH] all: various small html to markdown conversions,
Paul Moore
[RFC PATCH] selinux: handle MPTCP consistently with TCP,
Paolo Abeni
[PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU,
Stephen Brennan
Fix Checkmodule when Writing down to older Module Versions,
Matthew Ife
review needed - coreutils ported to a newer version of libselinux, Petr Lautrbach
[PATCH v3 00/38] idmapped mounts,
Christian Brauner
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v3 15/38] stat: handle idmapped mounts, Christian Brauner
- [PATCH v3 14/38] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v3 13/38] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v3 11/38] attr: handle idmapped mounts, Christian Brauner
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v3 17/38] namei: introduce struct renamedata, Christian Brauner
- [PATCH v3 12/38] acl: handle idmapped mounts, Christian Brauner
- [PATCH v3 32/38] fat: handle idmapped mounts, Christian Brauner
- [PATCH v3 25/38] init: handle idmapped mounts, Christian Brauner
- [PATCH v3 37/38] tests: extend mount_setattr tests, Christian Brauner
- [PATCH v3 30/38] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v3 23/38] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v3 21/38] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v3 31/38] ima: handle idmapped mounts, Christian Brauner
- [PATCH v3 22/38] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v3 26/38] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v3 28/38] exec: handle idmapped mounts, Christian Brauner
- [PATCH v3 20/38] open: handle idmapped mounts, Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts, Christian Brauner
- [PATCH v3 27/38] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v3 24/38] notify: handle idmapped mounts, Christian Brauner
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH v3 18/38] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v3 06/38] fs: add id translation helpers, Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr(), Christian Brauner
- [PATCH v3 07/38] mount: attach mappings to mounts, Christian Brauner
- [PATCH v3 05/38] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH v3 08/38] capability: handle idmapped mounts, Christian Brauner
- Re: [PATCH v3 00/38] idmapped mounts, Serge E. Hallyn
[PATCH userspace] travis: run only selinux-testsuite,
Ondrej Mosnacek
https://github.com/SELinuxProject/selinux/pull/271,
Petr Lautrbach
[PATCH v1 1/1] selinux-testsuite: Add userfaultfd test,
Lokesh Gidra
Failed to start Udev Kernel device manager,
Ashish Mishra
[PATCH 1/1] scripts/ci: add configuration for a Vagrant virtual machine,
Nicolas Iooss
[PATCH 1/1] Add configuration to build and run tests in GitHub Actions,
Nicolas Iooss
Re: [RFC] Introduce MAJOR.MINOR.PATCH version for the whole project, Petr Lautrbach
[PATCH 000/141] Fix fall-through warnings for Clang,
Gustavo A. R. Silva
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Gustavo A. R. Silva
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Miguel Ojeda
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Jason Gunthorpe
Message not available
Re: [PATCH 000/141] Fix fall-through warnings for Clang, Martin K. Petersen
Re: (subset) [PATCH 000/141] Fix fall-through warnings for Clang, Martin K. Petersen
[PATCH] mls_mcs.md: Convert section to markdown,
Richard Haines
[PATCH v6 0/8] IMA: support for measuring kernel integrity critical data,
Tushar Sugandhi
[PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks,
Paul Moore
[PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs,
Ondrej Mosnacek
[pcmoore-selinux:working-selinuxns 7/12] security/selinux/hooks.c:7275:42: sparse: sparse: incorrect type in argument 1 (different address spaces),
kernel test robot
[PATCH 0/6] libsepol/cil: Various CIL cleanups,
James Carter
Rebased selinux/working-selinuxns on top of selinux/next, Paul Moore
[PATCH v2 00/39] fs: idmapped mounts,
Christian Brauner
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static, Christian Brauner
- [PATCH v2 04/39] fs: add mount_setattr(), Christian Brauner
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- [PATCH v2 06/39] fs: add id translation helpers, Christian Brauner
- [PATCH v2 08/39] capability: handle idmapped mounts, Christian Brauner
- [PATCH v2 05/39] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts, Christian Brauner
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH v2 11/39] attr: handle idmapped mounts, Christian Brauner
- [PATCH v2 14/39] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH v2 12/39] acl: handle idmapped mounts, Christian Brauner
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH v2 17/39] namei: introduce struct renamedata, Christian Brauner
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH v2 18/39] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH v2 13/39] xattr: handle idmapped mounts, Christian Brauner
- [PATCH v2 15/39] stat: handle idmapped mounts, Christian Brauner
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts, Christian Brauner
- [PATCH v2 31/39] audit: handle idmapped mounts, Christian Brauner
- [PATCH v2 33/39] fat: handle idmapped mounts, Christian Brauner
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH v2 24/39] notify: handle idmapped mounts, Christian Brauner
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest, Christian Brauner
- [PATCH v2 32/39] ima: handle idmapped mounts, Christian Brauner
- [PATCH v2 28/39] exec: handle idmapped mounts, Christian Brauner
- [PATCH v2 25/39] init: handle idmapped mounts, Christian Brauner
- [PATCH v2 22/39] utimes: handle idmapped mounts, Christian Brauner
- [PATCH v2 20/39] open: handle idmapped mounts, Christian Brauner
- [PATCH v2 30/39] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH v2 23/39] fcntl: handle idmapped mounts, Christian Brauner
- [PATCH v2 26/39] ioctl: handle idmapped mounts, Christian Brauner
- [PATCH v2 34/39] ext4: support idmapped mounts, Christian Brauner
- [PATCH v2 27/39] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH v2 21/39] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts, Christian Brauner
- Re: [PATCH v2 00/39] fs: idmapped mounts, Jonathan Corbet
- Re: [PATCH v2 00/39] fs: idmapped mounts, Stephen Barber
- Re: [PATCH v2 00/39] fs: idmapped mounts, Darrick J. Wong
- Message not available
[GIT PULL] SELinux fixes for v5.10 (#1),
Paul Moore
[PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist(),
Paul Moore
[PATCH v2] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH userspace] ci: add new dependencies needed by selinux-testsuite,
Ondrej Mosnacek
[PATCH] selinux: Fix error return code in sel_ib_pkey_sid_slow(),
Chen Zhou
[PATCH v13 0/4] SELinux support for anonymous inodes and UFFD,
Lokesh Gidra
[PATCH 1/1] libsepol: free memory when realloc() fails,
Nicolas Iooss
[PATCH userspace v2 0/3] Update manpages to reflect that runtime SELinux disable is deprecated,
Ondrej Mosnacek
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]