Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument, (continued)
- [PATCH v4 0/2] userspace: Implement new format of filename trans rules,
Ondrej Mosnacek
- Reporting a use-after-free read bug in userfaultfd_release(), Peilin Ye
- [PATCH v2] libselinux: Use sestatus if open,
Mike Palmiotto
- [PATCH] python/audit2allow: add #include <limits.h> to sepolgen-ifgen-attr-helper.c,
W. Michael Petullo
- [PATCH] selinux: make use of variables when defining libdir and includedir,
W. Michael Petullo
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring,
David Howells
- [PATCH v2 0/5] LSM: Measure security module state,
Lakshmi Ramasubramanian
- [PATCH] restorecond: Set X-GNOME-HiddenUnderSystemd=true in restorecond.desktop file,
Laurent Bigonville
- [SELinux-notebook PATCH] adds CIL policy with makefile,
Dominick Grift
- [PATCH v1 0/5] LSM: Measure security module state,
Lakshmi Ramasubramanian
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE,
Adrian Reber
- Fwd: RedHat 8 Default Context mismatch,
Jason Strauss
- [PATCH] libselinux: Use sestatus if open,
Mike Palmiotto
- genhomedircon and passwd,
Dominick Grift
- [SELinux-notebook RFC] mypolicy is a simple CIL policy with Makefile to get started with,
Dominick Grift
- [PATCH] selinux-testsuite: Review and update SCTP tests,
Richard Haines
- ANN: SELinux userspace release 2020-07-10 / 3.1, Petr Lautrbach
- [SELinux-notebook PATCH] onjects.md: some clarifications,
Dominick Grift
- [PATCH v4 0/2] Inline some hashtab functions to improve performance,
Ondrej Mosnacek
- travis: any reason we have keep going on make commands,
William Roberts
- [SELinux-notebook PATCH] pam_login.md: pam_selinux_permit is known as pam_sepermit upstream,
Dominick Grift
- 3.1 release notes draft,
Petr Lautrbach
- [SELinux-notebook PATCH] avc_rules.md: mention secilc with the neverallow statement,
Dominick Grift
- [SELinux-notebook PATCH] auditing.md: describe avc record permissive keyword,
Dominick Grift
- [PATCH v18 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v18 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v18 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v18 05/23] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v18 13/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v18 19/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v18 20/23] Audit: Add new record for multiple process LSM attributes, Casey Schaufler
- [PATCH v18 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v18 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v3 0/3] Inline some hashtab functions to improve performance,
Ondrej Mosnacek
- ANN: The SELinux Notebook in markdown on GitHub,
Paul Moore
- [PATCH v2] policycoreutils: setfiles: do not restrict checks against a binary policy,
Antoine Tenart
- [PATCH] security/selinux: Fix spelling mistakes in the comments,
lihao
- Strange AVC denials without effect,
Topi Miettinen
- Rebased selinux/working-selinuxns, Paul Moore
- [PATCH] selinux-testsuite: Remove unused sctp code,
Richard Haines
- [PATCH] policycoreutils: setfiles: do not restrict checks against a binary policy,
Antoine Tenart
- [PATCH v4 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE,
Adrian Reber
- [RFC PATCH] fixfiles: correctly restore context of mountpoints,
bauen1
- [RFC] userspace: netlink/sestatus feature parity,
Mike Palmiotto
- [PATCH] Update the cil docs to match the current behaviour.,
bauen1
- Daemon's child getting weird denial,
Ian Pilcher
- [PATCH testsuite] travis: fix `make conf` invocation,
Ondrej Mosnacek
- [PATCH] security: selinux: ss: conditional.c fixed a checkpatch warning,
Ethan Edwards
- [PATCH testsuite 0/4] Various CI-related testsuite fixes,
Ondrej Mosnacek
- [GIT PULL] SELinux fixes for v5.8 (#1),
Paul Moore
- CIL classmap with set named all resulting in segfault,
bauen1
- ANN: SELinux userspace 3.1-rc2 release candidate, Petr Lautrbach
- Re: Still Failing: SELinuxProject/selinux#444 (master - b3d8b99),
Petr Lautrbach
- [PATCH v2] setfiles: clarify documented path resolution behaviour,
Jonathan Lebon
- CIL blockinherit and entering a macro namespace using in,
bauen1
- [PATCH v3 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE,
Adrian Reber
- [PATCH] selinux: log error messages on required process class / permissions,
Stephen Smalley
- [PATCH] scripts/selinux/mdp: fix initial SID handling,
Stephen Smalley
- [PATCH v3 1/1] fs: move kernel_read_file* to its own include file,
Scott Branden
- [PATCH v2 1/1] fs: move kernel_read_file* to its own include file,
Scott Branden
- [PATCH] selinux: fix undefined return of cond_evaluate_expr,
trix
- Minimal CIL policy requires process class with transition permission,
bauen1
- [PATCH] fs: move kernel_read_file* to its own include file,
Scott Branden
- [PATCH v3] selinux: fix another double free,
trix
- [PATCH] libselinux: Fix NULL pointer use in selinux_restorecon_set_sehandle,
Ji Qin
- How to off RBAC in SELinux?,
Mikhail Novosyolov
- [PATCH v2 0/1] selinux: fix another double free,
trix
- [PATCH] selinux: fix another double free,
trix
- [PATCH v2 0/1] selinux: fix double free,
trix
- [PATCH 0/1] selinux: fix double free,
trix
- [PATCH testsuite] defconfig: add NETFILTER_XT_MATCH_STATE and NFS_V4_1,
Stephen Smalley
- No window opening when running sandbox -S,
Cristian Ariza
- [PATCH AUTOSEL 5.7 153/274] selinux: fix error return code in policydb_read(), Sasha Levin
- [PATCH AUTOSEL 5.4 093/175] selinux: fix error return code in policydb_read(), Sasha Levin
- [PATCH v2] Add restorecon -x option to not cross FS boundaries,
Peter Whittaker
- [PATCH] python/sepolicy: Use xml.etree.ElementTree.Element.iter(),
Petr Lautrbach
- Better management of dynamic networks?,
Topi Miettinen
- [PATCH v2] semanage: handle getprotobyname() failure case,
Topi Miettinen
- [PATCH] libselinux: fix selinux_restorecon() statfs bug,
Stephen Smalley
- [PATCH] setfiles: clarify documented path resolution behaviour,
Jonathan Lebon
- sepolicy test fails with Python-3.9, Petr Lautrbach
- [PATCH v2 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE,
Adrian Reber
- [PATCH] selinux-testsuite: Review and rework sctp tests,
Richard Haines
- [PATCH] semanage-node.8: describe netmask,
Topi Miettinen
- Re: [PATCH] RFC: fuse: virtiofs: Call security hooks on new inodes, Vivek Goyal
- [PATCH testsuite] policy/test_overlayfs.te: allow mounter to create whiteouts,
Stephen Smalley
- [PATCH] Avoid using getprotobyname(),
Topi Miettinen
- [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort,
Paul Moore
- Fwd: ❌ FAIL: Test report for kernel 5.7.0-f359287.cki (mainline.kernel.org),
Ondrej Mosnacek
- [GIT PULL] SELinux patches for v5.8,
Paul Moore
- [PATCH] selinux: Allow file owner to set "security.sehash",
Chirantan Ekbote
- [PATCH v2] semanage bash completion: handle semanage module,
Topi Miettinen
- Interests in usability enhancements to .../scripts.py?, Peter Whittaker
- [PATCH] libselpol: Sort portcon rules consistently,
James Carter
- [PATCH v4] selinux: allow reading labels before policy is loaded,
Jonathan Lebon
- CIL typealiases,
Dominick Grift
- [PATCH v2] selinux: allow reading labels before policy is loaded,
Jonathan Lebon
- [PATCH v3 1/2] libsepol/cil: Initialize the multiple_decls field of the cil db,
James Carter
- [PATCH] Add restorecon -x opt to not cross FS boundaries (cf github #208),
Peter Whittaker
- [PATCH] semanage bash completion: handle semanage module #246,
Topi Miettinen
- krb5 policy bug,
Corey Penford
- Issue with fixfiles excludes,
Chris Adams
- [PATCH] checkpolicy: Minor tweaks to the names of the contributors to the manpages,
Andrej Shadura
- [PATCH] selinux: allow reading labels before policy is loaded,
Jonathan Lebon
- CFLAGS overridden by distribution build system,
Laurent Bigonville
- general protection fault in selinux_socket_recvmsg,
syzbot
- [PATCH v2 1/3] libsepol: Write CIL default MLS rules on separate lines,
James Carter
- [PATCH v3 1/2] libsepol: Fix type alias handling in kernel_to_cil,
James Carter
- Question about SELinux and hard resource limits,
Ondrej Mosnacek
- [PATCH] libselinux: utils: link with shared libfts,
Đoàn Trần Công Danh
- [PATCH] capabilities: Introduce CAP_RESTORE,
Adrian Reber
Re: [PATCH] capabilities: Introduce CAP_RESTORE, Jann Horn
Re: [PATCH] capabilities: Introduce CAP_RESTORE, Matt Helsley
[PATCH 1/3] libsepol: Write CIL default MLS rules on separate lines,
James Carter
[PATCH v2 1/2] libsepol: Fix type alias handling in kernel_to_cil,
James Carter
[PATCH V5] selinux-testsuite: Add nftables to inet_socket and sctp tests,
Richard Haines
Documentation on Enabling NetLabel,
Paul Tagliamonte
[PATCH 1/2] libsepol: Fix type alias handling in kernel_to_cil,
James Carter
[PATCH] README: Add kernel-modules for SCTP,
william . c . roberts
[PATCH V4] selinux-testsuite: Add nftables to inet_socket and sctp tests,
Richard Haines
Travis CI: Run selinux-testsuite,
bill . c . roberts
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]