Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] semanage/test-semanage.py: Return non-zero value when some of unittest tests fail, (continued)
- [PATCH] selinux-testsuite: Add nftables to inet_socket and sctp tests,
Richard Haines
- [PATCH] chcat: don't crash if access to binary policy is prohibited,
bauen1
- [PATCH -next] selinux: netlabel: Remove unused inline function selinux_netlbl_conn_setsid,
YueHaibing
- [PATCH testsuite] tests/filesystem: fix quotas_test,
Stephen Smalley
- [PATCH v4 testsuite 00/15] Update to work on Debian,
Stephen Smalley
- [PATCH v4 testsuite 01/15] test_capable_net.te: remove corenet_tcp/udp_sendrecv_all_ports(), Stephen Smalley
- [PATCH v4 testsuite 02/15] test_execute_no_trans.te: stop using mmap_file_perms, Stephen Smalley
- [PATCH v4 testsuite 08/15] test_overlayfs.te: allow test_overlay_mounter_t to read user tmp files, Stephen Smalley
- [PATCH v4 testsuite 07/15] test_policy.if: use ptynode instead of unconfined_devpts_t, Stephen Smalley
- [PATCH v4 testsuite 09/15] policy: Add MCS constraint on peer recv, Stephen Smalley
- [PATCH v4 testsuite 11/15] test_filesystem.te,tests/{fs_}filesystem: do not force user identity to system_u, Stephen Smalley
- [PATCH v4 testsuite 14/15] tests/mmap: skip /dev/zero tests if /dev is noexec, Stephen Smalley
- [PATCH v4 testsuite 13/15] tests/cap_userns: set /proc/sys/kernel/unprivileged_userns_clone if needed, Stephen Smalley
- [PATCH v4 testsuite 15/15] README.md: Add instructions for Debian, Stephen Smalley
- [PATCH v4 testsuite 12/15] policy/Makefile: conditionalize setting of allow_domain_fd_use, Stephen Smalley
- [PATCH v4 testsuite 06/15] test_sctp.te: make netlabel_peer_t a MCS-constrained type, Stephen Smalley
- [PATCH v4 testsuite 04/15] test_global.te: allow test domains to statfs selinuxfs, Stephen Smalley
- [PATCH v4 testsuite 03/15] test_ibendport.te: use dev_rw_infiniband_mgmt_dev(), Stephen Smalley
- [PATCH v4 testsuite 05/15] test_inet_socket.te: switch from generic_port to _all_unreserved_ports(), Stephen Smalley
- [PATCH v4 testsuite 10/15] policy: Add defaultrange rules for overlay tests, Stephen Smalley
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian, Stephen Smalley
- Re: [PATCH v4 testsuite 00/15] Update to work on Debian, Ondrej Mosnacek
- [PATCH v3] selinux-testsuite: update to work on Debian, Stephen Smalley
- [PATCH v2] selinux-testsuite: update to work on Debian,
Stephen Smalley
- [PATCH] selinux-testsuite: update to work on Debian,
Stephen Smalley
- Re: [PATCH] selinux-testsuite: update to work on Debian, Ondrej Mosnacek
[PATCH] sepolgen: parse gen_tunable as bool,
Christian Göttsche
Intent to release 3.1-rc1,
Petr Lautrbach
[PATCH] Travis-CI: upgrade to Ubuntu 18.04 and latest releases of Python and Ruby,
Nicolas Iooss
[PATCH v2 0/3] Inline some hashtab functions to improve performance,
Ondrej Mosnacek
[PATCH v3 0/2] userspace: Implement new format of filename trans rules,
Ondrej Mosnacek
[PATCH] selinux: fix return value on error in policydb_read(),
Ondrej Mosnacek
Re: fuse doesn't use security_inode_init_security?,
Stephen Smalley
[PATCH 1/2] scripts/env_use_destdir: fix Fedora support,
Nicolas Iooss
[PATCH] README: add much useful information,
Nicolas Iooss
[PATCH] libsepol/tests: drop ncurses dependency,
Nicolas Iooss
[GIT PULL] SELinux fixes for v5.7 (#2),
Paul Moore
[PATCH] selinux: properly handle multiple messages in selinux_netlink_send(),
Paul Moore
[PATCH v2] sepolicy: fix some typos and port definitions,
Topi Miettinen
[PATCH 1/2] restorecond: Rename restorecond-user.service to restorecond_user.service,
Petr Lautrbach
[PATCH 0/2] SELinux: Improve hashing,
siarhei . liakh
[PATCH] sepolicy-gui: fix columns in transitions view #232,
Topi Miettinen
Daemon cannot execute python,
Ian Pilcher
[PATCH] sepolicy: fix some typos and port definitions #230,
Topi Miettinen
[PATCH 0/4] Inline some hashtab functions to improve performance,
Ondrej Mosnacek
[PATCH v2] libselinux: mount selinuxfs noexec and nosuid,
Topi Miettinen
Race condition during policy load in kernel,
Daniel Burgener
[PATCH -next] selinux: fix error return code in cond_read_list(),
Wei Yongjun
[PATCH] setsebool: report errors from commit phase,
Topi Miettinen
[PATCH] python/semanage: Use ipaddress module instead of IPy,
Petr Lautrbach
selinux_netlink_send changes program behavior,
Dmitry Vyukov
[PATCH v3 0/3] perf: make Perf tool aware of SELinux access control,
Alexey Budankov
[PATCH] Convert README to README.md,
Petr Lautrbach
[PATCH v2 0/4] perf: make Perf tool aware of SELinux access control,
Alexey Budankov
[PATCH] selinux: don't produce incorrect filename_trans_count,
Ondrej Mosnacek
[RFC PATCH] selinux-testsuite: Run tests using remote server, Richard Haines
[PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information, Arnaldo Carvalho de Melo
[PATCH 16/60] doc/admin-guide: update kernel.rst with CAP_PERFMON information, Arnaldo Carvalho de Melo
[PATCH 14/60] drivers/oprofile: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 13/60] drivers/perf: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 12/60] parisc/perf: open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 11/60] powerpc/perf: open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 10/60] trace/bpf_trace: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 08/60] perf tools: Support CAP_PERFMON capability, Arnaldo Carvalho de Melo
[PATCH 07/60] perf/core: open access to probes for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space, Arnaldo Carvalho de Melo
[PATCH 1/2] libsemanage: clarify handle-unkown configuration setting in man page,
Christian Göttsche
[PATCH] libselinux: mark security_context_t typedef as deprecated,
Christian Göttsche
[PATCH 1/1] python/semanage: check rc after getting it,
Nicolas Iooss
[PATCH 1/1] libselinux,libsemanage: remove double blank lines,
Nicolas Iooss
[PATCH 1/1] libselinux/utils: remove unneeded variable in Makefile,
Nicolas Iooss
[RFC PATCH] selinux-testsuite: Add check for key changes on watch_queue,
Richard Haines
Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next,
Paul Moore
[PATCH v3 0/2] Hash context structures directly,
Ondrej Mosnacek
[GIT PULL] SELinux fixes for v5.7 (#1),
Paul Moore
[PATCH v2] selinux: implement new format of filename transitions,
Ondrej Mosnacek
[PATCH v2 0/2] Hash context structures directly,
Ondrej Mosnacek
Deprecated Annotations in libselinux,
William Roberts
[PATCH] selinux-testsuite: add capability:sys_admin to the bpf() related test domains,
Paul Moore
ebitmap_node ate over 40GB of memory,
郭彬
[PATCH] selinux: free str on error in str_read(),
Ondrej Mosnacek
[PATCH -next] selinux: fix warning Comparison to bool,
Zou Wei
semodule -i and load_policy coredumps on version 3.0 - not latest GIT,
Russell Coker
Re: Coverity: filename_trans_read_one(): Resource leaks, Ondrej Mosnacek
[PATCH 12/26] parisc/perf: open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 11/26] powerpc/perf: open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 13/26] drivers/perf: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information, Arnaldo Carvalho de Melo
[PATCH 16/26] doc/admin-guide: update kernel.rst with CAP_PERFMON information, Arnaldo Carvalho de Melo
[PATCH 14/26] drivers/oprofile: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 08/26] perf tools: Support CAP_PERFMON capability, Arnaldo Carvalho de Melo
[PATCH 10/26] trace/bpf_trace: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 07/26] perf/core: open access to probes for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process, Arnaldo Carvalho de Melo
[PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space, Arnaldo Carvalho de Melo
[PATCH 1/3] restorecond: migrate to GDbus API provided by glib-gio,
Nicolas Iooss
Duplicate versions of libsemanage symbols,
Nicolas Iooss
[PATCH 1/3] libselinux: add missing glue code to grab errno in Python bindings,
Nicolas Iooss
[PATCH 0/2] Hash context structures directly,
Ondrej Mosnacek
[PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables,
siarhei . liakh
- [PATCH 1/9] SELinux: Introduce "Advanced Hashing" Kconfig option, siarhei . liakh
- [PATCH 2/9] SELinux: Use Bob Jenkins' lookup3 hash in AVC, siarhei . liakh
- [PATCH 3/9] SELinux: Expose AVC sizing tunables via Kconfig, siarhei . liakh
- [PATCH 4/9] SELinux: Replace custom hash in avtab with generic lookup3 from the library, siarhei . liakh
- [PATCH 6/9] SELinux: Replace custom hash with generic lookup3 in policydb, siarhei . liakh
- [PATCH 5/9] SELinux: Expose AVTab sizing tunables via Kconfig, siarhei . liakh
- [PATCH 7/9] SELinux: Expose filename_tr hash table sizing via Kconfig, siarhei . liakh
- [PATCH 8/9] SELinux: Replace custom hash with generic lookup3 in symtab, siarhei . liakh
- [PATCH 9/9] SELinux: Expose netport hash table sizing via Kconfig, siarhei . liakh
- Re: [PATCH 0/9] SELinux: Improve hash functions and sizing of hash tables, Paul Moore
[RFC] IMA: New IMA measurements for dm-crypt and selinux,
Tushar Sugandhi
[PATCH] selinux: drop unnecessary smp_load_acquire() call,
Ondrej Mosnacek
[PATCH v2 1/1] fix building against musl and uClibc libc libraries.,
aduskett
[PATCH 1/1] fix building against musl and uClibc libc libraries.,
aduskett
[PATCH v2] selinux: store role transitions in a hash table,
Ondrej Mosnacek
Question about shell_exec_t,
Joe Nall
[PATCH] tree-wide: use python module importlib instead of the deprecated imp,
Christian Göttsche
[PATCH] tree-wide: install python libraries on Debian with appropriate option,
Christian Göttsche
[PATCH v16 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v16 10/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v16 11/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v16 12/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v16 13/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v16 14/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v16 17/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v16 18/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v16 19/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes, Casey Schaufler
- [PATCH v16 21/23] Audit: Add a new record for multiple object LSM attributes, Casey Schaufler
- [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v16 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
[PATCH] selinux: store role transitions in a hash table,
Ondrej Mosnacek
[PATCH] libselinux: Add missing errno setup,
Richard Filo
libsepol releases,
Russell Coker
[PATCH 0/2] setfiles: Add -E option to treat conflicting specifications as errors.,
Chris PeBenito
[PATCH 1/2] libselinux: Add selinux_restorecon option to treat conflicting specifications as an error.,
Chris PeBenito
[PATCH] selinux-testsuite: Add notify gitignore file,
Richard Haines
[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- [PATCH v8 01/12] capabilities: introduce CAP_PERFMON to kernel and user space, Alexey Budankov
- [PATCH v8 02/12] perf/core: open access to the core for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 03/12] perf/core: open access to probes for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support, Alexey Budankov
- [PATCH v8 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 07/12] powerpc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 08/12] parisc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 09/12] drivers/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v8 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information, Alexey Budankov
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information, Alexey Budankov
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability, Arnaldo Carvalho de Melo
- Re: [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability, Ravi Bangoria
[PATCH] selinux: Fix all those pesky denials breaking my computer,
Sultan Alsawaf
ANN: SETools 4.3.0, Chris PeBenito
[GIT PULL] SELinux patches for v5.7,
Paul Moore
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user,
syzbot
[PATCH] libselinux: mount selinuxfs nodev,noexec,nosuid,
Topi Miettinen
[PATCH v2 0/2] userspace: Implement new format of filename trans rules,
Ondrej Mosnacek
[PATCH] selinux: clean up indentation issue with assignment statement,
Colin King
[PATCH 0/2] userspace: Implement new format of filename trans rules,
Ondrej Mosnacek
[PATCH] selinux: implement new format of filename transitions,
Ondrej Mosnacek
PR 193 sitting for uClibC fix,
William Roberts
[PATCH V2 0/2] selinux-testsuite: Use native filesystem for tests,
Richard Haines
testing for disable-dontaudit in C code,
Ted Toth
[PATCH] tree-wide: replace last occurrences of security_context_t,
Christian Göttsche
[PATCH] checkpolicy: add missing forward declaration,
Christian Göttsche
libsemanage: drop dso infrastructure,
bill . c . roberts
[PATCH v4] Add tests for default_range glblub,
Joshua Brindle
[PATCH v3] Add tests for default_range glblub,
Joshua Brindle
Looking for help testing patch attestation,
Konstantin Ryabitsev
checkpolicy does not forward (t1 == t2) constraint correctly,
Christian Göttsche
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]