Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v2 1/6] Add a new flags-accepting interface for anonymous inodes, (continued)
- [PATCH 0/2] Optimize storage of filename transitions,
Ondrej Mosnacek
- [PATCH] selinux-testsuite: add the quota package to the list of deps in README.md,
Paul Moore
- [PATCH v5] libselinux: Eliminate use of security_compute_user(),
Petr Lautrbach
- [GIT PULL] SELinux fixes for v5.6 (#1),
Paul Moore
- [PATCH v4] libselinux: Eliminate use of security_compute_user(),
Petr Lautrbach
- [PATCH v3] libselinux: Eliminate use of security_compute_user(),
Petr Lautrbach
- [PATCH] label_file.c: Fix MAC build,
Nick Kralevich
- [PATCH v3] security: selinux: allow per-file labeling for bpffs,
Steven Moreland
- [PATCH userspace] libsepol/cil: remove unnecessary hash tables,
Ondrej Mosnacek
- [PATCH] libselinux: drop error return from is_selinux_enabled.3,
Christian Göttsche
- [PATCH v2] security: selinux: allow per-file labeling for bpffs,
Steven Moreland
- [PATCH] security: selinux: allow per-file labeling for bpffs,
Steven Moreland
- [PATCH 0/2] userspace: Fix DEBUG=1 build,
Ondrej Mosnacek
- [RFC PATCH 0/2] userspace: Allow changing version of kernel policy built by semodule,
Ondrej Mosnacek
- Test to trace kernel bug in fsconfig(2) with nfs,
Richard Haines
- Test to trace kernel bug in fsconfig(2) with btrfs, Richard Haines
- IPv6 netmask in nodecon statement,
Christian Göttsche
- [PATCH v2] libselinux: Eliminate use of security_compute_user(),
Petr Lautrbach
- [RFC PATCH 0/1] selinux-testsuite: Test all mount option context types,
Richard Haines
- [ANNOUNCE][CFP] Linux Security Summit North America 2020,
James Morris
security/selinux: Add support for new key permissions,
Richard Haines
rangetranstion in cil fails and doesn't produce explanatory output,
Denis Obrezkov
[PATCH v3 0/5] selinux: Assorted simplifications and cleanups,
Ondrej Mosnacek
[PATCH] selinux: fix sidtab string cache locking,
Ondrej Mosnacek
[RFC PATCH] libsepol: Add 'key_perms' policy capability,
Richard Haines
[RFC PATCH 0/1] selinux-testsuite: Add additional key permission tests,
Richard Haines
[PATCH] selinux: Fix typo in filesystem name,
Hridya Valsaraju
[PATCH] selinux-testsuite: Binder goto brexit fix,
Richard Haines
[PATCH] libsepol/cil: Rewrite verification of map classes and classpermissionsets,
James Carter
[PATCH] libsepol: add support for new polcap genfs_seclabel_symlinks,
Christian Göttsche
[PATCH v3 1/2] testsuite: provide support for testing labeled NFS,
Stephen Smalley
[PATCH v2 1/2] testsuite: provide support for testing labeled NFS,
Stephen Smalley
[PATCH] testsuite: add further nfs tests,
Stephen Smalley
[PATCH 0/1] selinux-testsuite: Add watch_sb and watch_mount checks,
Richard Haines
[PATCH] testsuite: provide support for testing labeled NFS,
Stephen Smalley
[PATCH] testsuite: enable running over labeled NFS,
Stephen Smalley
[PATCH v2] selinux: remove unused initial SIDs and improve handling,
Stephen Smalley
[PATCH v2] libsepol,checkpolicy: support omitting unused initial sid contexts,
Stephen Smalley
[PATCH] libsepol,checkpolicy: support omitting unused initial sid contexts,
Stephen Smalley
CIL: another segfault producer,
Dominick Grift
[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space, Alexey Budankov
- [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support, Alexey Budankov
- [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process, Alexey Budankov
- <Possible follow-ups>
- [PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability, Alexey Budankov
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space, Alexey Budankov
- [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support, Alexey Budankov
- [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process, Alexey Budankov
possible deadlock in sidtab_sid2str_put,
syzbot
Re: possible deadlock in sidtab_sid2str_put, syzbot
[GIT PULL] SELinux patches for v5.6,
Paul Moore
[PATCH] selinux: remove unused initial SIDs and improve handling,
Stephen Smalley
question about fs sid,
Dominick Grift
[PATCH V2 0/2] selinux-testsuite: Add fs*(2) API filesystem tests,
Richard Haines
[PATCH] selinux: allow kernfs symlinks to inherit parent directory context,
Christian Göttsche
[PATCH 1/1] sel_avc_get_stat_idx should increase position index,
Vasily Averin
[PATCH] selinux: seq_file .next functions should increase position index, Vasily Averin
[PATCH v14 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v14 01/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v14 05/23] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v14 13/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v14 19/23] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v14 21/23] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v14 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor, Stephen Smalley
- Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor, Stephen Smalley
[PATCH] selinux-testsuite: move variable definitions out of binder_common.h,
Paul Moore
Problems with the selinux-testsuite and GCC v10?,
Paul Moore
[PATCH] libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling,
James Carter
[PATCH] testsuite/policy: fixes for running on a labeled NFS mount,
Stephen Smalley
[PATCH userspace v2 0/4] Fix build with -fno-common,
Ondrej Mosnacek
SELinux issue with 'keys-acl' patch in kernel.org's 'linux-next' tree,
Richard Haines
[PATCH userspace 0/4] Fix build with -fno-common,
Ondrej Mosnacek
[PATCH v4] libsepol,checkpolicy: remove use of hardcoded security class values,
Stephen Smalley
[PATCH] libselinux: export flush_class_cache(), call it on policyload,
Stephen Smalley
[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space, Alexey Budankov
- [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support, Alexey Budankov
- [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 08/10] parisc/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 09/10] drivers/perf: open access for CAP_PERFMON privileged process, Alexey Budankov
- [PATCH v5 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process, Alexey Budankov
[PATCH 0/2] selinux-testsuite: Add fs*(2) API filesystem tests,
Richard Haines
[PATCH V7 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[PATCH v2] selinux: fix regression introduced by move_mount(2) syscall,
Stephen Smalley
[PATCH v3] libsepol,checkpolicy: remove use of hardcoded security class values, Stephen Smalley
any reason why a class mapping is not able to solve permissionx?,
Dominick Grift
[PATCH] libselinux: update man pages for userspace policy enforcers,
Stephen Smalley
[PATCH] selinux: move status variables out of selinux_ss,
Ondrej Mosnacek
[PATCH v3] selinux: map RTM_GETLINK to a privileged permission, Jeff Vander Stoep
[PATCH v2 0/5] selinux: Assorted simplifications and cleanups,
Ondrej Mosnacek
[PATCH RFC] selinux: policydb - convert filename trans hash to rhashtable,
Lucas Stach
[PATCH v2] libsepol,checkpolicy: remove use of hardcoded security class values, Stephen Smalley
[PATCH] libsepol,checkpolicy: remove use of hardcoded security class values,
Stephen Smalley
[PATCH v2] selinux: map RTM_GETLINK to a privileged permission, Jeff Vander Stoep
[PATCH V6 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[PATCH v2] selinux: fix wrong buffer types in policydb.c,
Ondrej Mosnacek
[PATCH] selinux: map RTM_GETLINK to a privileged permission,
Jeff Vander Stoep
[PATCH] selinux: fix sparse warnings in policydb.c,
Ondrej Mosnacek
[PATCH 0/6] selinux: Assorted simplifications and cleanups,
Ondrej Mosnacek
[PATCH] libselinux: remove flask.h and av_permissions.h,
Stephen Smalley
Re: Perf Data on LSM in v5.3,
Casey Schaufler
Message not available
Message not available
[PATCH V5 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[PATCH V4 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[RFC PATCH] selinux: implement move_mount hook,
Stephen Smalley
[PATCH v2] selinux: remove redundant selinux_nlmsg_perm,
Huaisheng Ye
[PATCH V3 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[PATCH] selinux: remove redundant selinux_nlmsg_perm,
Huaisheng Ye
[RFC PATCH] selinux: remove redundant allocation and helper functions,
Paul Moore
[PATCH testsuite] tests/prlimit: avoid invalid limit combinations,
Ondrej Mosnacek
[RFC PATCH] selinux: add policy capability for systemd overhaul,
Christian Göttsche
[RFC PATCH 0/3] Add policy capability for systemd overhaul,
Christian Göttsche
[PATCH] selinux: remove redundant msg_msg_alloc_security,
Huaisheng Ye
[PATCH V2 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
[PATCH v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.,
Ravi Kumar Siddojigari
[PATCH] selinux: make default_noexec read-only after init,
Stephen Smalley
[PATCH] Documentation,selinux: deprecate setting checkreqprot to 1,
Stephen Smalley
[PATCH v2] selinux: reorder hooks to make runtime disable less broken,
Ondrej Mosnacek
Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race,
Ondrej Mosnacek
[PATCH 4.19 011/115] afs: Fix SELinux setting security label on /afs, Greg Kroah-Hartman
[PATCH 5.4 020/191] afs: Fix SELinux setting security label on /afs, Greg Kroah-Hartman
[RFC PATCH] selinux: deprecate setting checkreqprot to 1,
Stephen Smalley
[PATCH] Documentation,selinux: fix references to old selinuxfs mount point,
Stephen Smalley
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]