Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH] Documentation,selinux: fix references to old selinuxfs mount point, (continued)
- [PATCH 0/2] LSM: Drop security_delete_hooks(),
Ondrej Mosnacek
- [PATCH v2] selinux: deprecate disabling SELinux and runtime,
Paul Moore
- [PATCH v2] selinuxfs: use scnprinft to get real length for inode,
liuyang34
- [PATCH] security: selinux: allow per-file labelling for binderfs,
Hridya Valsaraju
- [PATCH v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.,
Ravi Kumar Siddojigari
- [PATCH] selinuxfs: use scnprinft to get real length in sel_read_class,
liuyang34
- [PATCH v13 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v13 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v13 05/25] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v13 13/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v13 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v13 22/25] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH 24/25] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v13 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules, Casey Schaufler
- [PATCH -next] selinux: remove set but not used variable 'sidtab',
YueHaibing
- [PATCH] selinux: ensure the policy has been loaded before reading the sidtab stats,
Paul Moore
- Re: [selinux] 66f8e2f03c: RIP:sidtab_hash_stats,
Paul Moore
- [PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs, Sasha Levin
- [PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs, Sasha Levin
- [PATCH 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
- [PATCH] netnode.c : fix sel_netnode_hash be destroyed,
hui yang
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime,
Paul Moore
- incorrect sysfs contexts,
Christian Göttsche
- [RFC PATCH 0/8] systemd: improve SELinux support,
Christian Göttsche
- [PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND.,
Ravi Kumar Siddojigari
- [PATCH v2] selinux: clean up selinux_enabled/disabled/enforcing_boot,
Stephen Smalley
- [PATCH] selinux-testsuite: Fix policy to allow process { setfscreate } testing,
Richard Haines
- [PATCH v12 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- <Possible follow-ups>
- [PATCH v12 00/25] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v12 22/25] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v12 22/25] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- Re: [PATCH v12 00/25] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- mcstrans doesn't translate for s0 level (thus, doesn't work in mcs policy), Denis Obrezkov
- [PATCH] selinux: move pkey sid cache based retrieval under defconfig,
Ravi Kumar Siddojigari
- [PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability,
Alexey Budankov
- [RFC PATCH 0/1] selinux-testsuite: Add filesystem tests,
Richard Haines
- "watch" - Problem when using kernel >= 5.4,
Alexander Wetzel
- [RFC PATCH] selinux: randomize layout of key structures,
Stephen Smalley
Does anyone use RANDSTRUCT?,
Stephen Smalley
Re: Does anyone use RANDSTRUCT?, Kees Cook
[RFC PATCH] selinux: clean up selinux_enabled/disabled,
Stephen Smalley
[PATCH testsuite] selinux-testsuite: fix tun_tap checks,
Ondrej Mosnacek
SELinux namespaces working branch rebased, Paul Moore
[PATCH] selinux: remove unnecessary selinux cred request,
Shaokun Zhang
[PATCH] LSM: allow an LSM to disable all hooks at once,
Ondrej Mosnacek
[PATCH v2] mcstrans: start early and stop late,
Dominick Grift
[PATCH] mcstrans: start early and stop late, Dominick Grift
[PATCH 2/8] afs: Fix SELinux setting security label on /afs, David Howells
[PATCH] security: only build lsm_audit if CONFIG_SECURITY=y,
Stephen Smalley
[PATCH v4] selinux-testsuite: add lockdown tests,
Stephen Smalley
[pcmoore-selinux:next 3/6] lsm_audit.c:undefined reference to `lockdown_reasons', kbuild test robot
[RFC PATCH] security: add an interface to lookup the lockdown reason,
Paul Moore
[RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert(),
Paul Moore
Re: Looks like issue in handling active_nodes count in 4.19 kernel .,
Stephen Smalley
[PATCH 2/4] afs: Fix SELinux setting security label on /afs, David Howells
Looks like issue in handling active_nodes count in 4.19 kernel ., rsiddoji
[PATCH] selinux: reorder hooks to make runtime disable less broken,
Ondrej Mosnacek
[V4 PATCH 1/1] selinux-testsuite: Add perf_event tests,
Richard Haines
[PATCH] python/semanage: check variable type of port before trying to split,
Joshua Schmidlkofer
[PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups,
Alexey Budankov
perf and cap_syslog,
Dominick Grift
[V3 PATCH 1/1] selinux-testsuite: Add perf_event tests,
Richard Haines
[GitHub] An email address was added to your account., GitHub
[PATCH V2] selinux_testsuite: Add socketpair test,
Richard Haines
[PATCH] selinux_testsuite: Add socketpair test,
Richard Haines
[V2 PATCH 1/1] selinux-testsuite: Add perf_event tests,
Richard Haines
ANN: SELinux userspace release 2019-12-04 / 3.0, Petr Lautrbach
[PATCH] selinux-testsuite: Add TUN/TAP driver tests,
Richard Haines
[PATCH 0/1] selinux-testsuite: Add perf_event tests,
Richard Haines
[PATCH testsuite v6] policy: use the kernel_request_load_module() interface,
Ondrej Mosnacek
[RFC PATCH v3] selinux-testsuite: add lockdown tests, Stephen Smalley
[RFC PATCH v2] selinux-testsuite: add lockdown tests,
Stephen Smalley
[RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown,
Stephen Smalley
[PATCH testsuite] travis: improve selinuxfs mocking,
Ondrej Mosnacek
[PATCH testsuite v5] policy: use the kernel_request_load_module() interface,
Ondrej Mosnacek
[RFC PATCH] selinux-testsuite: Add TUN/TAP driver tests,
Richard Haines
[GIT PULL] SELinux patches for v5.5,
Paul Moore
[PATCH testsuite v4] policy: use the kernel_request_load_module() interface,
Ondrej Mosnacek
[PATCH v5] selinux: cache the SID -> context string translation,
Ondrej Mosnacek
[PATCH testsuite v3] policy: use the kernel_request_load_module() interface,
Ondrej Mosnacek
general protection fault in selinux_socket_sendmsg (2),
syzbot
[PATCH testsuite v2] policy: check for module_request support for key_socket, Ondrej Mosnacek
[PATCH testsuite] policy: check for module_request support for key_socket,
Ondrej Mosnacek
[RFC 0/3] Second phase of UserPrefix to UserRBACSEPRole transition,
Dominick Grift
[PATCH] selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests,
Stephen Smalley
[PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link",
Stephen Smalley
[PATCH V5] selinux-testsuite: Add kernel module tests,
Richard Haines
ANN: SELinux userspace 3.0-rc2 release candidate, Petr Lautrbach
[PATCH v9] selinux: sidtab: reverse lookup hash table,
Jeff Vander Stoep
[PATCH] Fix: check variable type of port before trying to split,
Joshua Schmidlkofer
[RFC PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link",
Stephen Smalley
[PATCH v8] selinux: sidtab: reverse lookup hash table,
Jeff Vander Stoep
RFC: https://github.com/SELinuxProject/selinux/issues/140#issuecomment-556049712,
Dominick Grift
[RFC PATCH 0/2] Avoid blocking in selinux inode callbacks on RCU walk,
Will Deacon
[PATCH V4] selinux-testsuite: Add kernel module tests,
Richard Haines
[PATCH] Travis-CI: Drop Python 2 from matrix,
Petr Lautrbach
[PATCH V3] selinux-testsuite: Add kernel module tests,
Richard Haines
[PATCH testsuite v4 0/3] Fix refpolicy build & build test_policy.pp in Travis,
Ondrej Mosnacek
[PATCH testsuite v3 0/3] Fix refpolicy build & build test_policy.pp in Travis,
Ondrej Mosnacek
[PATCH v7] selinux: sidtab: reverse lookup hash table,
Jeff Vander Stoep
[PATCH testsuite v2 0/3] Fix refpolicy build & build test_policy.pp in Travis,
Ondrej Mosnacek
[PATCH] dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot,
Petr Lautrbach
[PATCH V2] selinux-testsuite: Add kernel module tests,
Richard Haines
[PATCH V3] selinux-testsuite: Add key_socket tests,
Richard Haines
[PATCH v11 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]