Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: WARNING: locking bug in selinux_netlbl_socket_connect, (continued)
- [PATCH] selinux: Remove load size limit,
zhanglin
- SELinux-related talks at LSS NA, Stephen Smalley
- [PATCH testsuite] tests/Makefile: check if BPF library is installed,
Ondrej Mosnacek
- [PATCH testsuite 0/2] RFE: remove special RHEL-5 and -4 policies,
Ondrej Mosnacek
- [PATCH v2 1/2] libselinux: ensure strlen() is not called on NULL,
Nicolas Iooss
- [PATCH V5 0/3] selinux-testsuite: Add BPF tests,
Richard Haines
- [PATCH] policy: fix some build errors under refpolicy,
Ondrej Mosnacek
- [PATCH 1/1] libselinux: ensure strlen() is not called on NULL,
Nicolas Iooss
- [PATCH] selinux-testsuite: drop use of userdom_read_inherited_user_tmp_files,
Stephen Smalley
- strange tclass in AVCs,
Ted Toth
- [PATCH] selinux-testsuite: apply perltidy to infiniband test scripts,
Stephen Smalley
- [PATCH] selinux-testsuite: fix test/file to avoid noise in test output,
Stephen Smalley
- [GIT PULL] SELinux patches for v5.4,
Paul Moore
- [PATCH V4 0/3] selinux-testsuite: Add BPF tests,
Richard Haines
- [PATCH] selinux: improve performance of sel_write_load(),
zhanglin
- [PATCH v2] libselinux: fix string conversion of unknown perms,
Mike Palmiotto
- Ill be out for a month, William Roberts
- [PATCH v2 1/1] libsepol: do not dereference a failed allocated pointer,
Nicolas Iooss
- [PATCH] libsepol: Remove cil_mem_error_handler() function pointer, James Carter
- [PATCH] libsepol: Make an unknown permission an error in CIL, James Carter
- [PATCH v2] selinux: allow labeling before policy is loaded,
Jonathan Lebon
- [PATCH] libselinux: fix string conversion of unknown perms,
Mike Palmiotto
- Re: cron: SE Linux support uses obsolete API and gets wrong results, Laurent Bigonville
- [PATCH v4] Add default_range glblub support,
Joshua Brindle
- Changing selinux enforcing mode at runtime,
Srivatsa Vaddagiri
- [PATCH] selinux-testsuite: Add key and key_socket tests,
Richard Haines
- Permissions in the udevadm_t domain,
Laurent Bigonville
- [PATCH] lsm: remove current_security(),
Paul Moore
- [PATCH] selinux-testsuite: don't break the system after running the cgroups_label tests,
Paul Moore
- [PATCH v4] default_range glblub implementation, Joshua Brindle
- [PATCH v3] Add default_range glblub support,
Joshua Brindle
- [PATCH] selinux: fix residual uses of current_security() for the SELinux blob,
Stephen Smalley
- [PATCH] Add configuration file for lgtm.com,
Nicolas Iooss
- [PATCH 0/9] Fix issues found by static analyzers,
Nicolas Iooss
- [PATCH 1/9] semodule-utils: fix comparison with argc, Nicolas Iooss
- [PATCH 2/9] libsepol/cil: help static analyzers by aborting when an allocation fails, Nicolas Iooss
- [PATCH 3/9] libsepol: do not dereference a failed allocated pointer, Nicolas Iooss
- [PATCH 4/9] libsepol: do not dereference scope if it can be NULL, Nicolas Iooss
- [PATCH 5/9] libsepol: reset *p to NULL if sepol_module_package_create fails, Nicolas Iooss
- [PATCH 6/9] libsepol/cil: do not dereference perm_value_to_cil when it has not been allocated, Nicolas Iooss
- [PATCH 7/9] python/chcat: remove unnecessary assignment, Nicolas Iooss
- [PATCH 8/9] python/sepolicy: remove unnecessary pass statement, Nicolas Iooss
- [PATCH 9/9] libsepol/tests: do not dereference a NULL pointer, Nicolas Iooss
- Re: [Non-DoD Source] [PATCH 0/9] Fix issues found by static analyzers, jwcart2
- Re: [PATCH] Fix many misspellings,
Nicolas Iooss
- [PATCH v2] Add default_range glblub support, Joshua Brindle
- [PATCH v3] default_range glblub implementation,
Joshua Brindle
- [PATCH v8 00/28] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v8 01/28] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v8 03/28] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v8 05/28] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v8 04/28] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v8 08/28] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v8 07/28] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v8 09/28] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v8 06/28] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v8 11/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v8 12/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v8 10/28] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v8 14/28] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v8 13/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v8 15/28] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v8 17/28] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v8 16/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v8 18/28] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v8 19/28] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v8 22/28] SELinux: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v8 20/28] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v8 21/28] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v8 24/28] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v8 23/28] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v8 25/28] LSM: Provide an user space interface for the default display, Casey Schaufler
- [PATCH v8 28/28] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v8 27/28] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v8 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH v8 02/28] LSM: Infrastructure management of the sock security, Casey Schaufler
- Re: [PATCH v8 00/28] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH v2] default_range glblub implementation,
Joshua Brindle
- [PATCH] Add tests for default_range glblub, Joshua Brindle
- [PATCH] selinux-testsuite: ensure the cgroups_label tests works on old and new systems,
Paul Moore
- [PATCH] selinux-testsuite: fix the cgroups_label test,
Paul Moore
- [PATCH] default_range glblub implementation,
Joshua Brindle
- [PATCH] Add default_range glblub support,
Joshua Brindle
- New skb extension for use by LSMs (skb "security blob")?,
Paul Moore
- [PATCH 2/2] selinux: use netlink_receive hook,
Jeff Vander Stoep
- [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook,
Jeff Vander Stoep
- [PATCH] selinux: allow labeling before policy is loaded,
Jonathan Lebon
- Question about BPF acccess checks,
Dominick Grift
- [RFC PATCH v3] security,capability: pass object information to security_capable,
Aaron Goidel
- [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection,
Aaron Goidel
- [PATCH v2] selinux: avoid atomic_t usage in sidtab,
Ondrej Mosnacek
- [PATCH V3 2/2] selinux-testsuite: Add BPF support to fdreceive test, Richard Haines
- [PATCH V3 1/2] selinux-testsuite: Add BPF tests,
Richard Haines
- [PATCH V3 0/2] selinux-testsuite: Add BPF tests, Richard Haines
- [PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications,
Aaron Goidel
- [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications,
Aaron Goidel
- [PATCH v7 00/16] LSM: Full module stacking,
Casey Schaufler
- [PATCH v7 00/16] LSM: Full module stacking, Casey Schaufler
- [PATCH v7 01/16] LSM: Single hook called in secmark refcounting, Casey Schaufler
- [PATCH v7 02/16] Smack: Detect if secmarks can be safely used, Casey Schaufler
- [PATCH v7 03/16] LSM: Support multiple LSMs using inode_init_security, Casey Schaufler
- [PATCH v7 04/16] LSM: List multiple security attributes in security_inode_listsecurity, Casey Schaufler
- [PATCH v7 08/16] LSM: Infrastructure security blobs for mount options, Casey Schaufler
- [PATCH v7 05/16] LSM: Multiple modules using security_ismaclabel, Casey Schaufler
- [PATCH v7 06/16] LSM: Make multiple MAC modules safe in nfs and kernfs, Casey Schaufler
- [PATCH v7 07/16] LSM: Correct handling of ENOSYS in inode_setxattr, Casey Schaufler
- [PATCH v7 09/16] LSM: Fix for security_init_inode_security, Casey Schaufler
- [PATCH v7 10/16] LSM: Change error detection for UDP peer security, Casey Schaufler
- [PATCH v7 11/16] Netlabel: Add a secattr comparison API function, Casey Schaufler
- [PATCH v7 12/16] Netlabel: Provide labeling type to security modules, Casey Schaufler
- [PATCH v7 13/16] LSM: Remember the NLTYPE of netlabel sockets, Casey Schaufler
- [PATCH v7 15/16] LSM: Avoid network conflicts in SELinux and Smack, Casey Schaufler
- [PATCH v7 14/16] LSM: Hook for netlabel reconciliation, Casey Schaufler
- [PATCH v7 16/16] Smack: Remove the exclusive flag, Casey Schaufler
- [PATCH v7 00/28] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v7 01/28] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v7 03/28] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v7 04/28] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v7 06/28] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v7 05/28] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v7 07/28] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH v7 09/28] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v7 08/28] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v7 11/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v7 12/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v7 10/28] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v7 14/28] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v7 13/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v7 18/28] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v7 15/28] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v7 17/28] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v7 16/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v7 19/28] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v7 21/28] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v7 22/28] SELinux: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v7 20/28] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v7 23/28] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH v7 24/28] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH v7 25/28] LSM: Provide an user space interface for the default display, Casey Schaufler
- [PATCH v7 27/28] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v7 28/28] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v7 02/28] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v7 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH 1/1] libselinux: ensure that digest_len is not zero,
Nicolas Iooss
- [PATCH 1/1] libsemanage: include internal header to use the hidden function prototypes,
Nicolas Iooss
- [GIT PULL] SELinux fixes for v5.3 (#2),
Paul Moore
- [PATCH] selinux: always return a secid from the network caches if we find one,
Paul Moore
- Security labeling in NFS4 - who owns it?,
Casey Schaufler
- [RFC PATCH v2] security,capability: pass object information to security_capable,
Aaron Goidel
- [PATCH V2 0/2] selinux-testsuite: Add BPF tests,
Richard Haines
[PATCH v2 0/4] selinux: fix race when removing selinuxfs entries,
Ondrej Mosnacek
[PATCH V2 1/2] selinux-testsuite: Add BPF tests,
Richard Haines
[PATCH] selinux: shuffle around policydb.c to get rid of forward declarations,
Paul Moore
[PATCH 0/1] selinux-testsuite: Add BPF tests,
Richard Haines
[PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications,
Aaron Goidel
userfaultfd SELinux support?,
Nick Kralevich
[PATCH] selinux: optimize MLS context to string conversion,
Ondrej Mosnacek
[PATCH v2 0/3] selinux: policydb - fix memory leak and do some cleanup,
Ondrej Mosnacek
[PATCH 1/1] libsepol: initialize a local variable once,
Nicolas Iooss
[PATCH v5 00/27] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH 02/27] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH 03/27] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH 04/27] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH 06/27] net: Prepare UDS for security module stacking, Casey Schaufler
- [PATCH 07/27] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH 05/27] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH 09/27] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH 08/27] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH 11/27] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH 10/27] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH 14/27] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH 13/27] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH 12/27] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH 15/27] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH 16/27] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH 17/27] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH 18/27] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH 19/27] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH 21/27] SELinux: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH 22/27] Audit: Add subj_LSM fields when necessary, Casey Schaufler
- [PATCH 20/27] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH 24/27] LSM: Provide an user space interface for the default display, Casey Schaufler
- [PATCH 23/27] Audit: Include object data for all security modules, Casey Schaufler
- [PATCH 25/27] NET: Add SO_PEERCONTEXT for multiple LSMs, Casey Schaufler
- [PATCH 26/27] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH 27/27] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH 01/27] LSM: Infrastructure management of the sock security, Casey Schaufler
[GIT PULL] SELinux fixes for v5.3 (#1),
Paul Moore
initramfs file-management, Claire Bocharova
[PATCH] selinux: avoid atomic_t usage in sidtab,
Ondrej Mosnacek
[PATCH] selinux: fix memory leak in policydb_init(),
Ondrej Mosnacek
[RFC PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications, Aaron Goidel
Re: memory leak in policydb_read, Dmitry Vyukov
[PATCH v2] selinux: check sidtab limit before adding a new entry,
Ondrej Mosnacek
[PATCH] selinux: check sidtab limit before adding a new entry,
Ondrej Mosnacek
[PATCH] selinux: convert struct sidtab count to refcount_t,
NitinGote
Dbus and multiple LSMs (was Preferred subj= with multiple LSMs),
Casey Schaufler
Re: Preferred subj= with multiple LSMs, Casey Schaufler
[RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications,
Aaron Goidel
[PATCH AUTOSEL 5.2 097/249] selinux: fix empty write to keycreate file, Sasha Levin
[PATCH AUTOSEL 5.1 085/219] selinux: fix empty write to keycreate file, Sasha Levin
[PATCH AUTOSEL 4.19 064/158] selinux: fix empty write to keycreate file, Sasha Levin
[PATCH 1/3] Add documentation key in systemd .service files,
Laurent Bigonville
[RFC PATCH] security,capability: pass object information to security_capable,
Nicholas Franck
[PATCH] selinux-testsuite: add tests for fsnotify,
Aaron Goidel
[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications,
Aaron Goidel
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications, Amir Goldstein
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications, Casey Schaufler
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications, Randy Dunlap
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications, Stephen Smalley
- Re: [RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications, James Morris
RFC: BUG: overlayfs getxattr recursion leaves a poison sid.,
Mark Salyzyn
[PATCH V2] libselinux: Fix security_get_boolean_names build error,
Richard Haines
[PATCH V4 0/2] Update restorecon to support new digest scheme,
Richard Haines
[PATCH V3 2/2] setfiles: Update utilities for the new digest scheme,
Richard Haines
[PATCH V3 0/2] Update restorecon to support new digest scheme,
Richard Haines
[PATCH V3 1/2] libselinux: Save digest of all partial matches for directory,
Richard Haines
[PATCH v5 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v5 01/23] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v5 04/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v5 03/23] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v5 05/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v5 06/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v5 07/23] net: Prepare UDS for secuirty module stacking, Casey Schaufler
- [PATCH v5 08/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v5 10/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v5 09/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v5 13/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v5 12/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v5 11/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v5 14/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v5 15/23] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v5 18/23] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v5 20/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v5 16/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v5 21/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v5 22/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v5 23/23] SELinux: Verify LSM display sanity in binder, Casey Schaufler
- [PATCH v5 02/23] LSM: Infrastructure management of the sock security, Casey Schaufler
[PATCH] libselinux: Fix security_get_boolean_names build error,
Richard Haines
[GIT PULL] SELinux patches for v5.3,
Paul Moore
[PATCH 1/2] Revert "mcstransd select correct colour range.",
Vit Mojzis
[PATCH ghak57 V2] selinux: format all invalid context as untrusted,
Richard Guy Briggs
[PATCH v4 00/23] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v4 03/23] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v4 01/23] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v4 06/23] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v4 04/23] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v4 05/23] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v4 07/23] net: Prepare UDS for secuirty module stacking, Casey Schaufler
- [PATCH v4 08/23] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v4 09/23] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v4 10/23] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v4 12/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v4 11/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v4 13/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v4 14/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v4 15/23] LSM: Specify which LSM to display, Casey Schaufler
[PATCH v4 16/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
[PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
[PATCH v4 19/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
[PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
[PATCH v4 22/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
[PATCH v4 20/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]