Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves, (continued)
- [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits, Sean Christopherson
- [RFC PATCH v4 02/12] x86/sgx: Do not naturally align MAP_FIXED address, Sean Christopherson
- [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX, Sean Christopherson
- [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting, Sean Christopherson
- [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX, Sean Christopherson
- [RFC PATCH v4 11/12] security/apparmor: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH v4 06/12] mm: Introduce vm_ops->may_mprotect(), Sean Christopherson
- [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG, Sean Christopherson
- [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX, Sean Christopherson
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
- [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks, Cedric Xing
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
- [PATCH] selinux-testsuite: fix old python shebang in tests/overlay/access,
Stephen Smalley
- [PATCH v2 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v2 03/25] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v2 01/25] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v2 05/25] Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v2 04/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v2 06/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v2 07/25] net: Prepare UDS for secuirty module stacking, Casey Schaufler
- [PATCH v2 10/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v2 11/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v2 08/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v2 13/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v2 09/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v2 15/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v2 12/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v2 14/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v2 17/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v2 18/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v2 16/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v2 19/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v2 20/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v2 21/25] Audit: Store LSM audit information in an lsmblob, Casey Schaufler
- [PATCH v2 22/25] LSM: Return the lsmblob slot on initialization, Casey Schaufler
- [PATCH v2 23/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v2 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v2 24/25] Fix slotted list and getpeersec_d, Casey Schaufler
- [PATCH v2 02/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor, Kees Cook
- Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor, Kees Cook
- [PATCH] libsepol/cil: fix mlsconstrain segfault,
mike . palmiotto
- [PATCH 2/2] libsepol: Replace constant with sizeof(),
Jokke Hämäläinen
- [PATCH 1/2] libsepol: Check strdup() failures, Jokke Hämäläinen
- ANN: SETools 4.2.2, Chris PeBenito
- [PATCH] libsepol: check strdup() failures and replace constant,
Jokke Hämäläinen
- [PATCH] libsepol: error in CIL if a permission cannot be resolved,
Yuli Khodorkovskiy
- [PATCH ghak57 V1] selinux: format all invalid context as untrusted,
Richard Guy Briggs
- [PATCH 3/3] libsepol: remove unneeded int,
Jokke Hämäläinen
- [PATCH 2/3] checkpolicy: remove redundant if-clause, Jokke Hämäläinen
- [PATCH 1/3] libsepol: more accurate error messages, Jokke Hämäläinen
- [PATCH userspace v4 0/4] Remove redundant rules when building policydb,
Ondrej Mosnacek
- [GIT PULL] SELinux fixes for v5.2 (#2),
Paul Moore
- [PATCH v5] selinux: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
- [PATCH v4] selinux: fix a missing-check bug in selinux_add_mnt_opt( ),
Gen Zhang
- [PATCH] selinux: fix empty write to keycreate file,
Ondrej Mosnacek
- [PATCH 00/11] libsemanage: add tests,
Jan Zarsky
- [PATCH 01/11] libsemanage: add helper functions to tests, Jan Zarsky
- [PATCH 02/11] libsemanage: test semanage_handle_* functions, Jan Zarsky
- [PATCH 03/11] libsemanage: test semanage_bool_* functions, Jan Zarsky
- [PATCH 04/11] libsemanage: test semanage_fcontext functions, Jan Zarsky
- [PATCH 05/11] libsemanage: test semanage_iface_* functions, Jan Zarsky
- [PATCH 06/11] libsemanage: test semanage_ibendport_* functions, Jan Zarsky
- [PATCH 07/11] libsemanage: test semanage_node_* functions, Jan Zarsky
- [PATCH 08/11] libsemanage: test semanage_port_* functions, Jan Zarsky
- [PATCH 09/11] libsemanage: test semanage_user_* functions, Jan Zarsky
- [PATCH 10/11] libsemanage: test semanage_context_* functions, Jan Zarsky
- [PATCH 11/11] libsemanage: test semanage_msg_default_handler, Jan Zarsky
- Re: [PATCH 00/11] libsemanage: add tests, William Roberts
- [PATCH] selinux: log raw contexts as untrusted strings,
Ondrej Mosnacek
- ANN: Reference Policy 2.20190609, Chris PeBenito
- New Container vulnerability could potentially use an SELinux fix.,
Daniel Walsh
- [RFC] libselinux: Use Python distutils to install SELinux python bindings,
Petr Lautrbach
- [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_add_mnt_opt( ),
Gen Zhang
- [PATCH v4] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_o pts(),
Gen Zhang
- [RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM,
Sean Christopherson
- [PATCH V2 0/2] Update restorecon to support new digest scheme, Richard Haines
- [RFC PATCH 1/1] selinux: Remove legacy local boolean and user code,
Richard Haines
- [PATCH V2 2/2] setfiles: Update utilities for the new digest scheme, Richard Haines
- [RFC V3 PATCH] selinux-testsuite: Add test for restorecon,
Richard Haines
- [PATCH] selinux-testsuite: Correct address count for asconf sctp test,
Richard Haines
- [PATCH V2 1/2] libselinux: Save digest of all partial matches for directory,
Richard Haines
- [PATCH V2] selinux: Fix strncpy in libselinux and libsepol, Richard Haines
- [PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
- [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM,
Sean Christopherson
- [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl(), Sean Christopherson
- [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX, Sean Christopherson
- [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE, Sean Christopherson
- [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves, Sean Christopherson
- [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect(), Sean Christopherson
- [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES, Sean Christopherson
- [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release(), Sean Christopherson
- [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address, Sean Christopherson
- RE: [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM, Xing, Cedric
- Re: [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
- [PATCH 00/58] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH 01/58] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/58] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 04/58] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 02/58] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 24/58] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 25/58] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export, Casey Schaufler
- [PATCH 27/58] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 28/58] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 31/58] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 30/58] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 32/58] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 33/58] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 35/58] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 34/58] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 36/58] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks, Casey Schaufler
- [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks, Casey Schaufler
- [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security, Casey Schaufler
- [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx, Casey Schaufler
- [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid, Casey Schaufler
- [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx, Casey Schaufler
- [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks, Casey Schaufler
- [PATCH 47/58] LSM: Use lsm_context in security_release_secctx, Casey Schaufler
- [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx, Casey Schaufler
- [PATCH 49/58] fs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 50/58] LSM: Add the release function to the lsm_context, Casey Schaufler
- Re: [PATCH 00/58] LSM: Module stacking for AppArmor, Kees Cook
- Re: [PATCH 00/58] LSM: Module stacking for AppArmor, Kees Cook
- <Possible follow-ups>
- [PATCH 00/58] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH 01/58] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/58] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 04/58] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 02/58] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 00/58] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH 01/58] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/58] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 04/58] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 24/58] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 25/58] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 27/58] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export, Casey Schaufler
- [PATCH 31/58] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 28/58] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 30/58] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 32/58] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 34/58] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 02/58] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 33/58] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 35/58] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 36/58] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security, Casey Schaufler
- [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks, Casey Schaufler
- [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx, Casey Schaufler
- [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks, Casey Schaufler
- [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx, Casey Schaufler
- [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid, Casey Schaufler
- [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks, Casey Schaufler
- [PATCH 47/58] LSM: Use lsm_context in security_release_secctx, Casey Schaufler
- [PATCH 51/58] LSM: Use lsm_context in inode_setsecctx hooks, Casey Schaufler
- [PATCH 50/58] LSM: Add the release function to the lsm_context, Casey Schaufler
- [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx, Casey Schaufler
- [PATCH 49/58] fs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 52/58] LSM: Use lsm_context in security_inode_setsecctx, Casey Schaufler
- [PATCH 54/58] LSM: Remove unused macro, Casey Schaufler
- [PATCH 53/58] kernfs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 55/58] LSM: Special handling for secctx lsm hooks, Casey Schaufler
- [PATCH 56/58] SELinux: Use blob offset in current_sid, Casey Schaufler
- [PATCH 57/58] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH 58/58] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH 00/58] LSM: Module stacking for AppArmor, Stephen Smalley
- [PATCH] selinux: Fix strncpy in libselinux and libsepol,
Richard Haines
- [PATCH v2] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
- [PATCH] hooks: fix a missing-check bug in selinux_add_mnt_opt(),
Gen Zhang
- [PATCH] hooks: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
- [PATCH] Add CONTRIBUTING,
Petr Lautrbach
- [selinux.wiki] Mention Signed-off-by in Contributing.md,
Petr Lautrbach
- [PATCH userspace v3 0/7] Remove redundant rules when building policydb,
Ondrej Mosnacek
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]