Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v4 10/23] LSM: Use lsmblob in security_ipc_getsecid, (continued)
- [PATCH v4 16/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v4 18/23] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v4 19/23] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v4 17/23] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v4 22/23] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v4 20/23] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v4 21/23] Audit: Store LSM audit information in an lsmblob, Casey Schaufler
- [PATCH v4 23/23] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v4 02/23] LSM: Infrastructure management of the sock security, Casey Schaufler
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor, Kees Cook
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor, James Morris
- Re: [PATCH v4 00/23] LSM: Module stacking for AppArmor, John Johansen
[PATCH 1/1] libsepol: include module.c internal header in module_to_cil.c,
Nicolas Iooss
[PATCH V3 0/2] selinux: Remove legacy local boolean and user code,
Richard Haines
Re: [RFC PATCH v3 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX,
Dr. Greg
[PATCH v3 00/24] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v3 01/24] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v3 03/24] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v3 04/24] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v3 07/24] net: Prepare UDS for secuirty module stacking, Casey Schaufler
- [PATCH v3 05/24] Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v3 09/24] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v3 08/24] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v3 06/24] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v3 10/24] Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v3 13/24] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v3 12/24] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v3 11/24] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v3 14/24] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v3 17/24] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v3 16/24] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v3 15/24] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v3 19/24] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v3 18/24] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v3 21/24] Audit: Store LSM audit information in an lsmblob, Casey Schaufler
- [PATCH v3 20/24] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v3 24/24] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v3 22/24] LSM: Return the lsmblob slot on initialization, Casey Schaufler
- [PATCH v3 23/24] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v3 02/24] LSM: Infrastructure management of the sock security, Casey Schaufler
[PATCH V2 1/2] selinux: Remove legacy local boolean and user code,
Richard Haines
[PATCH V2 2/2] selinux: Update manpages after removing legacy boolean and user code, Richard Haines
[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM,
Sean Christopherson
- [RFC PATCH v4 03/12] selftests: x86/sgx: Mark the enclave loader as not needing an exec stack, Sean Christopherson
- [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves, Sean Christopherson
- [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits, Sean Christopherson
- [RFC PATCH v4 02/12] x86/sgx: Do not naturally align MAP_FIXED address, Sean Christopherson
- [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX, Sean Christopherson
- [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting, Sean Christopherson
- [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH v4 08/12] security/selinux: Require SGX_MAPWX to map enclave page WX, Sean Christopherson
- [RFC PATCH v4 11/12] security/apparmor: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH v4 06/12] mm: Introduce vm_ops->may_mprotect(), Sean Christopherson
- [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG, Sean Christopherson
- [RFC PATCH v4 09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX, Sean Christopherson
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
- [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks, Cedric Xing
- Re: [RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
[PATCH] selinux-testsuite: fix old python shebang in tests/overlay/access,
Stephen Smalley
[PATCH v2 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v2 03/25] LSM: Infrastructure management of the key blob, Casey Schaufler
- [PATCH v2 01/25] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH v2 05/25] Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v2 04/25] LSM: Create and manage the lsmblob data structure., Casey Schaufler
- [PATCH v2 06/25] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v2 07/25] net: Prepare UDS for secuirty module stacking, Casey Schaufler
- [PATCH v2 10/25] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v2 11/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v2 08/25] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v2 13/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v2 09/25] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v2 15/25] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v2 12/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v2 14/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v2 17/25] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v2 18/25] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v2 16/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v2 19/25] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v2 20/25] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v2 21/25] Audit: Store LSM audit information in an lsmblob, Casey Schaufler
- [PATCH v2 22/25] LSM: Return the lsmblob slot on initialization, Casey Schaufler
- [PATCH v2 23/25] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v2 25/25] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v2 24/25] Fix slotted list and getpeersec_d, Casey Schaufler
- [PATCH v2 02/25] LSM: Infrastructure management of the sock security, Casey Schaufler
- Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor, Kees Cook
- Re: [PATCH v2 00/25] LSM: Module stacking for AppArmor, Kees Cook
[PATCH] libsepol/cil: fix mlsconstrain segfault,
mike . palmiotto
[PATCH 2/2] libsepol: Replace constant with sizeof(),
Jokke Hämäläinen
[PATCH 1/2] libsepol: Check strdup() failures, Jokke Hämäläinen
ANN: SETools 4.2.2, Chris PeBenito
[PATCH] libsepol: check strdup() failures and replace constant,
Jokke Hämäläinen
[PATCH] libsepol: error in CIL if a permission cannot be resolved,
Yuli Khodorkovskiy
[PATCH ghak57 V1] selinux: format all invalid context as untrusted,
Richard Guy Briggs
[PATCH 3/3] libsepol: remove unneeded int,
Jokke Hämäläinen
[PATCH 2/3] checkpolicy: remove redundant if-clause, Jokke Hämäläinen
[PATCH 1/3] libsepol: more accurate error messages, Jokke Hämäläinen
[PATCH userspace v4 0/4] Remove redundant rules when building policydb,
Ondrej Mosnacek
[GIT PULL] SELinux fixes for v5.2 (#2),
Paul Moore
[PATCH v5] selinux: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
[PATCH v4] selinux: fix a missing-check bug in selinux_add_mnt_opt( ),
Gen Zhang
[PATCH] selinux: fix empty write to keycreate file,
Ondrej Mosnacek
[PATCH 00/11] libsemanage: add tests,
Jan Zarsky
- [PATCH 01/11] libsemanage: add helper functions to tests, Jan Zarsky
- [PATCH 02/11] libsemanage: test semanage_handle_* functions, Jan Zarsky
- [PATCH 03/11] libsemanage: test semanage_bool_* functions, Jan Zarsky
- [PATCH 04/11] libsemanage: test semanage_fcontext functions, Jan Zarsky
- [PATCH 05/11] libsemanage: test semanage_iface_* functions, Jan Zarsky
- [PATCH 06/11] libsemanage: test semanage_ibendport_* functions, Jan Zarsky
- [PATCH 07/11] libsemanage: test semanage_node_* functions, Jan Zarsky
- [PATCH 08/11] libsemanage: test semanage_port_* functions, Jan Zarsky
- [PATCH 09/11] libsemanage: test semanage_user_* functions, Jan Zarsky
- [PATCH 10/11] libsemanage: test semanage_context_* functions, Jan Zarsky
- [PATCH 11/11] libsemanage: test semanage_msg_default_handler, Jan Zarsky
- Re: [PATCH 00/11] libsemanage: add tests, William Roberts
[PATCH] selinux: log raw contexts as untrusted strings,
Ondrej Mosnacek
ANN: Reference Policy 2.20190609, Chris PeBenito
New Container vulnerability could potentially use an SELinux fix.,
Daniel Walsh
[RFC] libselinux: Use Python distutils to install SELinux python bindings,
Petr Lautrbach
[PATCH v3] selinux: lsm: fix a missing-check bug in selinux_add_mnt_opt( ),
Gen Zhang
[PATCH v4] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_o pts(),
Gen Zhang
[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM,
Sean Christopherson
[PATCH V2 0/2] Update restorecon to support new digest scheme, Richard Haines
[RFC PATCH 1/1] selinux: Remove legacy local boolean and user code,
Richard Haines
[PATCH V2 2/2] setfiles: Update utilities for the new digest scheme, Richard Haines
[RFC V3 PATCH] selinux-testsuite: Add test for restorecon,
Richard Haines
[PATCH] selinux-testsuite: Correct address count for asconf sctp test,
Richard Haines
[PATCH V2 1/2] libselinux: Save digest of all partial matches for directory,
Richard Haines
[PATCH V2] selinux: Fix strncpy in libselinux and libsepol, Richard Haines
[PATCH v3] selinux: lsm: fix a missing-check bug in selinux_sb_eat_lsm_opts(),
Gen Zhang
[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM,
Sean Christopherson
- [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl(), Sean Christopherson
- [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation, Sean Christopherson
- [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX, Sean Christopherson
- [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE, Sean Christopherson
- [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves, Sean Christopherson
- [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect(), Sean Christopherson
- [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES, Sean Christopherson
- [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release(), Sean Christopherson
- [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address, Sean Christopherson
- RE: [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM, Xing, Cedric
- Re: [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM, Jarkko Sakkinen
[PATCH 00/58] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH 01/58] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/58] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 04/58] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 02/58] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]