Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH userspace v3 3/7] semodule: add flag to enable policy optimization, (continued)
- [PATCH userspace v2 0/7] Remove redundant rules when building policydb,
Ondrej Mosnacek
- [PATCH] trivial typo fix, Jokke Hämäläinen
- [PATCH]: trivial fix incorrect indentation, Jokke Hämäläinen
- [PATCH] More accurate error messages, Jokke Hämäläinen
- [PATCH] trivial kernel_to_conf.c checks,
Jokke Hämäläinen
- [PATCH] remove redundant if, Jokke Hämäläinen
- [PATCH] trivial: remove unneeded int,
Jokke Hämäläinen
- [PATCH] checkpolicy: Add option to optimize policydb when writing kernel policy, James Carter
- SELinux integration in sysVinit,
Laurent Bigonville
- [PATCH userspace 0/4] Remove redundant rules when building policydb,
Ondrej Mosnacek
- [PATCH 3/3] restorecond: Update to handle new digest scheme, Richard Haines
- [PATCH 0/3] Update restorecon to support new digest scheme,
Richard Haines
<Possible follow-ups>
[PATCH 0/3] Update restorecon to support new digest scheme, Richard Haines
[RFC V2 PATCH] selinux-testsuite: Add test for restorecon, Richard Haines
[PATCH 1/3] libselinux: Save digest of all partial matches for directory, Richard Haines
[PATCH 2/3] setfiles: Update utilities for the new digest scheme,
Richard Haines
[GIT PULL] SELinux fixes for v5.2 (#1),
Paul Moore
[PATCH] libsepol/cil: Allow validatetrans rules to be resolved,
Richard Haines
[PATCH] conf-parse.y checks (with style fixes removed),
Jokke Hämäläinen
ImportError: cannot import name '_selinux' from 'selinux' with swig-4.0.0, Petr Lautrbach
SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support),
Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), James Morris
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jethro Beekman
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Dr. Greg
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- RE: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Xing, Cedric
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Dr. Greg
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Andy Lutomirski
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Stephen Smalley
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Sean Christopherson
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
- Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support), Jarkko Sakkinen
[PATCH userspace v2] libsepol: add ebitmap_for_each_set_bit macro,
Ondrej Mosnacek
[PATCH userspace] run_init: fix build when crypt() is not in unistd.h,
Ondrej Mosnacek
[PATCH userspace] libsepol: add ebitmap_for_each_set_bit macro,
Ondrej Mosnacek
[PATCH] General code cleanups, sanity checks and strdup() checks,
Jokke Hämäläinen
[PATCH] Trivial style fixes pt2,
Jokke Hämäläinen
[PATCH] Trivial style improvements, Jokke Hämäläinen
Subject: [PATCH 1/2] Unify code style to preserve my sanity, Jokke Hämäläinen
[PATCH] Global replace exit(0) with more readable exit(EXIT_SUCCESS),
Jokke Hämäläinen
[PATCH 2/2] another style fix,
Jokke Hämäläinen
[PATCH] Check strdup() failure,
Jokke Hämäläinen
[PATCH v3] selinux: do not report error on connect(AF_UNSPEC),
Paolo Abeni
[PATCH v2] selinux: do not report error on connect(AF_UNSPEC),
Paolo Abeni
[PATCH net v2] Revert "selinux: do not report error on connect(AF_UNSPEC)",
Paolo Abeni
[PATCH net] Revert "selinux: do not report error on connect(AF_UNSPEC)",
Paolo Abeni
Mislabeled /proc/<pid>/ns/mnt files?,
Jeffrey Vander Stoep
[PATCH] libselinux: Eliminate use of security_compute_user(),
Petr Lautrbach
[PATCH net] selinux: do not report error on connect(AF_UNSPEC),
Paolo Abeni
[PATCH RFC] selinux: provide __le variables explicitly,
Nicholas Mc Guire
[GIT PULL] SELinux patches for v5.2,
Paul Moore
[PATCH] selinux: support attributes in type transitions,
Ondrej Mosnacek
[PATCH] selinux: remove some no-op BUG_ONs,
Ondrej Mosnacek
Possible regression test failure?,
Dan Noland
[ANNOUNCE][CFP] Linux Security Summit Europe 2019, Elena Reshetova
[GIT PULL] SELinux fixes for v5.1 (#3),
Paul Moore
An update on my kernel "secnext" builds and testing, Paul Moore
scripts/selinux build error in 4.14 after glibc update,
Nathan Chancellor
[PATCH] proc: prevent changes to overridden credentials,
Paul Moore
[PATCH 00/90] LSM: Module stacking for all,
Casey Schaufler
- [PATCH 04/90] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 01/90] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/90] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 05/90] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 06/90] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 07/90] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 08/90] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 09/90] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 11/90] LSM: Fix logical operation in lsm_export checks, Casey Schaufler
- [PATCH 12/90] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 10/90] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 13/90] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 14/90] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 15/90] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 17/90] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 19/90] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 18/90] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 21/90] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 22/90] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 20/90] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 23/90] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 24/90] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 25/90] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 28/90] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 27/90] NET: Change the UNIXCB from a secid to an lsm_export, Casey Schaufler
- [PATCH 26/90] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 29/90] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 30/90] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 33/90] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 32/90] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 34/90] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 31/90] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 35/90] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 37/90] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 36/90] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 38/90] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 39/90] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 41/90] LSM: Use lsm_context in inode_notifysecctx hooks, Casey Schaufler
- [PATCH 40/90] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 42/90] LSM: Use lsm_context in dentry_init_security hooks, Casey Schaufler
- [PATCH 43/90] LSM: Use lsm_context in security_dentry_init_security, Casey Schaufler
- [PATCH 44/90] LSM: Use lsm_context in security_inode_notifysecctx, Casey Schaufler
- [PATCH 46/90] LSM: Use lsm_context in security_secctx_to_secid, Casey Schaufler
- [PATCH 47/90] LSM: Use lsm_context in release_secctx hooks, Casey Schaufler
- [PATCH 45/90] LSM: Use lsm_context in security_inode_getsecctx, Casey Schaufler
- [PATCH 48/90] LSM: Use lsm_context in security_release_secctx, Casey Schaufler
- [PATCH 50/90] fs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 52/90] LSM: Use lsm_context in inode_setsecctx hooks, Casey Schaufler
- [PATCH 53/90] LSM: Use lsm_context in security_inode_setsecctx, Casey Schaufler
- [PATCH 54/90] kernfs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 51/90] LSM: Add the release function to the lsm_context, Casey Schaufler
- [PATCH 02/90] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 55/90] LSM: Remove unused macro, Casey Schaufler
- [PATCH 56/90] LSM: Special handling for secctx lsm hooks, Casey Schaufler
- [PATCH 57/90] SELinux: Use blob offset in current_sid, Casey Schaufler
- [PATCH 59/90] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH 58/90] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH 61/90] LSM: Make getting the secmark right cleaner, Casey Schaufler
- [PATCH 60/90] LSM: Add secmark_relabel_packet to the set of one call hooks, Casey Schaufler
- [PATCH 63/90] Smack: Consolidate secmark conversions, Casey Schaufler
- [PATCH 64/90] netfilter: Remove unnecessary NULL check in lsm_context, Casey Schaufler
- [PATCH 62/90] netfilter: Fix memory leak introduced with lsm_context, Casey Schaufler
- [PATCH 66/90] LSM: refactor security_setprocattr, Casey Schaufler
- [PATCH 65/90] LSM: Add secmark refcounting to call_one list, Casey Schaufler
- [PATCH 67/90] Smack: Detect if secmarks can be safely used, Casey Schaufler
- [PATCH 68/90] LSM: Support multiple LSMs using inode_init_security, Casey Schaufler
- [PATCH 69/90] LSM: Use full security context in security_inode_setsecctx, Casey Schaufler
- [PATCH 70/90] LSM: Correct handling of ENOSYS in inode_setxattr, Casey Schaufler
- [PATCH 72/90] LSM: Fix for security_init_inode_security, Casey Schaufler
- [PATCH 73/90] Smack: Advertise the secid to netlabel, Casey Schaufler
- [PATCH 74/90] LSM: Change error detection for UDP peer security, Casey Schaufler
- [PATCH 71/90] LSM: Infrastructure security blobs for mount options, Casey Schaufler
- [PATCH 77/90] Netlabel: Add a secattr comparison API function, Casey Schaufler
- [PATCH 76/90] Smack: Set netlabel flags properly on new label import, Casey Schaufler
- [PATCH 75/90] Smack: Fix setting of the CIPSO MLS_CAT flags, Casey Schaufler
- [PATCH 78/90] Smack: Let netlabel do the work on the ambient domain, Casey Schaufler
- [PATCH 79/90] Smack: Don't set the socket label on each send, Casey Schaufler
- [PATCH 80/90] Smack: Let netlabel do the work on connections, Casey Schaufler
- [PATCH 81/90] Netlabel: Return the labeling type on socket, Casey Schaufler
- [PATCH 49/90] LSM: Use lsm_context in security_secid_to_secctx, Casey Schaufler
- Re: [PATCH 00/90] LSM: Module stacking for all, Stephen Smalley
[RFC PATCH] selinux-testsuite: Add test for restorecon,
Richard Haines
[RFC PATCH 0/1] libselinux: Save digest of all partial matches for directory,
Richard Haines
[RFC PATCH 1/1] libselinux: Save digest of all partial matches for directory, Richard Haines
[PATCH] libselinux: Ignore the stem when looking up all matches in file context, xunchang
[PATCH 0/2] checkmodule: allow building modules of a specific version,
Gary Tierney
[PATCH net] selinux: fix potential memory leak in selinux_socket_bind(),
Mao Wenan
Re: [PATCH 1/3] selinux: Check address length before reading address family, Paul Moore
Re: kernel BUG at kernel/cred.c:434!,
Casey Schaufler
[PATCH] selinux testsuite: Do not build SCTP unless kernel support,
Richard Haines
[ANNOUNCE][CFP] Linux Security Summit North America 2019, James Morris
Sorry about duplicates on the stacking patches, Casey Schaufler
[PATCH 00/59] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH 01/59] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 03/59] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 04/59] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks, Casey Schaufler
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS, Casey Schaufler
- [PATCH 29/59] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 28/59] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 36/59] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 37/59] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 31/59] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks, Casey Schaufler
- [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks, Casey Schaufler
- [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security, Casey Schaufler
- [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx, Casey Schaufler
- [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks, Casey Schaufler
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx, Casey Schaufler
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid, Casey Schaufler
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 34/59] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 02/59] LSM: Infrastructure management of the sock security, Casey Schaufler
- <Possible follow-ups>
- [PATCH 00/59] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH 01/59] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 03/59] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 04/59] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks, Casey Schaufler
- [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 28/59] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS, Casey Schaufler
- [PATCH 29/59] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 31/59] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 34/59] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 36/59] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 37/59] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 02/59] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH 00/59] LSM: Module stacking for AppArmor, Casey Schaufler
- [PATCH 03/59] LSM: Infrastructure management of the key security blob, Casey Schaufler
- [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks, Casey Schaufler
- [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks, Casey Schaufler
- [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks, Casey Schaufler
- [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks, Casey Schaufler
- [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm, Casey Schaufler
- [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure, Casey Schaufler
- [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks, Casey Schaufler
- [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid, Casey Schaufler
- [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks, Casey Schaufler
- [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks, Casey Schaufler
- [PATCH 25/59] Audit: Convert osid to an lsm_export structure, Casey Schaufler
- [PATCH 29/59] NET: Remove scaffolding on new secmarks, Casey Schaufler
- [PATCH 33/59] IMA: FIXUP prototype using lsm_export, Casey Schaufler
- [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export, Casey Schaufler
- [PATCH 37/59] LSM: Create a data structure for a security context, Casey Schaufler
- [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match, Casey Schaufler
- [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks, Casey Schaufler
- [PATCH 04/59] LSM: Create an lsm_export data structure., Casey Schaufler
- [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks, Casey Schaufler
- [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks, Casey Schaufler
- [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid, Casey Schaufler
- [PATCH 36/59] LSM: Limit calls to certain module hooks, Casey Schaufler
- [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx, Casey Schaufler
- [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks, Casey Schaufler
- [PATCH 31/59] Netlabel: Replace secids with lsm_export, Casey Schaufler
- [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx, Casey Schaufler
- [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as, Casey Schaufler
- [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security, Casey Schaufler
- [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx, Casey Schaufler
- [PATCH 28/59] NET: Remove scaffolding on secmarks, Casey Schaufler
- [PATCH 49/59] LSM: Use lsm_context in security_secid_to_secctx, Casey Schaufler
- [PATCH 11/59] LSM: Fix logical operation in lsm_export checks, Casey Schaufler
- [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks, Casey Schaufler
- [PATCH 48/59] LSM: Use lsm_context in security_release_secctx, Casey Schaufler
- [PATCH 52/59] LSM: Use lsm_context in inode_setsecctx hooks, Casey Schaufler
- [PATCH 51/59] LSM: Add the release function to the lsm_context, Casey Schaufler
- [PATCH 50/59] fs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 53/59] LSM: Use lsm_context in security_inode_setsecctx, Casey Schaufler
- [PATCH 54/59] kernfs: remove lsm_context scaffolding, Casey Schaufler
- [PATCH 01/59] LSM: Infrastructure management of the superblock, Casey Schaufler
- [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS, Casey Schaufler
- [PATCH 35/59] AppArmor: Remove unnecessary hook stub, Casey Schaufler
- [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks, Casey Schaufler
- [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid, Casey Schaufler
- [PATCH 59/59] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display, Casey Schaufler
- [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid, Casey Schaufler
- [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid, Casey Schaufler
- [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks, Casey Schaufler
- [PATCH 26/59] IMA: Clean out lsm_export scaffolding, Casey Schaufler
- [PATCH 32/59] LSM: Remove lsm_export scaffolding functions, Casey Schaufler
- [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram, Casey Schaufler
- [PATCH 57/59] SELinux: Use blob offset in current_sid, Casey Schaufler
- [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid, Casey Schaufler
- [PATCH 34/59] Smack: Restore the release_secctx hook, Casey Schaufler
- [PATCH 56/59] LSM: Special handling for secctx lsm hooks, Casey Schaufler
- [PATCH 55/59] LSM: Remove unused macro, Casey Schaufler
- [PATCH 02/59] LSM: Infrastructure management of the sock security, Casey Schaufler
- Re: [PATCH 00/59] LSM: Module stacking for AppArmor, Stephen Smalley
[PATCH] semanage/semanage-boolean.8: Fix a minor typo,
Petr Lautrbach
[PATCH] Add security_validatetrans support,
Joshua Brindle
[PATCH 1/1] selinux-testsuite: Update binder test applications,
Richard Haines
[PATCH v4] kernfs: fix xattr name handling in LSM helpers,
Ondrej Mosnacek
[PATCH v3] kernfs: fix xattr name handling in LSM helpers,
Ondrej Mosnacek
[PATCH] MAINTAINERS: update SELinux file patterns, Paul Moore
[RFC PATCH 39/68] vfs: Convert selinuxfs to use the new mount API, David Howells
[PATCH AUTOSEL 4.19 179/192] selinux: do not override context on context mounts, Sasha Levin
[PATCH AUTOSEL 4.14 116/123] selinux: do not override context on context mounts, Sasha Levin
[PATCH AUTOSEL 4.9 82/87] selinux: do not override context on context mounts, Sasha Levin
[PATCH AUTOSEL 5.0 244/262] selinux: do not override context on context mounts, Sasha Levin
[PATCH v2] kernfs: fix xattr name handling in LSM helpers,
Ondrej Mosnacek
[PATCH] kernfs: fix xattr name handling in LSM helpers, Ondrej Mosnacek
[PATCH] Bad file pattern in 'SELINUX SECURITY MODULE',
Casey Schaufler
Bad file pattern in MAINTAINERS section 'SELINUX SECURITY MODULE',
Joe Perches
Re: [kernfs] e19dfdc83b: BUG:KASAN:global-out-of-bounds_in_s,
Paul Moore
[PATCH] [v3] selinux: avoid uninitialized variable warning,
Arnd Bergmann
[PATCH] [v2] selinux: avoid uninitialized variable warning,
Arnd Bergmann
[PATCH] selinux: remove useless assignments,
Ondrej Mosnacek
[PATCH] selinux: fixed parse warning Using plain integer as NULL pointer,
Hariprasad Kelam
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]