Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: Kernel memory corruption in CIPSO labeled TCP packets processing., (continued)
- [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__(),
Nicolas Iooss
- RFC: introduce new library versions for added symbols,
Petr Lautrbach
- [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts,
Stephen Smalley
- [PATCH] setsebool: support use of -P on SELinux-disabled hosts, Stephen Smalley
- Re: [PATCH] security/selinux/hooks: remove unneeded semicolon, Paul Moore
- last call for selinux 2.9-rc1 release, Petr Lautrbach
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent,
Ondrej Mosnacek
- general protection fault in ebitmap_destroy,
syzbot
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent,
Ondrej Mosnacek
[PATCH] selinux: avc: mark avc node as not a leak,
Prateek Patel
[PATCH AUTOSEL 4.20 032/117] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.19 25/97] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.14 12/53] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.9 09/36] selinux: always allow mounting submounts, Sasha Levin
[PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub,
Stephen Smalley
[PATCH] libsemanage: set selinux policy root around calls to selinux_boolean_sub, Stephen Smalley
[PATCH 0/5] Run tests in python/ with "make test",
Nicolas Iooss
[PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py,
Nicolas Iooss
[PATCH 1/2] python/semanage: explain why sepolicy is imported in a function,
Nicolas Iooss
selinux list move final notice, Stephen Smalley
[PATCH] libsemanage: Always set errno to 0 before calling getpwent(),
Laurent Bigonville
[V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error,
bill . c . roberts
[GIT PULL] SELinux patches v4.21,
Paul Moore
[large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11,
Nicolas Iooss
[PATCH 1/4] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it,
Nicolas Iooss
[PATCH v2 0/2] Fix SELinux context mount with the cgroup filesystem,
Ondrej Mosnacek
Fix semanage in envinronment without default policy or when -S <store> is used,
Petr Lautrbach
[PATCH 1/3] semanage_migrate_store: fix many Python linter warnings,
Nicolas Iooss
[PATCH] mcstrans: Fix check in raw_color(),
Petr Lautrbach
Fwd: [PATCH 3/7] selinux: convert to kvmalloc,
Stephen Smalley
[PATCH 1/1] python/sepolgen: always indent with 4 spaces,
Nicolas Iooss
[PATCH 1/2] mcstrans: convert test scripts to Python 3,
Nicolas Iooss
[PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error,
bill . c . roberts
[RFC PATCH 0/3] Fix SELinux context mount with the cgroup filesystem,
Ondrej Mosnacek
SELinux testsuite failure in overlayfs with v4.20-rc kernels,
James Morris
[PATCH] python/sepolicy: search() also for dontaudit rules,
Petr Lautrbach
[PATCH 1/2] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy,
Nicolas Iooss
[PATCH 1/2] python/chcat: improve the code readability,
Nicolas Iooss
[RFC PATCH v2 1/2] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries,
Vit Mojzis
[PATCH] python/semanage: Include MCS/MLS range when exporting local customizations,
Vit Mojzis
SELinux logging problem,
BMK
[PATCH] python/chcat: use check_call instead of getstatusoutput,
Petr Lautrbach
[RFC PATCH v4 0/2] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
Kernel Ueventd KConfig,
William Roberts
Security modules and sending signals within the same process,
Florian Weimer
[GIT PULL] SELinux fixes for v4.20 (#2),
Paul Moore
[RFC PATCH v3 0/9] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
[PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN,
Paul Moore
[PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests,
Stephen Smalley
overlayfs access checks on underlying layers,
Miklos Szeredi
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock,
Casey Schaufler
- [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM, Casey Schaufler
- [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection, Casey Schaufler
- [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization, Casey Schaufler
- [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 18/38] LSM: Introduce enum lsm_order, Casey Schaufler
- [PATCH v5 16/38] LoadPin: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST, Casey Schaufler
- [PATCH v5 20/38] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v5 25/38] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 26/38] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 27/38] Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v5 30/38] LSM: Infrastructure management of the file security, Casey Schaufler
- [PATCH v5 31/38] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 34/38] LSM: Infrastructure management of the task security, Casey Schaufler
- [PATCH v5 32/38] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 33/38] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v5 15/38] LSM: Split LSM preparation from initialization, Casey Schaufler
- [PATCH v5 36/38] Smack: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive, Casey Schaufler
- [PATCH v5 28/38] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR, Casey Schaufler
- [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic, Casey Schaufler
- [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state, Casey Schaufler
- [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v5 29/38] Smack: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 17/38] Yama: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 02/38] LSM: Provide separate ordered initialization, Casey Schaufler
- [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs, Casey Schaufler
- [PATCH v5 06/38] LSM: Introduce CONFIG_LSM, Casey Schaufler
- [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list, Casey Schaufler
- [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize, Casey Schaufler
- [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable, Casey Schaufler
- [PATCH v5 23/38] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v5 22/38] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 21/38] Smack: Abstract use of cred security blob, Casey Schaufler
- Message not available
<Possible follow-ups>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock, Casey Schaufler
- [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR, Casey Schaufler
- [PATCH v5 21/38] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 20/38] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v5 29/38] Smack: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v5 33/38] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v5 36/38] Smack: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 34/38] LSM: Infrastructure management of the task security, Casey Schaufler
- [PATCH v5 30/38] LSM: Infrastructure management of the file security, Casey Schaufler
- [PATCH v5 32/38] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 31/38] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 28/38] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v5 27/38] Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v5 26/38] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 25/38] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 22/38] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 23/38] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST, Casey Schaufler
- [PATCH v5 16/38] LoadPin: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 18/38] LSM: Introduce enum lsm_order, Casey Schaufler
- [PATCH v5 17/38] Yama: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM, Casey Schaufler
- [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization, Casey Schaufler
- [PATCH v5 15/38] LSM: Split LSM preparation from initialization, Casey Schaufler
- [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list, Casey Schaufler
- [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable, Casey Schaufler
- [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic, Casey Schaufler
- [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection, Casey Schaufler
- [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize, Casey Schaufler
- [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs, Casey Schaufler
- [PATCH v5 06/38] LSM: Introduce CONFIG_LSM, Casey Schaufler
- [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state, Casey Schaufler
- [PATCH v5 02/38] LSM: Provide separate ordered initialization, Casey Schaufler
- [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive, Casey Schaufler
[RFC PATCH v2 0/4] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
Re: linux-next: manual merge of the selinux tree with the vfs tree,
Ondrej Mosnacek
[PATCH] selinux: make "selinux_policycap_names[]" const char *,
Alexey Dobriyan
Re: [PATCH] libsepol: ibpkeys.c: fix printf format string specifiers for subnet_prefix, Nicolas Iooss
[PATCH 1/1] Documentation: Update SELinux reference policy URL,
Petr Vorel
[PATCH] selinux: always allow mounting submounts,
Ondrej Mosnacek
[PATCH] dbus: remove deprecated at_console statement,
Petr Lautrbach
Container SELinux Customization tool - udica, Lukas Vrabec
[GIT PULL] SELinux fixes for v4.20 (#1),
Paul Moore
[PATCH] selinux: fix non-MLS handling in mls_context_to_sid(),
Paul Moore
Kernel panic - not syncing: corrupted stack end detected inside scheduler, Qian Cai
[RFC PATCH 0/3] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150,
Qian Cai
[PATCH v3] selinux: simplify mls_context_to_sid(),
Ondrej Mosnacek
[no subject],
Ravi Kumar
- Re:, Ravi Kumar
- Re:, Ondrej Mosnacek
[PATCH 1/1] gui: remove html_util.py,
Nicolas Iooss
Re: [PATCH 1/1] libselinux: selinux_restorecon: fix printf format string specifier for uint64_t, Nicolas Iooss
ANN: SETools 4.2.0, Chris PeBenito
[PATCH v2] selinux: simplify mls_context_to_sid(), Ondrej Mosnacek
[PATCH] selinux: simplify mls_context_to_sid(), Ondrej Mosnacek
Re: [PATCH] python: replace aliases with corresponding type names,
Vit Mojzis
Re: [PATCH] libsemanage: set selinux policy root to match semanage root or storename,
Nicolas Iooss
Re: [PATCH 1/1] libsepol: mark permissive types when loading a binary policy,
Nicolas Iooss
SELinux MLS for Apache Process,
Ishara Fernando
[PATCH v6 0/5] LSM: Support ptrace sidechannel access checks,
Casey Schaufler
[PATCH 0/2] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
cil mlsconstrain,
Ted Toth
[PATCH v6] selinux: policydb - fix byte order and alignment issues,
Ondrej Mosnacek
[PATCH v2] libsepol: add missing ibendport port validity check,
Ondrej Mosnacek
[PATCH v5] selinux: policydb - fix byte order and alignment issues, Ondrej Mosnacek
[PATCH] libsepol: add missing ibendport port validity check,
Ondrej Mosnacek
[PATCH v4] selinux: policydb - fix byte order and alignment issues,
Ondrej Mosnacek
[PATCH v2] libsepol: fix endianity in ibpkey range checks,
Ondrej Mosnacek
[PATCH] libsepol: fix endianity in ibpkey range checks,
Ondrej Mosnacek
[PATCH v3] selinux: policydb - fix byte order and alignment issues,
Ondrej Mosnacek
Fix alias handling in sepolicy and semaange,
Vit Mojzis
[PATCH v2] selinux: fix byte order and alignment issues in policydb.c,
Ondrej Mosnacek
[GIT PULL] SELinux fixes for v4.19 (#1),
Paul Moore
[RFC] proposal for resolving the cred_guard_mutex deadlock, Jann Horn via Selinux
[PATCH v2 0/1] Modify exception handling in semanage_migrate_store,
Yuli Khodorkovskiy
[PATCH 0/4] libsepol: Cleanup initial sid handling when writing CIL and policy.conf files,
James Carter
[PATCH 0/2] libsepol: Add ability to sort ocontexts in libsepol and add option to use it in checkpolicy,
James Carter
[PATCH] README: Update the SELinux mailing list location, Stephen Smalley
Blocking exec on processes based on arguments,
Ville Baillie
[PATCH] MAINTAINERS: update the SELinux mailing list location,
Paul Moore
Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace,
Jann Horn via Selinux
selinux list is moving, Stephen Smalley
[PATCH] libsemanage: improve semanage_migrate_store import failure,
Yuli Khodorkovskiy
[PATCH] selinux-testsuite: update the dependencies in README.md,
Paul Moore
[PATCH] restorecond: Do not ignore the -f option,
Ondrej Mosnacek
[PATCH] selinux: fix race when removing selinuxfs entries,
Ondrej Mosnacek
ANN: SETools 4.2.0-rc, Chris PeBenito
[PATCH v5 0/5] LSM: Support ptrace sidechannel access checks,
Casey Schaufler
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]