Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED, (continued)
- [PATCH] libselinux: fix selinux_restorecon() on non-SELinux hosts,
Stephen Smalley
- setfiles rootfs labeling,
sajjad ahmed via Selinux
- [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM(),
Kees Cook
- autorelabel loops in system executed 'semodule -d unconfined',
Shintaro Fujiwara
- [PATCH 1/2] whitespace and spelling cleanup,
Nick Kralevich via Selinux
- [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support,
Christian Göttsche via Selinux
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support,
Christian Göttsche via Selinux
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock,
Casey Schaufler
- [PATCH v4 01/19] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v4 03/19] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v4 02/19] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v4 06/19] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v4 08/19] Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v4 10/19] Smack: Abstract use of file security blob, Casey Schaufler
- [PATCH v4 12/19] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v4 11/19] LSM: Infrastructure management of the file security, Casey Schaufler
- [PATCH v4 13/19] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v4 15/19] LSM: Infrastructure management of the task security, Casey Schaufler
- [PATCH v4 14/19] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v4 17/19] Smack: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v4 19/19] LSM: Blob sharing support for S.A.R.A and LandLock, Casey Schaufler
- [PATCH v4 09/19] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v4 09/19] SELinux: Abstract use of file security blob, Casey Schaufler
- Re: [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock, Kees Cook
- [PATCH v4 20/19] LSM: Correct file blob free empty blob check, Casey Schaufler
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa, Casey Schaufler
- [PATCH] secilc: better error handling,
Nick Kralevich via Selinux
- [PATCH 00/34] VFS: Introduce filesystem context [ver #12],
David Howells
- Bug in selinux on ubuntu 16.04 with kernel 4.15.0-34,
Benjamin Schüle
- file context not being set on el7,
Ted Toth
- [PATCH v3 00/16] LSM: Module stacking in support of SARA and Landlock,
Casey Schaufler
- [PATCH v3 01/16] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v3 02/16] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH v3 03/16] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v3 04/16] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v3 05/16] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v3 06/16] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v3 08/16] LSM: Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v3 09/16] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v3 11/16] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v3 10/16] LSM: Infrastructure management of the file security blob, Casey Schaufler
- [PATCH v3 12/16] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v3 13/16] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v3 14/16] LSM: Infrastructure management of the task security blob, Casey Schaufler
- [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock, Casey Schaufler
- [PATCH] netfilter: nf_tables: add SECMARK support,
Christian Göttsche via Selinux
- [PATCH 1/1] python/sepolicy: fix compatibility with setools 4.2.0,
Nicolas Iooss
- [PATCH] checkpolicy: remove extraneous policy build noise,
Nick Kralevich via Selinux
- [RFC PATCH] selinux: add a fallback to defcontext for native labeling,
Taras Kondratiuk via Selinux
- FYI: email change, Paul Moore
- [PATCH] python/sepolicy: search() for dontaudit rules as well, Petr Lautrbach
- Re: [PATCH 3/6] selinux: convert to kvmalloc, Paul Moore
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock,
Casey Schaufler
- [PATCH 01/10] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH 02/10] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH 03/10] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH 06/10] LSM: Infrastructure management of the file security blob, Casey Schaufler
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH 08/10] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH 05/10] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH 09/10] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock, Casey Schaufler
- [PATCH 07/10] SELinux: Abstract use of inode security blob, Casey Schaufler
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock, James Morris
- Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock, James Morris
- MLS dominance check behavior on el7,
Ted Toth
- Bug report,
李 武刚
- systemd unit improvements, Christian Göttsche via Selinux
- WARNING: kmalloc bug in str_read,
syzbot
- [PATCH 1/2] semanage: "semanage user" does not use -s, fix documentation,
Nicolas Iooss
- [PATCH 1/1] libsemanage: use previous seuser when getting the previous name, Nicolas Iooss
- "semanage user" and -s option,
Nicolas Iooss
- [PATCH] selinux: fix mounting of cgroup2 under older policies,
Stephen Smalley
- Re: WARNING in apparmor_secid_to_secctx,
Stephen Smalley
- Re: [PATCH] SELinux: allow other LSMs to use custom mount args,
Paul Moore
- [PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks,
Casey Schaufler
- [PATCH] libsemanage: Include user name in ROLE_REMOVE audit events,
Vit Mojzis
- [PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks,
Casey Schaufler
- [PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks,
Casey Schaufler
- [PATCH 1/3] libselinux: add a const to suppress a build warning with Python 3.7,
Nicolas Iooss
- [PATCH 1/2] libsemanage: reindent pywrap-test.py with spaces,
Nicolas Iooss
- [PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks,
Casey Schaufler
- [PATCH 1/1] Travis-CI: run flake8 on Python code,
Nicolas Iooss
[GIT PULL] SELinux patches for v4.19, Paul Moore
[PATCH] Fix build break around __atomic_*() with GCC<4.7,
Hollis Blanchard
Possible OOB Read in Kernel Heap Memory in call to ext4_xattr_set_entry(),
Sachin Grover
[PATCH v2 00/13] Fix some issues found by flake8,
Nicolas Iooss
- [PATCH v2 11/13] python/sepolicy: use variables which exist in the gui.py, Nicolas Iooss
- [PATCH v2 08/13] python/sepolgen: remove buggy code, Nicolas Iooss
- [PATCH v2 05/13] python/sepolicy: use lowercase variable name, Nicolas Iooss
- [PATCH v2 03/13] python/sepolgen: return NotImplemented instead of raising it, Nicolas Iooss
- [PATCH v2 10/13] python/sepolicy: fix "procotol" misspelling, Nicolas Iooss
- [PATCH v2 07/13] python/sepolgen: silence linter warning about has_key, Nicolas Iooss
- [PATCH v2 04/13] python/sepolicy: drop unused CheckPolicyType, Nicolas Iooss
- [PATCH v2 01/13] libselinux: fix flake8 warnings in SWIG-generated code, Nicolas Iooss
- [PATCH v2 09/13] python/sepolgen: use self when accessing members in FilesystemUse, Nicolas Iooss
- [PATCH v2 13/13] python/sepolicy: do not import types, Nicolas Iooss
- [PATCH v2 06/13] python/sepolgen: fix refpolicy parsing of "permissive", Nicolas Iooss
- [PATCH v2 02/13] python/sepolgen: do not import twice the modules, Nicolas Iooss
- [PATCH v2 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice, Nicolas Iooss
- Re: [PATCH v2 00/13] Fix some issues found by flake8, William Roberts
[PATCH] libsemanage: reset umask before creating directories,
Vit Mojzis
Re: [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode,
Paul Moore
[PATCH] selinux: refactor mls_context_to_sid() and make it stricter,
Jann Horn via Selinux
[PATCH 1/1] python/sepolicy: add missing % in network tab help text,
Nicolas Iooss
[PATCH 00/13] Fix some issues found by flake8,
Nicolas Iooss
- [PATCH 07/13] python/sepolgen: silence linter warning about has_key, Nicolas Iooss
- [PATCH 10/13] python/sepolicy: fix "procotol" misspelling, Nicolas Iooss
- [PATCH 03/13] python/sepolgen: return NotImplemented instead of raising it, Nicolas Iooss
- [PATCH 02/13] python/sepolgen: do not import twice the modules, Nicolas Iooss
- [PATCH 01/13] libselinux: fix flake8 warnings in SWIG-generated code, Nicolas Iooss
- [PATCH 05/13] python/sepolicy: use lowercase variable name, Nicolas Iooss
- [PATCH 08/13] python/sepolgen: comment buggy code, Nicolas Iooss
- [PATCH 09/13] python/sepolgen: use self when accessing members in FilesystemUse, Nicolas Iooss
- [PATCH 11/13] python/sepolicy: use variables which exists in the gui.py, Nicolas Iooss
- [PATCH 06/13] python/sepolgen: fix refpolicy parsing of "permissive", Nicolas Iooss
- [PATCH 13/13] python/sepolicy: do not import types, Nicolas Iooss
- [PATCH 04/13] python/sepolicy: drop unused CheckPolicyType, Nicolas Iooss
- [PATCH 12/13] python/sepolicy: do not import sepolicy.generate.DAEMON twice, Nicolas Iooss
- Re: [PATCH 00/13] Fix some issues found by flake8, William Roberts
[PATCH 1/1] python/semanage: fix Python syntax of catching several exceptions,
Nicolas Iooss
Re: maybe resource leak in security/selinux/selinuxfs.c, Paul Moore
[PATCH] selinux: stricter parsing in mls_context_to_sid(),
Jann Horn via Selinux
[PATCH 00/33] VFS: Introduce filesystem context [ver #11],
David Howells
[PATCH 00/38] VFS: Introduce filesystem context [ver #10],
David Howells
map permission in can_exec() but not in domain_transition_pattern(),
Lukas Vrabec
[PATCH] selinux: constify write_op[],
Eric Biggers via Selinux
[PATCH v1 00/22] LSM: Full security module stacking,
Casey Schaufler
- [PATCH v1 01/22] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v1 02/22] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH v1 03/22] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v1 05/22] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v1 07/22] LSM: Infrastructure management of the task security blob, Casey Schaufler
- PATCH v1 08/22] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v1 09/22] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v1 04/22] LSM: Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v1 10/22] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v1 11/22] LSM: Infrastructure management of the superblock security blob, Casey Schaufler
- [PATCH v1 12/22] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v1 06/22] LSM: Infrastructure management of the file security blob, Casey Schaufler
- [PATCH v1 13/22] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v1 18/22] LSM: Use multiple secids in security module interfaces, Casey Schaufler
- [PATCH v1 16/22] LSM: Sharing of security blobs, Casey Schaufler
- [PATCH v1 21/22] LSM: Multiple concurrent major security modules, Casey Schaufler
[PATCH v1 14/22] LSM: Infrastructure management of the key security blob, Casey Schaufler
[PATCH v1 20/22] Move common usercopy into security_getpeersec_stream, Casey Schaufler
[PATCH v1 15/22] LSM: Mark security blob allocation failures as unlikely, Casey Schaufler
[PATCH v1 17/22] LSM: Allow mount options from multiple security modules, Casey Schaufler
[PATCH v1 22/22] Netfilter: Add a selection for Smack, Casey Schaufler
[PATCH v1 19/22] LSM: Use multiple secids in LSM interfaces, Casey Schaufler
Re: [PATCH v1 00/22] LSM: Full security module stacking, Casey Schaufler
Re: [PATCH v1 00/22] LSM: Full security module stacking, James Morris
Re: [PATCH v1 00/22] LSM: Full security module stacking, Sargun Dhillon
ANN: SETools 4.2.0-beta,
Chris PeBenito
[PATCH 07/32] selinux: Implement the new mount API LSM hooks [ver #9],
David Howells
blocking / mount using containers,
Mclain, Warren
libsemanage getpwent and nss-systemd incompability,
Nicolas Iooss
[PATCH] python/semanage: Fix logger class definition,
Vit Mojzis
[RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe,
Paul Moore
[RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe,
Paul Moore
[RFC net-next 01/15] net: Reserve protocol numbers for LoRa, Andreas Färber
[RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe,
Paul Moore
[PATCH 1/1] restorecond: close the PID file if writing to it failed,
Nicolas Iooss
[PATCH 1/1] Travis-CI: use new location of refpolicy repository,
Nicolas Iooss
[PATCH 1/1] mcstrans: fix memory leaks reported by clang's static analyzer,
Nicolas Iooss
[PATCH] Fix minor typos,
Yuri Chornoivan
[GIT PULL] SELinux fixes for v4.18 (#1), Paul Moore
Re: [PATCH 1/3] selinux: make dentry_init_security() return security module name,
Stephen Smalley
[PATCH] selinux: move user accesses in selinuxfs out of locked regions,
Jann Horn via Selinux
ANN: Reference Policy repo move, Chris PeBenito
[PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern(),
Paul Moore
[PATCH] selinux: Use pr_fmt to prefix "SELinux: ",
Joe Perches
[PATCH] MAINTAINERS: update the LSM and SELinux subsystems, Paul Moore
selinux/next rebased to v4.18-rc1, Paul Moore
'setsebool -P' works but throws errors; changes not permanent,
Mike Hughes
is_selinux_enabled() after chroot(),
Petr Lautrbach
[PATCH] python/semanage: Stop logging loginRecords changes,
Vit Mojzis
sepolgen-ifgen fails with current refpolicy, Laurent Bigonville
ANN: SETools repo move, Chris PeBenito
[PATCH v4 05/26] docs: Fix some broken references, Mauro Carvalho Chehab
[PATCH v3 05/27] docs: Fix some broken references,
Mauro Carvalho Chehab
[PATCH 00/13 selinux-next] selinux: Cleanup printk logging,
Peter Enderborg
- [PATCH 09/13] selinux: Cleanup printk logging in sidtab, Peter Enderborg
- [PATCH 04/13] selinux: Cleanup printk logging in hooks, Peter Enderborg
- [PATCH 02/13] selinux: Cleanup printk logging in ebitmap, Peter Enderborg
- [PATCH 01/13] selinux: Cleanup printk logging in conditional, Peter Enderborg
- [PATCH 03/13] selinux: Cleanup printk logging in policydb, Peter Enderborg
- [PATCH 12/13] selinux: Cleanup printk logging in avc, Peter Enderborg
- [PATCH 11/13] selinux: Cleanup printk logging in netif, Peter Enderborg
- [PATCH 05/13] selinux: Cleanup printk logging in avtab, Peter Enderborg
- [PATCH 10/13] selinux: Cleanup printk logging in netport, Peter Enderborg
- [PATCH 13/13] selinux: Cleanup printk logging in netnode, Peter Enderborg
- [PATCH 06/13] selinux: Cleanup printk logging in services, Peter Enderborg
- [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs, Peter Enderborg
- [PATCH 08/13] selinux: Cleanup printk logging in netlink, Peter Enderborg
[-next PATCH] security: use octal not symbolic permissions,
Joe Perches
[PATCH] selinux-testsuite: fix the inet_socket tests on older policy releases, Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]