Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] Makefile: expand ~ in DESTDIR, (continued)
- [PATCH PR#394] semanage: list all ports even if not attributed with port_type,
Topi Miettinen
- [PATCH] python/sepolicy: Add/remove user even when SELinux is disabled,
Vit Mojzis
- [PATCH] selinux: make labeled NFS work when mounted before policy load, Ondrej Mosnacek
- [PATCH] selinux: cleanup exit_sel_fs() declaration,
Xiu Jianfeng
- ANN: SELinux repository changes, Paul Moore
- [PATCH 1/5] policycoreutils: Add examples to man pages,
Vit Mojzis
- [PATCH 1/4] python: improve format strings for proper localization,
Petr Lautrbach
- [RFC PATCH] selinux: TESTING ONLY, PLEASE IGNORE,
Paul Moore
- [RFC PATCH 1/4] semodule_expand: update,
Christian Göttsche
- [RFC PATCH 1/9] libselinux: annotate interfaces with compiler attributes,
Christian Göttsche
- [PATCH 1/4] libsepol: drop message for uncommon error cases,
Christian Göttsche
- [PATCH 1/5] libsepol: validate some object contexts,
Christian Göttsche
- [PATCH 1/4] checkpolicy: drop unused token CLONE,
Christian Göttsche
- [RFC PATCH v2] fs/xattr: add *at family syscalls,
Christian Göttsche
- [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT,
Christian Göttsche
- [PATCH v4 3/9] capability: use new capable_any functionality, Christian Göttsche
- [PATCH v4 2/9] capability: add any wrapper to test for multiple caps with exactly one audit message, Christian Göttsche
- [PATCH v4 4/9] block: use new capable_any functionality, Christian Göttsche
- [PATCH v4 8/9] bpf: use new capable_any functionality, Christian Göttsche
- [PATCH v4 9/9] net: use new capable_any functionality, Christian Göttsche
- [PATCH v4 7/9] kernel: use new capable_any functionality, Christian Göttsche
- [PATCH v4 5/9] drivers: use new capable_any functionality, Christian Göttsche
- [PATCH v4 0/9] Introduce capable_any(), Christian Göttsche
- [PATCH v4 6/9] fs: use new capable_any functionality, Christian Göttsche
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT, Serge E. Hallyn
- [PATCH] security: keys: perform capable check only on privileged operations,
Christian Göttsche
- [PATCH] selinux: make header files self-including,
Christian Göttsche
- [PATCH] selinux: deprecated fs ocon,
Christian Göttsche
- [PATCH] selinux: keep context struct members in sync,
Christian Göttsche
- [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN,
Tianjia Zhang
- [PATCH] selinux: small cleanups in selinux_audit_rule_init(),
Paul Moore
- [PATCH] selinux: remove avc_disable() as it is no longer used,
Paul Moore
- [PATCH] selinux: more Makefile tweaks,
Paul Moore
- [PATCH -next 0/2] lsm: Change inode_setattr() to take struct,
Xiu Jianfeng
- [PATCH] selinux: make cleanup on error consistent,
Juraj Marcin
- [PATCH 0/3] python: Improve man pages,
Vit Mojzis
- [PATCH v10 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
- policy for FFI, Ted Toth
- [PATCH v9 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
- [GIT PULL] SELinux patches for v6.4,
Paul Moore
- [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept,
Matthieu Baerts
- [PATCH] libselinux: set CFLAGS for pip installation,
Christian Göttsche
- [PATCH v2 1/6] libsepol: rename struct member,
Christian Göttsche
- [PATCH 1/6] selinux: do not leave dangling pointer behind,
Christian Göttsche
- [TESTSUITE PATCH] README.md: update dependencies,
Christian Göttsche
- [PATCH] libsepol/cil: Fix class permission verification in CIL,
James Carter
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept,
Matthieu Baerts
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK,
Matthew Wilcox
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU), Reshetova, Elena
- [PATCH 0/9 v3] Add CIL Deny Rule,
James Carter
- [PATCH 2/9 v3] libsepol/cil: Add cil_list_is_empty macro, James Carter
- [PATCH 1/9 v3] libsepol/cil: Parse and add deny rule to AST, but do not process, James Carter
- [PATCH 3/9 v3] libsepol/cil: Add cil_tree_node_remove function, James Carter
- [PATCH 5/9 v3] libsepol/cil: Add cil_write_post_ast function, James Carter
- [PATCH 6/9 v3] libsepol: Export the cil_write_post_ast function, James Carter
- [PATCH 7/9 v3] secilc/secil2tree: Add option to write CIL AST after post processing, James Carter
- [PATCH 4/9 v3] libsepol/cil: Process deny rules, James Carter
- [PATCH 9/9 v3] secilc/docs: Add deny rule to CIL documentation, James Carter
- [PATCH 8/9 v3] secilc/test: Add deny rule tests, James Carter
- Re: [PATCH 0/9 v3] Add CIL Deny Rule, Daniel Burgener
- [PATCH v2] selinux: ensure av_permissions.h is built when needed,
Paul Moore
- [PATCH 0/6] Add support for notself and other to CIL,
James Carter
- [PATCH] selinux: ensure av_permissions.h is built when needed,
Paul Moore
- [PATCH] selinux: fix Makefile dependencies of flask.h,
Ondrej Mosnacek
- portcon tcp 80 change type,
Etienne Champetier
- [PATCH v8 10/11] SELinux: Add selfattr hooks, Casey Schaufler
- [PATCH] selinux: stop returning node from avc_insert,
Stephen Smalley
- [PATCH] libsemanage: fix memory leak in semanage_user_roles,
Christian Göttsche
- [PATCH] make avc audit line only have one space,
Steven Moreland
- [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules,
Christian Göttsche
- Possible bug in policy compilation,
Jonathan Strauss
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- sesearch --neverallow,
Petr Lautrbach
- [PATCH v9 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- Potential regression/bug in net/mlx5 driver,
Paul Moore
- Re: [PATCH v2] selinux: Adjust implementation of security_get_bools(),
Paul Moore
[PATCH v2] selinux: clean up dead code after removing runtime disable,
Lukas Bulwahn
[PATCH] selinux: clean up dead code after removing runtime disable,
Lukas Bulwahn
[PATCH] selinux: update the file list in MAINTAINERS,
Paul Moore
[PATCH userspace] scripts/ci: install rdma-core-devel for selinux-testsuite,
Ondrej Mosnacek
cgroup2 labeling question,
Dominick Grift
[PATCH] selinux: remove the runtime disable functionality,
Paul Moore
[PATCH v2] selinux: remove the 'checkreqprot' functionality,
Paul Moore
[PATCH] selinux: remove the 'checkreqprot' functionality,
Paul Moore
[PATCH v7 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
Re: [PATCH v2] selinux: stop passing selinux_state pointers and their offspring, Paul Moore
[PATCH testsuite] tests/atsecure: avoid running bash under test domains,
Ondrej Mosnacek
[RFC PATCH v2] selinux: cache access vector decisions in the inode security blob,
Stephen Smalley
[PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
Re: [PATCH net-next v2] scm: fix MSG_CTRUNC setting condition for SO_PASSSEC,
Paul Moore
[RFC PATCH] selinux: cache access vector decisions in the inode security blob, Stephen Smalley
[PATCH testsuite] defconfig: add FAT and GRE config options,
Stephen Smalley
[RFC PATCH 0/9 v2] Add CIL Deny Rule,
James Carter
- [RFC PATCH 2/9 v2] libsepol/cil: Add cil_list_is_empty macro, James Carter
- [RFC PATCH 1/9 v2] libsepol/cil: Parse and add deny rule to AST, but do not process, James Carter
- [RFC PATCH 3/9 v2] libsepol/cil: Add cil_tree_node_remove function, James Carter
- [RFC PATCH 5/9 v2] libsepol/cil: Add cil_write_post_ast function, James Carter
- [RFC PATCH 6/9 v2] libsepol: Export the cil_write_post_ast function, James Carter
- [RFC PATCH 7/9 v2] secilc/secil2tree: Add option to write CIL AST after post processing, James Carter
- [RFC PATCH 4/9 v2] libsepol/cil: Process deny rules, James Carter
- [RFC PATCH 9/9 v2] secilc/docs: Add deny rule to CIL documentation, James Carter
- [RFC PATCH 8/9 v2] secilc/test: Add deny rule tests, James Carter
Re: [PATCH] selinux: stop passing selinux_state pointers and their offspring,
Paul Moore
[PATCH userspace] libsemanage: include more parameters in the module checksum,
Ondrej Mosnacek
[PATCH v3 0/3] Improve efficiency of detecting duplicate in libselinux,
wanghuizhao
[RFC PATCH] selinux: uninline unlikely parts of avc_has_perm_noaudit(),
Paul Moore
[PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure,
Roberto Sassu
- [PATCH 12/28] fs: Fix description of vfs_tmpfile(), Roberto Sassu
- [PATCH 13/28] security: Align inode_setattr hook definition with EVM, Roberto Sassu
- [PATCH 14/28] security: Introduce inode_post_setattr hook, Roberto Sassu
- [PATCH 15/28] security: Introduce inode_post_removexattr hook, Roberto Sassu
- [PATCH 16/28] security: Introduce file_post_open hook, Roberto Sassu
- [PATCH 17/28] security: Introduce file_pre_free_security hook, Roberto Sassu
- [PATCH 18/28] security: Introduce path_post_mknod hook, Roberto Sassu
- [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook, Roberto Sassu
- [PATCH 20/28] security: Introduce inode_post_set_acl hook, Roberto Sassu
- [PATCH 23/28] security: Introduce LSM_ORDER_LAST, Roberto Sassu
- [PATCH 26/28] evm: Move to LSM infrastructure, Roberto Sassu
- [PATCH 25/28] ima: Move IMA-Appraisal to LSM infrastructure, Roberto Sassu
- [PATCH 24/28] ima: Move to LSM infrastructure, Roberto Sassu
- [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache, Roberto Sassu
- [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure, Roberto Sassu
- [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure, Roberto Sassu
- [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure, Roberto Sassu
- [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure, Roberto Sassu
- [PATCH 11/28] evm: Complete description of evm_inode_setattr(), Roberto Sassu
- [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure, Roberto Sassu
- [PATCH 21/28] security: Introduce inode_post_remove_acl hook, Roberto Sassu
- [PATCH 22/28] security: Introduce key_post_create_or_update hook, Roberto Sassu
- [PATCH 27/28] integrity: Move integrity functions to the LSM infrastructure, Roberto Sassu
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure, Mimi Zohar
[PATCH 2/6] libsepol/cil: Add notself and other support to CIL, James Carter
[PATCH testsuite] tests/file: make the SIGIO tests work with CONFIG_LEGACY_TIOCSTI=n,
Ondrej Mosnacek
[PATCH testsuite 0/3] Infiniband test fixes/improvements,
Ondrej Mosnacek
ANN: SELinux userspace 3.5 release, Jason Zaman
What's wrong with this usage of semanage fcontext?,
Alan Stern
[UTIL-LINUX PATCH] mount: add rootcontext=@target, Christian Göttsche
SELinux pull request for Linux v6.3, Paul Moore
[PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id(),
Ondrej Mosnacek
[PATCH] selinux: allow to opt-out from skipping kernel sockets in sock_has_perm(),
Ondrej Mosnacek
[PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id(),
Ondrej Mosnacek
ANN: SELinux userspace 3.5-rc3 release, Jason Zaman
selinux-testsuite failures, CONFIG_LEGACY_TIOCSTI, and recent Rawhide builds,
Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]