Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime, (continued)
- [PATCH v5] semanage, sepolicy: list also ports not attributed with port_type,
Topi Miettinen
- [syzbot] [selinux?] [reiserfs?] KASAN: wild-memory-access Read in inode_doinit_with_dentry, syzbot
- [PATCH v12 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
- [GIT PULL] SELinux patches for v6.5,
Paul Moore
- Re: [PATCH 00/79] fs: new accessors for inode->i_ctime,
Christian Brauner
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure,
Jeff Layton
- [PATCH 78/79] selinux: switch to new ctime accessors,
Jeff Layton
- [PATCH v2] selinux: introduce an initial SID for early boot processes,
Ondrej Mosnacek
- [PATCH v2 0/8] checkpolicy,libsepol: add prefix/suffix matching to filename type transitions,
Juraj Marcin
- [PATCH v2 1/8] checkpolicy,libsepol: move transition to separate structure in avtab, Juraj Marcin
- [PATCH v2 2/8] checkpolicy,libsepol: move filename transitions to avtab, Juraj Marcin
- [PATCH v2 3/8] checkpolicy,libsepol: move filename transition rules to avrule, Juraj Marcin
- [PATCH v2 4/8] libsepol: implement new kernel binary format for avtab, Juraj Marcin
- [PATCH v2 7/8] checkpolicy,libsepol: add prefix/suffix support to module policy, Juraj Marcin
- [PATCH v2 6/8] checkpolicy,libsepol: add prefix/suffix support to kernel policy, Juraj Marcin
- [PATCH v2 5/8] libsepol: implement new module binary format of avrule, Juraj Marcin
- [PATCH v2 8/8] libsepol/cil: add support for prefix/suffix filename transtions to CIL, Juraj Marcin
- [PATCH testsuite] tests/inet_socket: cover the MPTCP protocol,
Ondrej Mosnacek
- [PATCH] python/sepolicy: Fix get_os_version except clause,
Jeffery To
- [PATCH] libselinux: fix inconsistent indentation in selinux_check_access,
Huaxin Lu
- [PATCH] libselinux: add check for calloc in check_booleans,
Huaxin Lu
- [PATCH v4] semanage, sepolicy: list also ports not attributed with port_type,
Topi Miettinen
- [PATCH] selinux: cleanup the policycap accessor functions,
Paul Moore
- [PATCH v11 10/11] SELinux: Add selfattr hooks, Casey Schaufler
- SELinux and systemd integration,
Paul Moore
- [PATCH v2 1/2] dismod: print the policy version only in interactive mode,
Masatake YAMATO
- [PATCH v3] semanage, sepolicy: list also ports not attributed with port_type,
Topi Miettinen
- [PATCH 1/2] dismod: print the policy version only in interactive mode,
Masatake YAMATO
- [PATCH userspace 0/2] Introduce an initial SID for early boot processes,
Ondrej Mosnacek
- [PATCH] selinux: introduce an initial SID for early boot processes,
Ondrej Mosnacek
- [PATCH v12 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- RFC: style/formatting changes for SELinux kernel code,
Paul Moore
- [PATCH 1/4] dispol: add --help option,
Masatake YAMATO
- ANN: SELinux and stable kernel changes, Paul Moore
- multiple inconsistent perm_map files,
Stephen Smalley
- [PATCH] libselinux: Add CPPFLAGS to Makefile,
ChungSheng Wu
- [PATCH] semanage: list all nodes even if not attributed with node_type, Topi Miettinen
- [PATCH] sepolicy: clarify manual page of sepolicy interface,
Topi Miettinen
- [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- [PATCH v2] semanage, sepolicy: list also ports not attributed with port_type,
Topi Miettinen
- [RFC PATCH] selinux: support name based type transitions in conditional policies, Christian Göttsche
- [PATCH] selinux: avoid bool as identifier name,
Christian Göttsche
- [RFC PATCH] checkpolicy, libsepol: support name based type transitions in conditional policies, Christian Göttsche
- [PATCH 1/2] secilc: consider DESTDIR in tests,
Christian Göttsche
- [PATCH v2 1/4] libsepol: drop message for uncommon error cases,
Christian Göttsche
- [GIT PULL] SELinux fixes for v6.4 (#1),
Paul Moore
- [PATCH] selinux: fix Makefile for versions of make < v4.3,
Paul Moore
- [PATCH] selinux: don't use make's grouped targets feature yet,
Paul Moore
- [PATCH] python/sepolicy: Fix template for confined user policy modules,
Vit Mojzis
- [PATCH 0/8] checkpolicy, libsepol: add prefix/suffix matching to filename type transitions,
Juraj Marcin
- [PATCH 1/8] checkpolicy, libsepol: move transition to separate structure in avtab, Juraj Marcin
- [PATCH 3/8] checkpolicy, libsepol: move filename transition rules to avrule, Juraj Marcin
- [PATCH 4/8] libsepol: implement new kernel binary format for avtab, Juraj Marcin
- [PATCH 2/8] checkpolicy, libsepol: move filename transitions to avtab, Juraj Marcin
- [PATCH 5/8] libsepol: implement new module binary format of avrule, Juraj Marcin
- [PATCH 6/8] checkpolicy, libsepol: add prefix/suffix support to kernel policy, Juraj Marcin
- [PATCH 7/8] checkpolicy, libsepol: add prefix/suffix support to module policy, Juraj Marcin
- [PATCH 8/8] libsepol/cil: add support for prefix/suffix filename transtions to CIL, Juraj Marcin
- Re: [PATCH 0/8] checkpolicy, libsepol: add prefix/suffix matching to filename type transitions, James Carter
- [PATCH 0/5] selinux: add prefix/suffix matching to filename type transitions,
Juraj Marcin
- [PATCH] LSM: Infrastructure management of the sock,
GONG, Ruiqi
- [PATCH 1/4] dismod: add --help option,
Masatake YAMATO
- [PATCH] Makefile: expand ~ in DESTDIR,
Masatake YAMATO
- [PATCH PR#394] semanage: list all ports even if not attributed with port_type,
Topi Miettinen
- [PATCH] python/sepolicy: Add/remove user even when SELinux is disabled,
Vit Mojzis
- [PATCH] selinux: make labeled NFS work when mounted before policy load, Ondrej Mosnacek
- [PATCH] selinux: cleanup exit_sel_fs() declaration,
Xiu Jianfeng
- ANN: SELinux repository changes, Paul Moore
- [PATCH 1/5] policycoreutils: Add examples to man pages,
Vit Mojzis
- [PATCH 1/4] python: improve format strings for proper localization,
Petr Lautrbach
- [RFC PATCH] selinux: TESTING ONLY, PLEASE IGNORE,
Paul Moore
- [RFC PATCH 1/4] semodule_expand: update,
Christian Göttsche
- [RFC PATCH 1/9] libselinux: annotate interfaces with compiler attributes,
Christian Göttsche
- [PATCH 1/4] libsepol: drop message for uncommon error cases,
Christian Göttsche
- [PATCH 1/5] libsepol: validate some object contexts,
Christian Göttsche
- [PATCH 1/4] checkpolicy: drop unused token CLONE,
Christian Göttsche
- [RFC PATCH v2] fs/xattr: add *at family syscalls,
Christian Göttsche
- [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT,
Christian Göttsche
- [PATCH v4 3/9] capability: use new capable_any functionality, Christian Göttsche
- [PATCH v4 2/9] capability: add any wrapper to test for multiple caps with exactly one audit message, Christian Göttsche
- [PATCH v4 4/9] block: use new capable_any functionality, Christian Göttsche
- [PATCH v4 8/9] bpf: use new capable_any functionality, Christian Göttsche
- [PATCH v4 9/9] net: use new capable_any functionality, Christian Göttsche
- [PATCH v4 7/9] kernel: use new capable_any functionality, Christian Göttsche
- [PATCH v4 5/9] drivers: use new capable_any functionality, Christian Göttsche
- [PATCH v4 0/9] Introduce capable_any(), Christian Göttsche
- [PATCH v4 6/9] fs: use new capable_any functionality, Christian Göttsche
- Re: [PATCH v4 1/9] capability: introduce new capable flag NODENYAUDIT, Serge E. Hallyn
- [PATCH] security: keys: perform capable check only on privileged operations,
Christian Göttsche
- [PATCH] selinux: make header files self-including,
Christian Göttsche
- [PATCH] selinux: deprecated fs ocon,
Christian Göttsche
- [PATCH] selinux: keep context struct members in sync,
Christian Göttsche
- [PATCH 0/2] capability: Introduce CAP_BLOCK_ADMIN,
Tianjia Zhang
- [PATCH] selinux: small cleanups in selinux_audit_rule_init(),
Paul Moore
- [PATCH] selinux: remove avc_disable() as it is no longer used,
Paul Moore
- [PATCH] selinux: more Makefile tweaks,
Paul Moore
- [PATCH -next 0/2] lsm: Change inode_setattr() to take struct,
Xiu Jianfeng
- [PATCH] selinux: make cleanup on error consistent,
Juraj Marcin
- [PATCH 0/3] python: Improve man pages,
Vit Mojzis
- [PATCH v10 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
- policy for FFI, Ted Toth
- [PATCH v9 10/11] SELinux: Add selfattr hooks,
Casey Schaufler
- [GIT PULL] SELinux patches for v6.4,
Paul Moore
- [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept,
Matthieu Baerts
- [PATCH] libselinux: set CFLAGS for pip installation,
Christian Göttsche
- [PATCH v2 1/6] libsepol: rename struct member,
Christian Göttsche
- [PATCH 1/6] selinux: do not leave dangling pointer behind,
Christian Göttsche
- [TESTSUITE PATCH] README.md: update dependencies,
Christian Göttsche
- [PATCH] libsepol/cil: Fix class permission verification in CIL,
James Carter
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept,
Matthieu Baerts
- Re: [PATCH] mm/mmap: Map MAP_STACK to VM_STACK,
Matthew Wilcox
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU), Reshetova, Elena
- [PATCH 0/9 v3] Add CIL Deny Rule,
James Carter
- [PATCH 2/9 v3] libsepol/cil: Add cil_list_is_empty macro, James Carter
- [PATCH 1/9 v3] libsepol/cil: Parse and add deny rule to AST, but do not process, James Carter
- [PATCH 3/9 v3] libsepol/cil: Add cil_tree_node_remove function, James Carter
- [PATCH 5/9 v3] libsepol/cil: Add cil_write_post_ast function, James Carter
- [PATCH 6/9 v3] libsepol: Export the cil_write_post_ast function, James Carter
- [PATCH 7/9 v3] secilc/secil2tree: Add option to write CIL AST after post processing, James Carter
- [PATCH 4/9 v3] libsepol/cil: Process deny rules, James Carter
- [PATCH 9/9 v3] secilc/docs: Add deny rule to CIL documentation, James Carter
- [PATCH 8/9 v3] secilc/test: Add deny rule tests, James Carter
- Re: [PATCH 0/9 v3] Add CIL Deny Rule, Daniel Burgener
- [PATCH v2] selinux: ensure av_permissions.h is built when needed,
Paul Moore
- [PATCH 0/6] Add support for notself and other to CIL,
James Carter
- [PATCH] selinux: ensure av_permissions.h is built when needed,
Paul Moore
- [PATCH] selinux: fix Makefile dependencies of flask.h,
Ondrej Mosnacek
- portcon tcp 80 change type,
Etienne Champetier
- [PATCH v8 10/11] SELinux: Add selfattr hooks, Casey Schaufler
- [PATCH] selinux: stop returning node from avc_insert,
Stephen Smalley
- [PATCH] libsemanage: fix memory leak in semanage_user_roles,
Christian Göttsche
- [PATCH] make avc audit line only have one space,
Steven Moreland
- [PATCH 1/3] checkpolicy: add option to skip checking neverallow rules,
Christian Göttsche
- Possible bug in policy compilation,
Jonathan Strauss
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- sesearch --neverallow,
Petr Lautrbach
- [PATCH v9 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- Potential regression/bug in net/mlx5 driver,
Paul Moore
- Re: [PATCH v2] selinux: Adjust implementation of security_get_bools(),
Paul Moore
[PATCH v2] selinux: clean up dead code after removing runtime disable,
Lukas Bulwahn
[PATCH] selinux: clean up dead code after removing runtime disable,
Lukas Bulwahn
[PATCH] selinux: update the file list in MAINTAINERS,
Paul Moore
[PATCH userspace] scripts/ci: install rdma-core-devel for selinux-testsuite,
Ondrej Mosnacek
cgroup2 labeling question,
Dominick Grift
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]