Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [GIT PULL] SELinux fixes for v6.1 (#1), (continued)
- [PATCH] python: Do not query the local database if the fcontext is non-local,
James Carter
- [PATCH 6.0 202/862] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
- [PATCH v2] selinux: use GFP_ATOMIC in convert_context(),
GONG, Ruiqi
- [PATCH] python: Harden tools against "rogue" modules,
Vit Mojzis
- [PATCH] selinux: use GFP_ATOMIC in convert_context(),
GONG, Ruiqi
- [PATCH v5 10/30] selinux: implement get, set and remove acl hook, Christian Brauner
- [PATCH V2] docs: Add GPG fingerprints,
James Carter
- [PATCH] docs: Add GPG fingerprints,
James Carter
- [PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0,
Petr Lautrbach
- [PATCH] libsepol/cil: restore error on context rule conflicts,
Christian Göttsche
- [DPKG PATCH] selinux: install log callback to filter messages,
Christian Göttsche
- [PATCH] gui: Fix export file chooser dialog,
Petr Lautrbach
- [PATCH] libselinux: Add missing '\n' to avc_log() messages,
Petr Lautrbach
- [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe,
Paul Moore
- systemd socket activation selinux context pr review,
Ted Toth
- unnecessary log output in selinux_status_updated,
Petr Lautrbach
- Re: [PATCH] Fix race condition when exec'ing setuid files,
Kees Cook
- [PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec,
Kees Cook
- SO_PEERSEC protections in sk_getsockopt()?,
Paul Moore
- [GIT PULL] SELinux patches for v6.1,
Paul Moore
- [PATCH v3] docs: update the README.md with a basic SELinux description,
Paul Moore
- [PATCH =v2] docs: update the README.md with a basic SELinux description,
Paul Moore
- [PATCH] docs: provide a top level LICENSE file,
Paul Moore
- [PATCH] docs: update the README.md with a basic SELinux description,
Paul Moore
- bug report: semodule doesn't reject policices with duplicate fc's, Petr Lautrbach
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook,
Christian Brauner
- [PATCH v3 10/29] selinux: implement get, set and remove acl hook, Christian Brauner
- GREETIPNGS REAR BELOVED, Mrs Aisha Gaddafi
- [PATCH v38 00/39] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v38 02/39] LSM: Add an LSM identifier for external use, Casey Schaufler
- [PATCH v38 01/39] LSM: Identify modules by more than name, Casey Schaufler
- [PATCH v38 05/39] proc: Use lsmids instead of lsm names for attrs, Casey Schaufler
- [PATCH v38 03/39] LSM: Identify the process attributes for each module, Casey Schaufler
- [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data, Casey Schaufler
- [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes, Casey Schaufler
- [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v38 08/39] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v38 09/39] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v38 10/39] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v38 11/39] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v38 14/39] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v38 12/39] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v38 13/39] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v38 16/39] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v38 15/39] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v38 23/39] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v38 20/39] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v38 22/39] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v38 24/39] Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v38 25/39] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v38 26/39] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v38 27/39] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v38 30/39] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v38 31/39] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v38 28/39] LSM: security_secid_to_secctx module selection, Casey Schaufler
- [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v38 34/39] audit: multiple subject lsm values for netlabel, Casey Schaufler
- [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data, Casey Schaufler
- [PATCH v38 35/39] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init, Casey Schaufler
- [PATCH v38 33/39] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v38 38/39] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v38 39/39] LSM: Create lsm_module_list system call, Casey Schaufler
- [PATCH v2 11/30] selinux: implement set acl hook,
Christian Brauner
- [RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable,
Paul Moore
- [PATCH] docs: add Paul Moore's GPG fingerprint,
Paul Moore
- [PATCH] libsemanage: Allow user to set SYSCONFDIR,
Matt Sheets
- [PATCH 10/29] selinux: implement set acl hook,
Christian Brauner
- [PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT,
jeffxu
- [PATCH] selinux: remove runtime disable message in the install_policy.sh script,
Paul Moore
- [PATCH] scripts/selinux: use "grep -E" instead of "egrep",
Greg Kroah-Hartman
- [PATCH] secilc/doc: classmap is also allowed in permissionx,
Dominick Grift
- [PATCH userspace] fixfiles: do not cross mounts when traversing directories,
Ondrej Mosnacek
- /dev/random MLS policy,
Ted Toth
- [PATCH] fixfiles: Unmount temporary bind mounts on SIGINT,
Petr Lautrbach
- [PATCH] python: Hide error message when modifying non-local fcontext,
Vit Mojzis
- [PATCH RFC] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH linux-next] selinux/hooks: remove the unneeded result variable,
cgel . zte
- [PATCH] python/chcat: Don't fail on missing translation files,
Johannes Segitz
- [PATCH RFC] LSM: lsm_self_attr system call to get security module attributes,
Casey Schaufler
- Re: Does NFS support Linux Capabilities,
Chuck Lever III
- Re: Does NFS support Linux Capabilities, Theodore Ts'o
context of socket passed between processes,
Ted Toth
[PATCH] Update translations,
Vit Mojzis
[v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls,
Paul Moore
[PATCH testsuite] tests/Makefile: add missing condition for userfaultfd test,
Ondrej Mosnacek
[PATCH 0/2] fs: fix capable() call in simple_xattr_list(),
Ondrej Mosnacek
[PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing,
David Howells
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Christian Brauner
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Jeff Layton
- Re: [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
- <Possible follow-ups>
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
[PATCH v2] tests/secretmem: add test,
Christian Göttsche
[PATCH] tests/secretmem: add test, Christian Göttsche
[PATCH] libselinux: support objname in compute_create,
Christian Göttsche
[PATCH] selinux: declare read-only parameters const,
Christian Göttsche
[PATCH] selinux: use int arrays for boolean values,
Christian Göttsche
[RFC PATCH 2/2] fs/xattr: wire up syscalls,
Christian Göttsche
[PATCH linux-next] selinux: remove redundant variables rc,
cgel . zte
[PATCH linux-next] selinux: Remove the unneeded result variable,
cgel . zte
[GIT PULL] LSM fixes for v6.0 (#1),
Paul Moore
[PATCH] checkpolicy: avoid passing NULL pointer to memset(),
Juraj Marcin
[PATCH 3/3] secilc/docs: disable pandoc default css for html docs,
bauen1
[PATCH 2/3] secilc/docs: fix syntax highlighting,
bauen1
[PATCH 1/3] secilc/docs: selinuxuser actually takes a string not identifier,
bauen1
[PATCH testsuite] tests: remove more stray flag/temporary files with 'make clean',
Ondrej Mosnacek
[PATCH] libsepol: fix missing double quotes in typetransition CIL rule,
Juraj Marcin
Fwd: [systemd-devel] socket activation selinux context on create,
Ted Toth
[PATCH] tests/filesystem/xfs: use a 300M xfs filesystem image,
Paul Moore
[PATCH testsuite 0/2] Prepare userfaultfd policy for Fedora policy changes,
Ondrej Mosnacek
[PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing,
David Howells
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Christian Brauner
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Al Viro
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, Anna Schumaker
- Re: [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing, David Howells
[PATCH 0/3] LSM hooks for IORING_OP_URING_CMD,
Paul Moore
Re: SELinux testsuite on 6.0-rc2 binder BUG,
Paul Moore
[PATCH v1] selinux/ss/services.c: check the return value of audit_log_start() in security_sid_mls_copy(),
lily
[PATCH] selinux: Variable type completion, Xin Gao
[syzbot] KASAN: use-after-free Read in sock_has_perm,
syzbot
[selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean',
Paul Moore
[PATCH v5 0/4] Introduce security_create_user_ns(),
Frederick Lawler
[BUG] (fsuse xattr "fuse" mycontext) causes deadlock for mount/sync syscall, bauen1
[PATCH] tests/sctp: reenable the SCTP ASCONF tests, Paul Moore
[PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors,
Paul Moore
[PATCH] selinux: SCTP fixes, including ASCONF,
Paul Moore
[PATCH 1/4] ci: bump versions in GitHub Actions,
Christian Göttsche
[PATCH 1/2] checkpolicy: use strict function prototype for definitions,
Christian Göttsche
[PATCH] libselinux/utils: install into bin PATH,
Christian Göttsche
[PATCH] libselinux: avoid newline in avc message,
Christian Göttsche
[PATCH] selinux: add a new warn_on_audited debug flag to selinuxfs,
Ondrej Mosnacek
Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules,
Guozihua (Scott)
[PATCH AUTOSEL 4.9 8/8] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 4.14 12/12] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.4 23/23] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 4.19 16/16] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.15 42/45] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.10 29/29] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.15 43/45] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.18 51/53] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH AUTOSEL 5.18 50/53] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.19 53/58] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
[PATCH AUTOSEL 5.19 54/58] selinux: Add boundary check in put_entry(), Sasha Levin
[PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
[PATCH v2] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
[PATCH] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
LSM stacking in next for 6.1?,
Casey Schaufler
[GIT PULL] SELinux patches for v6.0,
Paul Moore
[PATCH v4 0/4] Introduce security_create_user_ns(),
Frederick Lawler
Adjust sepolgen grammar to support allowxperm, et. al.,
chris . lindee
KVM / virtual networking access control,
Karl MacMillan
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]