Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
[PATCH] libsemanage: properly check return value of iterate function,
Jan Zarsky
[PATCH] libsemanage: Use umask(0077) for fopen() write operations,
Petr Lautrbach
[RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs,
James Morris
Re: [PATCH] security: replace FSF address with web source in license notices, Paul Moore
[PATCH] libsepol/cil: Create new keep field for type attribute sets,
James Carter
[PATCH] python/sepolicy: Fix sepolicy manpage.,
Lukas Vrabec
[PATCH] libsepol: cil: only overwrite cil_typeattribute used when false.,
Daniel Cashman
[PATCH] netlabel: If PF_INET6, check sk_buff ip header version,
Richard Haines
[GIT PULL] SELinux patches for v4.15, Paul Moore
[PATCH] selinux: remove unnecessary assignment to subdir-,
Masahiro Yamada
[PATCH] python/semanage: Fix export of ibendport entries,
Vit Mojzis
[PATCH] libsemanage: free genhomedircon fallback user,
Jan Zarsky
KASAN: use-after-free Read in selinux_netlbl_sk_security_free, syzbot
KASAN: use-after-free Read in do_raw_spin_lock,
syzbot
[PATCH] python/semanage: Do not try to reload policy when SELinux is disabled,
Petr Lautrbach
[PATCH] selinux-testsuite: inet_socket: test xfrm state selectors, Stephen Smalley
[RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs,
James Morris
[RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache,
Stephen Smalley
[PATCH] selinux-testsuite: nnp_nosuid: tidy perl style, Stephen Smalley
[PATCH] selinux-testsuite: inet_socket: tighten checking, Stephen Smalley
[PATCH V3 1/2] security: Add a cred_getsecid hook,
Matthew Garrett via Selinux
[PATCH 1/1] Travis-CI: try working around network issues by retrying downloads,
Nicolas Iooss
[RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED,
Nicolas Belouin
[RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT,
Nicolas Belouin
[PATCH] libsepol: free ibendport device names,
Jan Zarsky
[PATCH] libselinux: android: support exact match for a property key,
Jaekyun Seok via Selinux
[RFC PATCH 1/1] selinux-testsuite: Add CALIPSO/IPv6 tests,
Richard Haines
[PATCH] selinux-testsuite: Stop Infiniband building if not enabled,
Richard Haines
[RFC PATCH 0/1] selinux-testsuite: Add CALIPSO/IPv6 tests, Richard Haines
[PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
[PATCH] CleanSpec.mk: remove, bill . c . roberts
[PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open.,
Daniel Cashman
[RFC PATCH 4/5] netlabel: Add SCTP support,
Richard Haines
[RFC PATCH 2/5] sctp: Add ip option support,
Richard Haines
[RFC PATCH 5/5] selinux: Add SCTP support,
Richard Haines
[RFC PATCH 3/5] sctp: Add LSM hooks,
Richard Haines
[RFC PATCH 0/5] Add SELinux SCTP protocol support,
Richard Haines
[RFC PATCH 1/5] security: Add support for SCTP security hooks,
Richard Haines
[PATCH 1/2] security: Add a cred_getsecid hook,
Matthew Garrett via Selinux
[PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
[PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len,
Colin King
[PATCH] selinux: remove redundant assignment to len,
Colin King
[PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len,
Colin King
[PATCH] selinux: remove redundant assignment to str,
Colin King
[PATCH][RFC] selinuxns: mark init_selinux_ns as __ro_after_init,
James Morris
RowHammer Protection, Patrick K., ITF
travis CI,
William Roberts
[PATCH net-next v3 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
[PATCH] libselinux: Add support for pcre2 to pkgconfig definition,
Petr Lautrbach
[PATCH net-next v2 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
[PATCH] selinux: Fix bool initialization/comparison,
Thomas Meyer
About commit 901ef845fa2469c ("selinux: allow per-file labeling for cgroupfs"),
Waiman Long
[PATCH 0/4] net-next: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
[PATCH 1/2] selinux: fix build warning by removing the unused sid variable,
Corentin Labbe
Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks,
Paul Moore
[PATCH] semodule-utils: remove semodule_deps,
Stephen Smalley
Labeling sysfs files,
David Graziano
[RFC 00/10] Introduce a SELinux namespace,
Stephen Smalley
[RFC 06/10] selinux: introduce cred_selinux_ns() and use it, Stephen Smalley
[RFC 07/10] selinux: support per-namespace inode security structures, Stephen Smalley
[RFC 10/10] selinuxfs: restrict write operations to the same selinux namespace, Stephen Smalley
[RFC 01/10] selinux: introduce a selinux namespace, Stephen Smalley
[PATCH 1/4] gui: remove the status bar,
Nicolas Iooss
[PATCH 1/2 v2] selinux-testsuite: README: Update kernel config requirements,
Stephen Smalley
[PATCH] selinux-testsuite: README: Update kernel config requirements, Stephen Smalley
Enable listing fcontexts.homedirs,
Vit Mojzis
[PATCH 1/2] sepolicy: ignore comments and empty lines in file_contexts.subs_dist,
Nicolas Iooss
[PATCH 1/1] Travis-CI: fix configuration after September's update,
Nicolas Iooss
A casestudy where selinux has stopped malware attacks,
masoom alam
FYI: selinux/next rebase to v4.14-rc1, Paul Moore
[PATCH 1/1] gui: port to Python 3 by migrating to PyGI,
Nicolas Iooss
Shepherd - A mandatory Access Controller (Selinux) for VMs/Containers,
masoom alam
[PATCH v2 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist,
Nicolas Iooss
My notes from the 2017 Linux Security Summit, Paul Moore
[PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist,
Nicolas Iooss
[PATCH] libsepol: fix memory leak in sepol_bool_query(),
Jan . Zarsky . jzarsky
with extended_socket_class should be still be seeing "socket"?,
Dominick Grift
[PATCH] selinux: libselinux: Enable multiple input files to selabel_open.,
Daniel Cashman
[PATCH] libselinux: log no default label warning in verbose mode,
Christian Göttsche via Selinux
restorecon: Warning no default label for foo, Christian Göttsche
Userspace Python version,
Chris PeBenito
[PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill,
Stephen Smalley
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Casey Schaufler
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Paul Moore
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Casey Schaufler
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Greg KH
- Message not available
conditional role and range transitions?,
Dominick Grift
pam_selinux and systemd,
Dominick Grift
[PATCH] selinux: Use kmem_cache for hashtab_node,
Kyeongdon Kim
[PATCH 1/6] libsepol: use IN6ADDR_ANY_INIT to initialize IPv6 addresses,
Nicolas Iooss
[PATCH 0/3] Security: add lsm hooks for checking permissions on eBPF objects,
Chenbo Feng
[GIT PULL] SELinux patches for v4.14,
Paul Moore
[PATCH] libsepol/cil: Keep attributes used by generated attributes in neverallow rules,
James Carter
[PATCH v2] libsepol: cil: Add ability to redeclare types[attributes],
Daniel Cashman
sysfs symlinks in genfscon,
Jeffrey Vander Stoep via Selinux
[PATCH] selinux: constify nf_hook_ops,
Arvind Yadav
Permissions for eBPF objects,
Jeffrey Vander Stoep via Selinux
[PATCH] libsepol: reset pointer after free,
Jan Zarsky
[no subject],
Sky Autumn
[PATCH 0/1] RFC: Allow for multiple cil declarations.,
Daniel Cashman
[PATCH] Fixed bad reference in roleattribute, James Carter
[PATCH] checkpolicy, libselinux, libsepol, policycoreutils: Update my email address, Stephen Smalley
[PATCH 1/2] selinux: update my email address,
Stephen Smalley
[PATCH 0/4] SELinux: Fine-tuning for some function implementations,
SF Markus Elfring via Selinux
[PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information,
Paul Moore
ANN: SETools 4.1.1, Chris PeBenito
ANN: Reference Policy 2.20170805, Chris PeBenito
[PATCH 1/6] sepolicy: fix Python3 syntax in manpage,
Nicolas Iooss
[PATCH 1/2] Travis-CI: use sugulite environment,
Nicolas Iooss
Re: suspicious __GFP_NOMEMALLOC in selinux,
Paul Moore
httpd_graceful_shutdown makes httpd_can_network_connect mostly mute,
Carlos Rodrigues
[PATCH v3] selinux-testsuite: Add tests for transitions under NNP/nosuid, Stephen Smalley
[PATCH v2] selinux-testsuite: Add tests for transitions under NNP/nosuid,
Stephen Smalley
[PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
setfiles crashing when SELinux is disabled,
Laurent Bigonville
Email problems with this mailing list,
Paul Bolton via Selinux
test email delivery,
Paul Bolton via Selinux
[PATCH] selinux: update the selinux info in MAINTAINERS, Paul Moore
Please adjust the SELinux/audit trees for linux-next,
Paul Moore
SELinux kernel repository moving to kernel.org, Paul Moore
[PATCH] selinux: remove AVC init audit log message,
Richard Guy Briggs
[PATCH 1/4] sepolicy: Fix minor typo in 'transition -s' test,
Petr Lautrbach
[PATCH] libsepol: cil: enable cpp compilation of cil.h.,
Daniel Cashman
[PATCH] libselinux: fix thread safety issues with lookup_common(),
Tom Cherry via Selinux
Re: Security next tree merged to v4.13-rc2, Paul Moore
[PATCH] selinux: genheaders should fail if too many permissions are defined,
Stephen Smalley
[PATCH] selinux-testsuite: Add tests for transitions under NNP/nosuid,
Stephen Smalley
[PATCH v3] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
[PATCH v2] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
SELinux/IP_PASSSEC regression in 4.13-rcX,
Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]