Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH v3] selinux: libselinux: Enable multiple input files to selabel_open., (continued)
- [RFC PATCH 4/5] netlabel: Add SCTP support,
Richard Haines
- [RFC PATCH 2/5] sctp: Add ip option support,
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support,
Richard Haines
- [RFC PATCH 3/5] sctp: Add LSM hooks,
Richard Haines
- [RFC PATCH 0/5] Add SELinux SCTP protocol support,
Richard Haines
- [RFC PATCH 1/5] security: Add support for SCTP security hooks,
Richard Haines
- [PATCH 1/2] security: Add a cred_getsecid hook,
Matthew Garrett via Selinux
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
- [PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len,
Colin King
- [PATCH] selinux: remove redundant assignment to len,
Colin King
- [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len,
Colin King
- [PATCH] selinux: remove redundant assignment to str,
Colin King
- [PATCH][RFC] selinuxns: mark init_selinux_ns as __ro_after_init,
James Morris
- RowHammer Protection, Patrick K., ITF
- travis CI,
William Roberts
- [PATCH net-next v3 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
- [PATCH] libselinux: Add support for pcre2 to pkgconfig definition,
Petr Lautrbach
- [PATCH net-next v2 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
- [PATCH] selinux: Fix bool initialization/comparison,
Thomas Meyer
- About commit 901ef845fa2469c ("selinux: allow per-file labeling for cgroupfs"),
Waiman Long
- [PATCH 0/4] net-next: security: New file mode and LSM hooks for eBPF object permission control,
Chenbo Feng
- [PATCH 1/2] selinux: fix build warning by removing the unused sid variable,
Corentin Labbe
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks,
Paul Moore
- [PATCH] semodule-utils: remove semodule_deps,
Stephen Smalley
- Labeling sysfs files,
David Graziano
- [RFC 00/10] Introduce a SELinux namespace,
Stephen Smalley
- [RFC 06/10] selinux: introduce cred_selinux_ns() and use it, Stephen Smalley
- [RFC 07/10] selinux: support per-namespace inode security structures, Stephen Smalley
- [RFC 10/10] selinuxfs: restrict write operations to the same selinux namespace, Stephen Smalley
- [RFC 01/10] selinux: introduce a selinux namespace, Stephen Smalley
[PATCH 1/4] gui: remove the status bar,
Nicolas Iooss
[PATCH 1/2 v2] selinux-testsuite: README: Update kernel config requirements,
Stephen Smalley
[PATCH] selinux-testsuite: README: Update kernel config requirements, Stephen Smalley
Enable listing fcontexts.homedirs,
Vit Mojzis
[PATCH 1/2] sepolicy: ignore comments and empty lines in file_contexts.subs_dist,
Nicolas Iooss
[PATCH 1/1] Travis-CI: fix configuration after September's update,
Nicolas Iooss
A casestudy where selinux has stopped malware attacks,
masoom alam
FYI: selinux/next rebase to v4.14-rc1, Paul Moore
[PATCH 1/1] gui: port to Python 3 by migrating to PyGI,
Nicolas Iooss
Shepherd - A mandatory Access Controller (Selinux) for VMs/Containers,
masoom alam
[PATCH v2 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist,
Nicolas Iooss
My notes from the 2017 Linux Security Summit, Paul Moore
[PATCH 1/1] sepolicy: do not fail when file_contexts.local or .subs do not exist,
Nicolas Iooss
[PATCH] libsepol: fix memory leak in sepol_bool_query(),
Jan . Zarsky . jzarsky
with extended_socket_class should be still be seeing "socket"?,
Dominick Grift
[PATCH] selinux: libselinux: Enable multiple input files to selabel_open.,
Daniel Cashman
[PATCH] libselinux: log no default label warning in verbose mode,
Christian Göttsche via Selinux
restorecon: Warning no default label for foo, Christian Göttsche
Userspace Python version,
Chris PeBenito
[PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill,
Stephen Smalley
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Casey Schaufler
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Paul Moore
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Casey Schaufler
- Re: [PATCH] usb, signal, security: only pass the cred, not the secid, to kill_pid_info_as_cred and security_task_kill, Greg KH
- Message not available
conditional role and range transitions?,
Dominick Grift
pam_selinux and systemd,
Dominick Grift
[PATCH] selinux: Use kmem_cache for hashtab_node,
Kyeongdon Kim
[PATCH 1/6] libsepol: use IN6ADDR_ANY_INIT to initialize IPv6 addresses,
Nicolas Iooss
[PATCH 0/3] Security: add lsm hooks for checking permissions on eBPF objects,
Chenbo Feng
[GIT PULL] SELinux patches for v4.14,
Paul Moore
[PATCH] libsepol/cil: Keep attributes used by generated attributes in neverallow rules,
James Carter
[PATCH v2] libsepol: cil: Add ability to redeclare types[attributes],
Daniel Cashman
sysfs symlinks in genfscon,
Jeffrey Vander Stoep via Selinux
[PATCH] selinux: constify nf_hook_ops,
Arvind Yadav
Permissions for eBPF objects,
Jeffrey Vander Stoep via Selinux
[PATCH] libsepol: reset pointer after free,
Jan Zarsky
[no subject],
Sky Autumn
[PATCH 0/1] RFC: Allow for multiple cil declarations.,
Daniel Cashman
[PATCH] Fixed bad reference in roleattribute, James Carter
[PATCH] checkpolicy, libselinux, libsepol, policycoreutils: Update my email address, Stephen Smalley
[PATCH 1/2] selinux: update my email address,
Stephen Smalley
[PATCH 0/4] SELinux: Fine-tuning for some function implementations,
SF Markus Elfring via Selinux
[PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information,
Paul Moore
ANN: SETools 4.1.1, Chris PeBenito
ANN: Reference Policy 2.20170805, Chris PeBenito
[PATCH 1/6] sepolicy: fix Python3 syntax in manpage,
Nicolas Iooss
[PATCH 1/2] Travis-CI: use sugulite environment,
Nicolas Iooss
Re: suspicious __GFP_NOMEMALLOC in selinux,
Paul Moore
httpd_graceful_shutdown makes httpd_can_network_connect mostly mute,
Carlos Rodrigues
[PATCH v3] selinux-testsuite: Add tests for transitions under NNP/nosuid, Stephen Smalley
[PATCH v2] selinux-testsuite: Add tests for transitions under NNP/nosuid,
Stephen Smalley
[PATCH v4] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
setfiles crashing when SELinux is disabled,
Laurent Bigonville
Email problems with this mailing list,
Paul Bolton via Selinux
test email delivery,
Paul Bolton via Selinux
[PATCH] selinux: update the selinux info in MAINTAINERS, Paul Moore
Please adjust the SELinux/audit trees for linux-next,
Paul Moore
SELinux kernel repository moving to kernel.org, Paul Moore
[PATCH] selinux: remove AVC init audit log message,
Richard Guy Briggs
[PATCH 1/4] sepolicy: Fix minor typo in 'transition -s' test,
Petr Lautrbach
[PATCH] libsepol: cil: enable cpp compilation of cil.h.,
Daniel Cashman
[PATCH] libselinux: fix thread safety issues with lookup_common(),
Tom Cherry via Selinux
Re: Security next tree merged to v4.13-rc2, Paul Moore
[PATCH] selinux: genheaders should fail if too many permissions are defined,
Stephen Smalley
[PATCH] selinux-testsuite: Add tests for transitions under NNP/nosuid,
Stephen Smalley
[PATCH v3] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
[PATCH v2] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
SELinux/IP_PASSSEC regression in 4.13-rcX,
Paul Moore
[PATCH] selinux-testsuite: Add tests for AT_SECURE,
Stephen Smalley
[PATCH 1/2] Revert "open_init_pty: Do not make stdin and stdout non-blocking",
Stephen Smalley
Re: open_init_pty: Do not make stdin and stdout non-blocking, Laurent Bigonville
[PATCH] libsepol: Define nnp_nosuid_transition policy capability, Stephen Smalley
[PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions,
Stephen Smalley
Re: [PATCH] selinux: Generalize support for NNP/nosuid SELinux domain transitions, Andy Lutomirski
Message not available
[PATCH] Additional tests for long-time supported netlink classes,
Milos Malik
[RFC][PATCH] selinux: Introduce a policy capability and permission for NNP transitions,
Stephen Smalley
[PATCH] open_init_pty: Do not make stdin and stdout non-blocking, Stephen Smalley
[PATCH v2 0/8] exec: Use sane stack rlimit under secureexec,
Kees Cook
[GIT PULL] SELinux fixes for v4.13 (#1), Paul Moore
[PATCH v1 1/1] IB/core: Fix static analysis warning in ib_policy_change_task,
Dan Jurgens
[PATCH] Fix consistency of PYTHONLIBDIR variable across modules,
Laurent Bigonville
[PATCH] IB/core: Fix static analysis warning in ib_policy_change_task,
Dan Jurgens
[PATCH] IB/core: Fix uninitialized variable use in check_qp_port_pkey_settings,
Dan Jurgens
[PATCH] selinux: return -ENOMEM if kzalloc() fails,
Dan Carpenter
[PATCH 1/3] Travis-CI: update the list of Ruby's and Python's versions,
Nicolas Iooss
[PATCH] libselinux,libsemanage: fix RUBYLIBS definition, Stephen Smalley
[PATCH] Fix consistency of PYTHONLIBDIR variable,
bigon
run_init messes up terminal settings,
Laurent Bigonville
Re: [PATCH 3/3] Enable security.selinux in user namespaces,
Stephen Smalley
[PATCH] mcstrans: Allow overriding libsepol.a location during build,
Petr Lautrbach
[GIT PULL] SELinux patches for v4.13,
Paul Moore
[PATCH 1/3] libsemanage/tests: fix linking,
Nicolas Iooss
New SELinux/Container Blog,
Daniel Walsh
[PATCH] selinux: enable genfscon labeling for tracefs,
Jeff Vander Stoep via Selinux
[PATCH] Makefiles: override *FLAGS and *LIBS,
Jason Zaman
[PATCH] Fix BINDIR/SBINDIR/... variables in Makefiles, Stephen Smalley
[PATCH 0/3] Portability improvements,
Patrick Steinhardt
[RFC][PATCH] Make BINDIR/SBINDIR/USRSBINDIR definition and usage consistent., Stephen Smalley
[PATCH] selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets,
Luis Ressel
[PATCH] libselinux utils: override LD{FLAGS, LIBS} for libselinux.so in Makefile, Jason Zaman
BINDIR/SBINDIR/... variables in Makefiles,
Nicolas Iooss
[PATCH] policycoreutils/fixfiles: do not dereference link files in tmp,
Vit Mojzis
[PATCH v2] libsepol/cil: Fix bugs when writing policy.conf rules,
James Carter
[PATCH] libsepol/cil: Fix bugs when writing policy.conf rules,
James Carter
Collecting ideas for audit2allow improvement,
Jan Zarsky
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]