Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH 02/12] selinux: Create policydb version for Infiniband support, (continued)
- [PATCH 02/12] selinux: Create policydb version for Infiniband support, Dan Jurgens
- [PATCH 03/12] selinux: Implement Infiniband flush callback, Dan Jurgens
- [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector, Dan Jurgens
- [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security, Dan Jurgens
- [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs, Dan Jurgens
- [PATCH 10/12] IB/core: Enforce PKey security on management datagrams, Dan Jurgens
- [PATCH 09/12] IB/core: Enforce PKey security on QPs, Dan Jurgens
- [PATCH 12/12] IB/core: Implement the Infiniband flush callback, Dan Jurgens
- [PATCH 04/12] selinux: Allocate and free infiniband security hooks, Dan Jurgens
- [PATCH 06/12] selinux: Add IB End Port SMP access vector, Dan Jurgens
- [PATCH 11/12] IB/core: Enforce Infiniband device SMI security, Dan Jurgens
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA, Paul Moore
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA, Yuval Shaia
- abnormal SELinux context labels,
Bond Masuda
- New rules on restrict kernel module loading,
Ravi Kumar
- [PATCH] libsepol: rewrite sepol_string_to_security_class to use hashtab_search, Stephen Smalley
- [PATCH 1/2] libselinux: man: Explain how to free policy type from selinux_getpolicytype(),
Petr Lautrbach
- [PATCH] libselinux: compare absolute pathname in matchpathcon -V,
Petr Lautrbach
- [PATCH v4 05/19] netlabel: Add support for enumerating the CALIPSO DOI list., Huw Davies
- [PATCH v4 07/19] netlabel: Add support for removing a CALIPSO DOI., Huw Davies
- [PATCH v4 08/19] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer., Huw Davies
- [PATCH v4 15/19] calipso: Allow the lsm to label the skbuff directly., Huw Davies
- [PATCH v4 02/19] netlabel: Add an address family to domain hash entries., Huw Davies
- [PATCH v4 06/19] netlabel: Add support for creating a CALIPSO protocol domain mapping., Huw Davies
- [PATCH v4 04/19] netlabel: Add support for querying a CALIPSO DOI., Huw Davies
- [PATCH v4 03/19] netlabel: Initial support for the CALIPSO netlink protocol., Huw Davies
- [PATCH v4 10/19] calipso: Set the calipso socket label to match the secattr., Huw Davies
- [PATCH v4 09/19] netlabel: Move bitmap manipulation functions to the NetLabel core., Huw Davies
- [PATCH v4 13/19] calipso: Allow request sockets to be relabelled by the lsm., Huw Davies
- [PATCH v4 11/19] netlabel: Prevent setsockopt() from changing the hop-by-hop option., Huw Davies
- [PATCH v4 12/19] ipv6: Allow request socks to contain IPv6 options., Huw Davies
- [PATCH v4 16/19] netlabel: Pass a family parameter to netlbl_skbuff_err()., Huw Davies
- [PATCH v4 14/19] ipv6: constify the skb pointer of ipv6_find_tlv()., Huw Davies
- [PATCH v4 17/19] calipso: Add validation of CALIPSO option., Huw Davies
- [PATCH v4 18/19] calipso: Add a label cache., Huw Davies
- [PATCH v4 00/19] CALIPSO Implementation,
Huw Davies
- [PATCH v4 19/19] netlabel: Implement CALIPSO config functions for SMACK., Huw Davies
- [PATCH v4 01/19] netlabel: Mark rcu pointers with __rcu., Huw Davies
- When/how to use "delete" in CIL?,
Sven Vermeulen
- sandbox - trying to use it / some bugs,
linseonn . 20 . mddlr
- [PATCH] checkpolicy: Fix typos in test/dispol,
Petr Lautrbach
- [PATCH] libselinux: add selinux_snapperd_contexts_path(),
Petr Lautrbach
- Selectively assigning SELinux policies to permissive and enforcement mode,
Taeho Kgil
- [PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon,
Richard Haines
- [PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3),
Richard Haines
- [PATCH V2 1/3] libselinux: Evaluate inodes in selinux_restorecon(3), Richard Haines
- [PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon,
Richard Haines
- Protect Xen Virtualization via SElinux.,
Jason Long
- [PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong(),
Paul Moore
- [PATCH] selinux: import NetLabel category bitmaps correctly, Paul Moore
- [PATCH 1/1] selinuxfs: fix type mismatch,
Heinrich Schuchardt
- Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps, Ryusuke Konishi
- [PATCH] iucv: properly clone LSM attributes to newly created child sockets,
Paul Moore
- [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros,
Deepa Dinamani
- Problem building CLIP ISO,
John Chludzinski
- [PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr(),
Paul Moore
- [PATCH 1/2] Modify audit2why analyze function to use loaded policy,
Joshua Brindle
- [PATCH] Modify audit2why analyze function to use loaded policy,
Joshua Brindle
- XWindows and CLIP?,
John Chludzinski
- [PATCH] Sort object files for deterministic linking order,
Laurent Bigonville
- [PATCH] LSM: Reorder security_capset to do access checks properly,
Casey Schaufler
- Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing"),
Paul Moore
- [RFC 0/2] selinux: Stop looking up dentries from inodes,
Andreas Gruenbacher
- [PATCH] policycoreutils: fix typos in semanage manpages,
Philipp Gesang
- [PATCH v4] selinux: Only apply bounds checking to source types,
Stephen Smalley
- libsepol will not compile,
Jesse M. Bacon
- [PATCH] Fix neverallowxperm checking on attributes,
Jeff Vander Stoep
- ANN: SETools 4.0.1, Christopher J. PeBenito
- [PATCH] semodule: Fix the --list-modules=full example in the manpage,
Laurent Bigonville
- [PATCH v2] policycoreutils: Minor fix in a French translation,
Laurent Bigonville
- [PATCH] policycoreutils: Minor fix for in a French translation, Laurent Bigonville
- [PATCH] checkpolicy: set flex as default lexer,
Julien Pivotto
- [PATCH] checkpolicy: Fix checkmodule output message,
Petr Lautrbach
- [PATCH] Avoid mounting /proc outside of selinux_init_load_policy()., Stephen Smalley
- [PATCH] setools3: Allow to override PKG_CONFIG, Julien Pivotto
- [PATCH] libqpol: Make Makefile AR overwritable, Julien Pivotto
- [PATCH] libsemanage: Support overriding Makefile RANLIB,
Julien Pivotto
- [PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon,
Richard Haines
- [PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3),
Richard Haines
- [PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3),
Richard Haines
- [PATCH 0/3] Update setfiles/restorecon to support selinux_restorecon, Richard Haines
- [PATCH] policycoreutils: fix the extract example in semodule.8,
Petr Lautrbach
- [PATCH] policycoreutils: update sandbox.8 man page, Petr Lautrbach
- [PATCH] policycoreutils: remove typos from chcat --help, Petr Lautrbach
- [SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.,
Daniel J Walsh
- [PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable,
roidelapluie
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy,
James Carter
- <Possible follow-ups>
- [PATCH] libsepol: Change which attributes CIL keeps in the binary policy, James Carter
[GIT PULL] SELinux patches for 4.7,
Paul Moore
[PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support,
James Carter
[PATCH 0/3] Update make clean instructions and .gitgnore files,
Nicolas Iooss
Licence of the new setools icons,
Laurent Bigonville
Selinux Docker issues,
Naina Emmanuel
[PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support,
James Carter
SELinux build errors,
David Merritt
ANN: SETools 4.0.0, Christopher J. PeBenito
[PATCH] libsepol: Change logic of bounds checking,
James Carter
[PATCH v3] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.,
Stephen Smalley
[PATCH] Fix multiple spelling errors,
Laurent Bigonville
Re: policycoreutils: fixfiles does not relabel contents of btrfs subvolumes, Laurent Bigonville
genhomedircon userid patches v4,
Jason Zaman
[PATCH] libsepol: Only apply bounds checking to source types in rules,
James Carter
[PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map,
James Carter
userspace object managers get confused if an update changes object classes and access vectors,
Dominick Grift
[PATCH v2] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH 1/2] libsepol: Only apply bounds checking to source types in rules,
Stephen Smalley
Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t,
Daniel J Walsh
[PATCH v4 00/21] Support fuse mounts in user namespaces,
Seth Forshee
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v4 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns, Seth Forshee
- Message not available
<Possible follow-ups>
[PATCH v4 00/21] Support fuse mounts in user namespaces, Seth Forshee
- [PATCH v4 01/21] fs: fix a posible leak of allocated superblock, Seth Forshee
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces, Seth Forshee
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v4 05/21] block_dev: Check permissions towards block device inode when mounting, Seth Forshee
- [PATCH v4 07/21] selinux: Add support for unprivileged mounts from user namespaces, Seth Forshee
- [PATCH v4 06/21] fs: Treat foreign mounts as nosuid, Seth Forshee
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v4 09/21] Smack: Handle labels consistently in untrusted mounts, Seth Forshee
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v4 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns, Seth Forshee
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v4 15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns, Seth Forshee
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs, Seth Forshee
- [PATCH v4 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns, Seth Forshee
- [PATCH v4 20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant, Seth Forshee
- [PATCH v4 21/21] fuse: Allow user namespace mounts, Seth Forshee
trying to understand a cronie issue anno 2008,
Dominick Grift
[PATCH] selinux: Build policy on systems not supporting DCCP protocol,
Richard Haines
[PATCH v3 00/21] Support fuse mounts in user namespaces,
Seth Forshee
- [PATCH v3 01/21] fs: fix a posible leak of allocated superblock, Seth Forshee
- [PATCH v3 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v3 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v3 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v3 09/21] Smack: Handle labels consistently in untrusted mounts, Seth Forshee
- [PATCH v3 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs, Seth Forshee
- [PATCH v3 21/21] fuse: Allow user namespace mounts, Seth Forshee
- [PATCH v3 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v3 07/21] selinux: Add support for unprivileged mounts from user namespaces, Seth Forshee
- [PATCH v3 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns, Seth Forshee
- [PATCH v3 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v3 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces, Seth Forshee
- [PATCH v3 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v3 06/21] fs: Treat foreign mounts as nosuid, Seth Forshee
- [PATCH v3 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
[PATCH] Fix extended permissions neverallow checking,
Jeff Vander Stoep
[PATCH] selinux: check ss_initialized before revalidating an inode label, Paul Moore
[PATCH] selinux: delay inode label lookup as long as possible, Paul Moore
[PATCH] selinux: don't revalidate an inode's label when explicitly setting it, Paul Moore
[PATCH 0/6] ibsepol/cil: Add high-level language line marking support,
James Carter
[PATCH] security/selinux: Change bool variable name to index.,
Prarit Bhargava
[RFC PATCH] selinux: always return a value from the netport/netnode/netif caches,
Paul Moore
[PATCH 0/3] libsepol/cil: Fixes to neverallow and bounds checking,
James Carter
Failure in sel_netport_sid_slow(),
Greg
[PATCH] fixfiles: make sure $LOGFILE starts with a slash, Oskari Saarenmaa
[PATCH] selinux-testsuite: Update README, Stephen Smalley
[PATCH] libselinux: Fix typo in sefcontext_compile.8,
Petr Lautrbach
Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA,
Jason Gunthorpe
Re: [PATCH] Android.mk: Add -D_GNU_SOURCE to common_cflags, Stephen Smalley
Re: [RFC PATCH v2 04/13] selinux: Allocate and free infiniband security hooks, Casey Schaufler
[PATCH] selinux: apply execstack check on thread stacks,
Stephen Smalley
[PATCH] selinux: distinguish non-init user namespace capability checks,
Stephen Smalley
[PATCH 0/2 v3] Check if module name different than output filename,
James Carter
Re: [RFC PATCH v2 11/13] ib/core: Enforce Infiniband device SMI security,
Leon Romanovsky
[PATCH net-next] security: drop the unused hook skb_owned_by,
Paolo Abeni
Re: [RFC PATCH v2 10/13] ib/core: Enforce PKey security on management datagrams, Leon Romanovsky
Re: [RFC PATCH v2 12/13] ib/core: Track which QPs are using which port and PKey index, Leon Romanovsky
Re: [RFC PATCH v2 09/13] ib/core: Enforce PKey security when modifying QPs,
Leon Romanovsky
[PATCH 0/2 v2] Warn if module name different than output filename,
James Carter
Re: [RFC PATCH v2 08/13] ib/core: IB cache enhancements to support Infiniband security,
Leon Romanovsky
[RFC][PATCH] selinux: apply execstack check on thread stacks,
Stephen Smalley
[RFC][PATCH] selinux: distinguish non-init user namespace capability checks,
Stephen Smalley
Re: [RFC PATCH 0/2] selinux: avoid nf hooks overhead when not needed,
Paul Moore
[PATCH] selinux: Add support for portcon dccp protocol,
Richard Haines
[PATCH] cil_mem.c: #define _GNU_SOURCE,
Nick Kralevich
Fwd: Kernel merge to v4.6-rc2, Paul Moore
[PATCH v3] selinux: restrict kernel module loading,
Jeff Vander Stoep
Re: [RFC PATCH 0/7] SELinux support for Infiniband RDMA,
James Morris
Re: [RFC PATCH 1/7] security: Add LSM hooks for Infiniband security,
Casey Schaufler
Project Status?,
John Gomez
[PATCH] selinux: restrict kernel module loading,
Jeff Vander Stoep
[PATCH v2] selinux: restrict kernel module loading,
Jeff Vander Stoep
[PATCH] selinux: consolidate the ptrace parent lookup code, Paul Moore
On Fedora 24 I am seeing something strange with CIL,
Daniel J Walsh
[PATCH] selinux: simply inode label states to INVALID and INITIALIZED, Paul Moore
[PATCH] selinux: don't revalidate inodes in selinux_socket_getpeersec_dgram(), Paul Moore
[PATCH] netlabel: fix a problem with netlbl_secattr_catmap_setrng(),
Paul Moore
CIL: invalid protocol (dccp portcon),
Dominick Grift
Fedora 23 error when using policy generator,
Amir Eaman
[PATCH 0/3] Add warnings if module name different from filename,
James Carter
Just sent a small patch to github to fix the selinuxfs man pages.,
Daniel J Walsh
[ANNOUNCE] Linux Security Summit 2016 - CFP, James Morris
what is /sys/fs/selinux/policy_capabilities/redhat1,
Dominick Grift
strange pam_selinux behavior,
Dominick Grift
does it make sense that dac_override get's checked before dac_read_search?,
Dominick Grift
selinux-query,
Naina Emmanuel
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]