Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] libsepol/cil: Warn instead of fail if permission is not resolve, (continued)
- selinux custom mls label, Kashif ali
- [PATCH] genhomedircon: add support for %group syntax,
Gary Tierney
- I still think typebounds checking is too tight.,
Daniel J Walsh
- [PATCH] libsepol/cil: Ignore object_r in userrole mappings when creating policy binary,
Steve Lawrence
- [PATCH] semanage: add auditing of changes in records,
Miroslav Vadkerti
- [PATCH] security: lsm_audit: print pid and tid,
Jeff Vander Stoep
- [PATCH V3 4/4] policycoreutils: restorecond - Modify to use selinux_restorecon, Richard Haines
- [PATCH V3 3/4] policycoreutils: setfiles - Modify to use selinux_restorecon, Richard Haines
- [PATCH V3 2/4] libselinux: Add setfiles support to selinux_restorecon(3), Richard Haines
- [PATCH V3 1/4] libselinux: Evaluate inodes in selinux_restorecon(3), Richard Haines
- [PATCH V3 0/4] Update setfiles/restorecon to support selinux_restorecon,
Richard Haines
- [PATCH 1/2] semanage: add auditing of changes in records,
Miroslav Vadkerti
- genhomedircon: some issues with a custom policy,
Gary Tierney
- Is there any SELinux support for labelled printing like with Trusted Extensions?,
ileyd
- rpm running with MLS range?,
Miroslav Grepl
- [PATCH 2/2 v4] proc: Add LSM hook checks to /proc/<tid>/timerslack_ns,
John Stultz
- redis - selinux,
Kamil Boratyński
- [RFC][PATCH 2/2 v3] security: Add task_settimerslack/task_gettimerslack LSM hook,
John Stultz
RFC Fuzzing SE Linux interfaces,
Roberts, William C
[PATCH] field-dictionary: add ioctlcmd,
william . c . roberts
Re: [RFC][PATCH 2/2 v2] security: Add task_settimerslack LSM hook,
Nick Kralevich
Re: [RFC][PATCH 1/2 v2] proc: Relax /proc/<tid>/timerslack_ns capability requirements,
Nick Kralevich
[PATCH v2 0/9] SELinux support for Infiniband RDMA,
Dan Jurgens
- [PATCH v2 1/9] IB/core: IB cache enhancements to support Infiniband security, Dan Jurgens
- [PATCH v2 3/9] selinux lsm IB/core: Implement LSM notification system, Dan Jurgens
- [PATCH v2 2/9] IB/core: Enforce PKey security on QPs, Dan Jurgens
- [PATCH v2 4/9] IB/core: Enforce security on management datagrams, Dan Jurgens
- [PATCH v2 5/9] selinux: Create policydb version for Infiniband support, Dan Jurgens
- [PATCH v2 6/9] selinux: Allocate and free infiniband security hooks, Dan Jurgens
- [PATCH v2 7/9] selinux: Implement Infiniband PKey "Access" access vector, Dan Jurgens
- [PATCH v2 8/9] selinux: Add IB Port SMP access vector, Dan Jurgens
- [PATCH v2 9/9] selinux: Add a cache for quicker retreival of PKey SIDs, Dan Jurgens
- Re: [PATCH v2 0/9] SELinux support for Infiniband RDMA, Paul Moore
[PATCH] selinux: print leading 0x on ioctlcmd audits,
william . c . roberts
[PATCH] security: Use IS_ENABLED() instead of checking for built-in or module,
Javier Martinez Canillas
[PATCH] Extend checkpolicy pathname matching.,
Stephen Smalley
[PATCH 1/2] policycoreutils: Remove duplicate, empty translation files,
Petr Lautrbach
Inconsistent RSS on Red Hat 7 but not 6.,
Todd Rinaldo
[PATCH] libsepol: Add missing return to sepol_node_query(),
Petr Lautrbach
[GIT PULL] SELinux patches for 4.8, Paul Moore
[PATCH] libselinux: If autorelabel, force permissive mode.,
Richard W.M. Jones
[PATCH] libselinux: Add openrc_contexts functions,
Jason Zaman
[PATCH] open_init_pty: Do not error on EINTR,
Jason Zaman
[BUG libselinux] Use nftw() instead of fts(),
Thomas Petazzoni
[PATCH libsepol] Add missing <stdarg.h> include,
Thomas Petazzoni
Fwd: SElinux user tools 2.5 change,
Daniel J Walsh
[PATCH] policycoreutils: fix [-s STORE] typos in semanage,
Petr Lautrbach
[PATCH] libselinux: Change the location of _selinux.so,
Petr Lautrbach
[PATCH 00/12] SELinux support for Infiniband RDMA,
Dan Jurgens
- [PATCH 01/12] security: Add LSM hooks for Infiniband security, Dan Jurgens
- [PATCH 02/12] selinux: Create policydb version for Infiniband support, Dan Jurgens
- [PATCH 03/12] selinux: Implement Infiniband flush callback, Dan Jurgens
- [PATCH 05/12] selinux: Implement Infiniband PKey "Access" access vector, Dan Jurgens
- [PATCH 08/12] IB/core: IB cache enhancements to support Infiniband security, Dan Jurgens
- [PATCH 07/12] selinux: Add a cache for quicker retreival of PKey SIDs, Dan Jurgens
- [PATCH 10/12] IB/core: Enforce PKey security on management datagrams, Dan Jurgens
- [PATCH 09/12] IB/core: Enforce PKey security on QPs, Dan Jurgens
- [PATCH 12/12] IB/core: Implement the Infiniband flush callback, Dan Jurgens
- [PATCH 04/12] selinux: Allocate and free infiniband security hooks, Dan Jurgens
- [PATCH 06/12] selinux: Add IB End Port SMP access vector, Dan Jurgens
- [PATCH 11/12] IB/core: Enforce Infiniband device SMI security, Dan Jurgens
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA, Paul Moore
- Re: [PATCH 00/12] SELinux support for Infiniband RDMA, Yuval Shaia
abnormal SELinux context labels,
Bond Masuda
New rules on restrict kernel module loading,
Ravi Kumar
[PATCH] libsepol: rewrite sepol_string_to_security_class to use hashtab_search, Stephen Smalley
[PATCH 1/2] libselinux: man: Explain how to free policy type from selinux_getpolicytype(),
Petr Lautrbach
[PATCH] libselinux: compare absolute pathname in matchpathcon -V,
Petr Lautrbach
[PATCH v4 05/19] netlabel: Add support for enumerating the CALIPSO DOI list., Huw Davies
[PATCH v4 07/19] netlabel: Add support for removing a CALIPSO DOI., Huw Davies
[PATCH v4 08/19] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer., Huw Davies
[PATCH v4 15/19] calipso: Allow the lsm to label the skbuff directly., Huw Davies
[PATCH v4 02/19] netlabel: Add an address family to domain hash entries., Huw Davies
[PATCH v4 06/19] netlabel: Add support for creating a CALIPSO protocol domain mapping., Huw Davies
[PATCH v4 04/19] netlabel: Add support for querying a CALIPSO DOI., Huw Davies
[PATCH v4 03/19] netlabel: Initial support for the CALIPSO netlink protocol., Huw Davies
[PATCH v4 10/19] calipso: Set the calipso socket label to match the secattr., Huw Davies
[PATCH v4 09/19] netlabel: Move bitmap manipulation functions to the NetLabel core., Huw Davies
[PATCH v4 13/19] calipso: Allow request sockets to be relabelled by the lsm., Huw Davies
[PATCH v4 11/19] netlabel: Prevent setsockopt() from changing the hop-by-hop option., Huw Davies
[PATCH v4 12/19] ipv6: Allow request socks to contain IPv6 options., Huw Davies
[PATCH v4 16/19] netlabel: Pass a family parameter to netlbl_skbuff_err()., Huw Davies
[PATCH v4 14/19] ipv6: constify the skb pointer of ipv6_find_tlv()., Huw Davies
[PATCH v4 17/19] calipso: Add validation of CALIPSO option., Huw Davies
[PATCH v4 18/19] calipso: Add a label cache., Huw Davies
[PATCH v4 00/19] CALIPSO Implementation,
Huw Davies
[PATCH v4 19/19] netlabel: Implement CALIPSO config functions for SMACK., Huw Davies
[PATCH v4 01/19] netlabel: Mark rcu pointers with __rcu., Huw Davies
When/how to use "delete" in CIL?,
Sven Vermeulen
sandbox - trying to use it / some bugs,
linseonn . 20 . mddlr
[PATCH] checkpolicy: Fix typos in test/dispol,
Petr Lautrbach
[PATCH] libselinux: add selinux_snapperd_contexts_path(),
Petr Lautrbach
Selectively assigning SELinux policies to permissive and enforcement mode,
Taeho Kgil
[PATCH V2 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon,
Richard Haines
[PATCH V2 2/3] libselinux: Add setfiles support to selinux_restorecon(3),
Richard Haines
[PATCH V2 1/3] libselinux: Evaluate inodes in selinux_restorecon(3), Richard Haines
[PATCH V2 0/3] Update setfiles/restorecon to support selinux_restorecon,
Richard Haines
Protect Xen Virtualization via SElinux.,
Jason Long
[PATCH] netlabel: handle sparse category maps in netlbl_catmap_getlong(),
Paul Moore
[PATCH] selinux: import NetLabel category bitmaps correctly, Paul Moore
[PATCH 1/1] selinuxfs: fix type mismatch,
Heinrich Schuchardt
Re: [PATCH 04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps, Ryusuke Konishi
[PATCH] iucv: properly clone LSM attributes to newly created child sockets,
Paul Moore
[PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros,
Deepa Dinamani
Problem building CLIP ISO,
John Chludzinski
[PATCH] netlabel: add address family checks to netlbl_{sock, req}_delattr(),
Paul Moore
[PATCH 1/2] Modify audit2why analyze function to use loaded policy,
Joshua Brindle
[PATCH] Modify audit2why analyze function to use loaded policy,
Joshua Brindle
XWindows and CLIP?,
John Chludzinski
[PATCH] Sort object files for deterministic linking order,
Laurent Bigonville
[PATCH] LSM: Reorder security_capset to do access checks properly,
Casey Schaufler
Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing"),
Paul Moore
[RFC 0/2] selinux: Stop looking up dentries from inodes,
Andreas Gruenbacher
[PATCH] policycoreutils: fix typos in semanage manpages,
Philipp Gesang
[PATCH v4] selinux: Only apply bounds checking to source types,
Stephen Smalley
libsepol will not compile,
Jesse M. Bacon
[PATCH] Fix neverallowxperm checking on attributes,
Jeff Vander Stoep
ANN: SETools 4.0.1, Christopher J. PeBenito
[PATCH] semodule: Fix the --list-modules=full example in the manpage,
Laurent Bigonville
[PATCH v2] policycoreutils: Minor fix in a French translation,
Laurent Bigonville
[PATCH] policycoreutils: Minor fix for in a French translation, Laurent Bigonville
[PATCH] checkpolicy: set flex as default lexer,
Julien Pivotto
[PATCH] checkpolicy: Fix checkmodule output message,
Petr Lautrbach
[PATCH] Avoid mounting /proc outside of selinux_init_load_policy()., Stephen Smalley
[PATCH] setools3: Allow to override PKG_CONFIG, Julien Pivotto
[PATCH] libqpol: Make Makefile AR overwritable, Julien Pivotto
[PATCH] libsemanage: Support overriding Makefile RANLIB,
Julien Pivotto
[PATCH 3/3] policycoreutils: setfiles - Modify to use selinux_restorecon,
Richard Haines
[PATCH 2/3] libselinux: Add setfiles support to selinux_restorecon(3),
Richard Haines
[PATCH 1/3] libselinux: Evaluate inodes in selinux_restorecon(3),
Richard Haines
[PATCH 0/3] Update setfiles/restorecon to support selinux_restorecon, Richard Haines
[PATCH] policycoreutils: fix the extract example in semodule.8,
Petr Lautrbach
[PATCH] policycoreutils: update sandbox.8 man page, Petr Lautrbach
[PATCH] policycoreutils: remove typos from chcat --help, Petr Lautrbach
[SUSPECTED SPAM] SELinux/Docker blog on passing socket descriptors between containers.,
Daniel J Walsh
[PATCH] libselinux, libsemanage: respect CC and PKG_CONFIG environment variable,
roidelapluie
[PATCH] libsepol: Change which attributes CIL keeps in the binary policy,
James Carter
<Possible follow-ups>
[PATCH] libsepol: Change which attributes CIL keeps in the binary policy, James Carter
[GIT PULL] SELinux patches for 4.7,
Paul Moore
[PATCH 0/6 v3] libsepol/cil: Add high-level language line marking support,
James Carter
[PATCH 0/3] Update make clean instructions and .gitgnore files,
Nicolas Iooss
Licence of the new setools icons,
Laurent Bigonville
Selinux Docker issues,
Naina Emmanuel
[PATCH 0/6 v2] libsepol/cil: Add high-level language line marking support,
James Carter
SELinux build errors,
David Merritt
ANN: SETools 4.0.0, Christopher J. PeBenito
[PATCH] libsepol: Change logic of bounds checking,
James Carter
[PATCH v3] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH] libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__.,
Stephen Smalley
[PATCH] Fix multiple spelling errors,
Laurent Bigonville
Re: policycoreutils: fixfiles does not relabel contents of btrfs subvolumes, Laurent Bigonville
genhomedircon userid patches v4,
Jason Zaman
[PATCH] libsepol: Only apply bounds checking to source types in rules,
James Carter
[PATCH] libsepol/cil: Do not add an attribute as a type in the attr_type_map,
James Carter
userspace object managers get confused if an update changes object classes and access vectors,
Dominick Grift
[PATCH v2] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH] selinux: Only apply bounds checking to source types,
Stephen Smalley
[PATCH 1/2] libsepol: Only apply bounds checking to source types in rules,
Stephen Smalley
Trying to setup a type bounds from unconfined_t and docekr_t to svirt_lxc_net_t,
Daniel J Walsh
[PATCH v4 00/21] Support fuse mounts in user namespaces,
Seth Forshee
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v4 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns, Seth Forshee
- Message not available
<Possible follow-ups>
[PATCH v4 00/21] Support fuse mounts in user namespaces, Seth Forshee
- [PATCH v4 01/21] fs: fix a posible leak of allocated superblock, Seth Forshee
- [PATCH v4 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v4 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces, Seth Forshee
- [PATCH v4 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v4 05/21] block_dev: Check permissions towards block device inode when mounting, Seth Forshee
- [PATCH v4 07/21] selinux: Add support for unprivileged mounts from user namespaces, Seth Forshee
- [PATCH v4 06/21] fs: Treat foreign mounts as nosuid, Seth Forshee
- [PATCH v4 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v4 09/21] Smack: Handle labels consistently in untrusted mounts, Seth Forshee
- [PATCH v4 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v4 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v4 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns, Seth Forshee
- [PATCH v4 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
- [PATCH v4 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v4 15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns, Seth Forshee
- [PATCH v4 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v4 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs, Seth Forshee
- [PATCH v4 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v4 19/21] fuse: Support fuse filesystems outside of init_user_ns, Seth Forshee
- [PATCH v4 20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant, Seth Forshee
- [PATCH v4 21/21] fuse: Allow user namespace mounts, Seth Forshee
trying to understand a cronie issue anno 2008,
Dominick Grift
[PATCH] selinux: Build policy on systems not supporting DCCP protocol,
Richard Haines
[PATCH v3 00/21] Support fuse mounts in user namespaces,
Seth Forshee
- [PATCH v3 01/21] fs: fix a posible leak of allocated superblock, Seth Forshee
- [PATCH v3 04/21] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH v3 16/21] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH v3 18/21] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH v3 09/21] Smack: Handle labels consistently in untrusted mounts, Seth Forshee
- [PATCH v3 17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs, Seth Forshee
- [PATCH v3 21/21] fuse: Allow user namespace mounts, Seth Forshee
- [PATCH v3 10/21] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH v3 07/21] selinux: Add support for unprivileged mounts from user namespaces, Seth Forshee
- [PATCH v3 12/21] fs: Refuse uid/gid changes which don't map into s_user_ns, Seth Forshee
- [PATCH v3 02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible(), Seth Forshee
- [PATCH v3 11/21] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH v3 14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids, Seth Forshee
- [PATCH v3 03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces, Seth Forshee
- [PATCH v3 08/21] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH v3 06/21] fs: Treat foreign mounts as nosuid, Seth Forshee
- [PATCH v3 13/21] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
[PATCH] Fix extended permissions neverallow checking,
Jeff Vander Stoep
[PATCH] selinux: check ss_initialized before revalidating an inode label, Paul Moore
[PATCH] selinux: delay inode label lookup as long as possible, Paul Moore
[PATCH] selinux: don't revalidate an inode's label when explicitly setting it, Paul Moore
[PATCH 0/6] ibsepol/cil: Add high-level language line marking support,
James Carter
[PATCH] security/selinux: Change bool variable name to index.,
Prarit Bhargava
[RFC PATCH] selinux: always return a value from the netport/netnode/netif caches,
Paul Moore
[PATCH 0/3] libsepol/cil: Fixes to neverallow and bounds checking,
James Carter
Failure in sel_netport_sid_slow(),
Greg
[PATCH] fixfiles: make sure $LOGFILE starts with a slash, Oskari Saarenmaa
[PATCH] selinux-testsuite: Update README, Stephen Smalley
[PATCH] libselinux: Fix typo in sefcontext_compile.8,
Petr Lautrbach
Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA,
Jason Gunthorpe
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]