Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] sepolgen: Use key function in sort(), (continued)
- [PATCH] secilc: Add support for unordered classes,
ykhodorkovskiy
- get_default_context() hit the SIMPLE_TRANSACTION_LIMIT,
Miroslav Grepl
- [PATCH] libselinux, policycoreutils: Man page warning fixes,
Ville Skyttä
- neverallow rules and self negation,
Nick Kralevich
- Wrong audit message type when policy is reloaded,
Laurent Bigonville
- New SELinux userspace release supporting extended ioctl permissions?,
Paul Moore
- [selinux-testsuite PATCH 0/4] inet_socket and mmap patches,
Jan Stancek
- selinux-testsuite: mmap execmod test failure on RHEL6.7 s390x,
Jan Stancek
- [PATCH v2] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm(),
Vladis Dronov
- [PATCH] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm(), Vladis Dronov
- [PATCH v5 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v4 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v3] selinux: export validatetrans decisions,
Andrew Perepechko
- [sandbox] init script of sandbox returns an improper return code in status function, Keigo Noha
- Macro help,
Dan
- [PATCH] Load libsepol.so.1 instead of libsepol.so,
Laurent Bigonville
- [PATCH v3] libselinux: label_file: fix memory leaks and uninitialized jump,
william . c . roberts
- [PATCH v2] selinux: export validatetrans decisions,
Andrew Perepechko
- [PATCH v2] fix memory leaks and uninitialized jump,
william . c . roberts
- [PATCH] selinux: export validatetrans decisions,
Andrew Perepechko
- [PATCH] selinux-testsuite: unix_socket: fix uninitialized sockaddr len arguments, Stephen Smalley
- [PATCH v3 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v3 1/7] selinux: Remove unused variable in selinux_inode_init_security, Andreas Gruenbacher
- [PATCH v3 5/7] security: Add hook to invalidate inode security labels, Andreas Gruenbacher
- [PATCH v3 2/7] selinux: Add accessor functions for inode->i_security, Andreas Gruenbacher
- [PATCH v3 4/7] selinux: Push dentry down from {dentry, path, file}_has_perm, Andreas Gruenbacher
- [PATCH v3 7/7] gfs2: Invalide security labels of inodes when they go invalid, Andreas Gruenbacher
- [PATCH v3 6/7] selinux: Revalidate invalid inode security labels, Andreas Gruenbacher
- [PATCH v3 3/7] selinux: Get rid of file_path_has_perm, Andreas Gruenbacher
- Re: [PATCH v3 0/7] Inode security label invalidation, Stephen Smalley
- Re: [PATCH v3 0/7] Inode security label invalidation, Paul Moore
- [PATCH] fix memory leaks and uninitialized jump,
william . c . roberts
- setoolsv4: tracking origin of a policy element,
Elena Reshetova
- [PATCH] sepolgen: Reset line numbers when parsing files,
Nicolas Iooss
- [PATCH V3] libselinux: Add selinux_restorecon function, Richard Haines
- [PATCH V2] libselinux: Replace selabel_digest hash function,
Richard Haines
- [GIT PULL] SELinux patches for 4.4,
Paul Moore
- [PATCH] libselinux: Replace selabel_digest hash function,
Richard Haines
- Static analysis to assist policy creation?,
Andrew Ruef
- how to troubleshoot SELinux when auditd won't start?,
Bond Masuda
- did libselinux grow a new build dependency? (openssl-devel: openssl.h),
Dominick Grift
- [PATCH] libselinux: Fix selabel_open(3) services if no digest requested, Richard Haines
- does load_policy default to loading the lowest polvers available?,
Dominick Grift
- [PATCH v4 00/11] Smack namespace,
Lukasz Pawelczyk
- [PATCH v4 05/11] smack: extend capability functions and fix 2 checks, Lukasz Pawelczyk
- [PATCH v4 04/11] lsm: inode_pre_setxattr hook, Lukasz Pawelczyk
- [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments, Lukasz Pawelczyk
- [PATCH v4 06/11] smack: don't use implicit star to display smackfs/syslog, Lukasz Pawelczyk
- [PATCH v4 08/11] smack: misc cleanups in preparation for a namespace patch, Lukasz Pawelczyk
- [PATCH v4 01/11] user_ns: 3 new LSM hooks for user namespace operations, Lukasz Pawelczyk
- [PATCH v4 10/11] smack: namespace implementation, Lukasz Pawelczyk
- [PATCH v4 11/11] smack: documentation for the Smack namespace, Lukasz Pawelczyk
- [PATCH v4 07/11] smack: abstraction layer for 2 common Smack operations, Lukasz Pawelczyk
- [PATCH v4 02/11] lsm: /proc/$PID/attr/label_map file and getprocattr_seq hook, Lukasz Pawelczyk
- [PATCH v4 09/11] smack: namespace groundwork, Lukasz Pawelczyk
- Re: [PATCH v4 00/11] Smack namespace, Lukasz Pawelczyk
- [PATCH v2 0/7] User namespace mount updates,
Seth Forshee
- [PATCH] libselinux: Fix parallel build with swig python,
Jason Zaman
- [RFC PATCH v3 0/5] kdbus LSM/SELinux hooks,
Paul Moore
- [RFC PATCH v2 0/5] kdbus LSM/SELinux hooks,
Paul Moore
- [PATCH] security: selinux: Use a kmem_cache for allocation struct file_security_struct,
Sangwoo
- [PATCH v2 1/2] security: Add hook to invalidate inode security labels,
Andreas Gruenbacher
- Computer Science and SE Linux,
Russell Coker
- MAP_STACK and execstack,
Nick Kralevich
- av_decision on audit callback,
Roberts, William C
- [PATCH 1/3] Fix newrole to not drop capabilities from the bounding set.,
Stephen Smalley
- [PATCH 0/5] User namespace mount updates,
Seth Forshee
- [RFC PATCH V3] libselinux: Add selabel_digest function,
Richard Haines
- [PATCH 0/5] Security: Provide unioned file support,
David Howells
- [PATCH 1/2] selinux: ioctl_has_perm should be static,
Geliang Tang
- [PATCH 0/5] selinux: minor cleanup suggestions,
Rasmus Villemoes
- [RFC PATCH V2] libselinux: Add selinux_restorecon function,
Richard Haines
- newrole not working when built with LSPP_PRIV=y,
Laurent Bigonville
- selinux network control question,
Dominick Grift
- Cil Macros,
Dan
- Find attributes for a type with sepol,
Roberts, William C
- [RFC PATCH v1 0/3] Another take on the kdbus LSM hooks,
Paul Moore
- [PATCH v4 0/7] Initial support for user namespace owned mounts,
Seth Forshee
- [PATCH v2] libselinux: flush the class/perm string mapping cache on policy reload,
Stephen Smalley
- [PATCH] libselinux: flush the class/perm string mapping cache on policy reload, Stephen Smalley
- [RFC PATCH] selinux: change CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE default,
Paul Moore
- overlayfs+selinux error: OPNOTSUPP,
Matthew Cengia
- [PATCH] libselinux: Fix restorecon when path has no context,
Nir Soffer
- How can i remove net_raw capability from unconfined?,
Gmail
- [RFC PATCH] libselinux: Add selinux_restorecon function, Richard Haines
- [RFC PATCH V2] libselinux: Add selabel_digest function,
Richard Haines
- [PATCH] Add neverallow support for ioctl extended permissions,
Jeff Vander Stoep
- [PATCH v2] selinux: do not check open perm on ftruncate call,
Jeff Vander Stoep
- [PATCH] selinux: do not check open perm on ftruncate call, Jeff Vander Stoep
- http process running as initrc_t,
Divya Vyas
- [PATCH v3 0/7] Initial support for user namespace owned mounts,
Seth Forshee
- ftruncate triggering open denial,
Jeffrey Vander Stoep
- remove unconfined user,
Divya Vyas
- Neverallow in http policy,
Divya Vyas
- [PATCH v2] libsepol/cil: improve recursion detection,
Steve Lawrence
- [PATCH] libselinux: Free memory when processing media and x specfiles,
Richard Haines
- [PATCH] libselinux: Fix mmap memory release for file labeling,
Richard Haines
- [PATCH] libsepol/cil: improve recursion detection,
Steve Lawrence
- Policy disable error,
Divya Vyas
- secilc: segfault on what should be "Recursive block call found"?,
Dominick Grift
- Can I change default policy from targeted to minimum,
Divya Vyas
- [PATCH] libsepol/cil: Fix uninitialized false positive in cil_binary,
Yuli Khodorkovskiy
- [PATCH] libsepol/cil: Provide error if classperms are empty,
Yuli Khodorkovskiy
- [PATCH] libsepol/cil: Add userattribute{set} functionality,
Yuli Khodorkovskiy
- [PATCH] libsepol/cil: fix blockinherit copying segfault and add macro restrictions,
Steve Lawrence
- [PATCH] libsepol/cil: fix NULL pointer dereference when copying classpermission/set,
Steve Lawrence
- secilc: any idea why this commit causes secilc to segfault?,
Dominick Grift
- No http boolean,
Divya Vyas
- [RFC PATCH] libselinux: Add selabel_digest function,
Richard Haines
- Not able to enter root after enabling selinux,
Divya Vyas
- got some problems with the type_transition rules,
kuangjiou
- Enable user_xattr - Selinux failing,
Divya Vyas
- [PATCH] libsemanage: store users_extra in the policy store,
Steve Lawrence
- [PATCH] libsemanage: save homedir_template in the policy store for genhomedircon,
Steve Lawrence
- bug: homedir fcontexts disappear when flipping a boolean, Jason Zaman
- secilc: in segfault,
Dominick Grift
- [PATCH v2 0/3] Add CIL extended avrule & ioctl whitelist support,
Steve Lawrence
- Message not available
[PATCH 0/3] Add CIL extended avrule & ioctl whitelist support,
Steve Lawrence
Re: Linux Firmware Signing,
Luis R. Rodriguez
My notes on the 2015 Linux Security Summit,
Paul Moore
Re: kernel access to device comm is kdevtmpfs,
Stephen Smalley
[PATCH] libsepol: create new keys with copy of 'name' variable,
Petr Lautrbach
[PATCH] policycoreutils: audit2* - ignore setlocale errors,
Petr Lautrbach
Re: [PATCH v2 2/7] userns: Simpilify MNT_NODEV handling., Seth Forshee
question about semanage fcontext and awareness of file_contexts.local file,
Bond Masuda
[GIT PULL] SELinux patches for 4.3, Paul Moore
[PATCH] libselinux: get pywrap depends on selinux.py,
wenzong.fan
selinux mls/mcs rang modify,
rowan
[PATCH] libselinux: Add policy context validation to sefcontext_compile,
Richard Haines
Re: [PATCH v2 0/7] Initial support for user namespace owned mounts, Eric W. Biederman
Incorrect check in pam_rootok,
Christopher J. PeBenito
auditing kdbus service names,
Paul Moore
[PATCH] libselinux: do not treat an empty file_contexts(.local) as an error, Stephen Smalley
[PATCH] libselinux: fail hard on invalid property_contexts entries, Stephen Smalley
[PATCH] libselinux: fail hard on invalid file_contexts entries, Stephen Smalley
[PATCH] libselinux: support context validation on file_contexts.bin, Stephen Smalley
[PATCH v2 0/3] Add support for extracting modules,
Yuli Khodorkovskiy
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]