Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH] libsepol/cil: Validate extended avrules and permissionxs,
Steve Lawrence
- How i see SELinux succeed in GNU/Linux, Dominick Grift
- Re: Steps needed to support SElinux over FUSE mounts, Paul Moore
- [PATCH 00/19] Support fuse mounts in user namespaces,
Seth Forshee
- [PATCH 01/19] block_dev: Support checking inode permissions in lookup_bdev(), Seth Forshee
- [PATCH 07/19] fs: Check for invalid i_uid in may_follow_link(), Seth Forshee
- [PATCH 03/19] fs: Treat foreign mounts as nosuid, Seth Forshee
- [PATCH 02/19] block_dev: Check permissions towards block device inode when mounting, Seth Forshee
- [PATCH 06/19] Smack: Handle labels consistently in untrusted mounts, Seth Forshee
- [PATCH 04/19] selinux: Add support for unprivileged mounts from user namespaces, Seth Forshee
- [PATCH 08/19] cred: Reject inodes with invalid ids in set_create_file_as(), Seth Forshee
- [PATCH 12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns, Seth Forshee
- [PATCH 05/19] userns: Replace in_userns with current_in_userns, Seth Forshee
- [PATCH 15/19] capabilities: Allow privileged user in s_user_ns to set file caps, Seth Forshee
- [PATCH 09/19] fs: Refuse uid/gid changes which don't map into s_user_ns, Seth Forshee
- [PATCH 13/19] fs: Allow superblock owner to access do_remount_sb(), Seth Forshee
- [PATCH 18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant, Seth Forshee
- [PATCH 14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns, Seth Forshee
- [PATCH 10/19] fs: Update posix_acl support to handle user namespace mounts, Seth Forshee
- [PATCH 19/19] fuse: Allow user namespace mounts, Seth Forshee
- [PATCH 16/19] fuse: Add support for pid namespaces, Seth Forshee
- [PATCH 11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes, Seth Forshee
- [PATCH 17/19] fuse: Support fuse filesystems outside of init_user_ns, Seth Forshee
- continuation of systemd/SELinux discussion from Github,
Dominick Grift
- [PATCH] libsepol/cil: Remove duplicated 'if' condition in cil_tree, Steve Lawrence
- [PATCH 1/2] libsepol/cil: Add support for neverallowx,
Steve Lawrence
- [selinux-testsuite PATCH] net_socket: replace md5 with sha1 in ipsec-load,
Jan Stancek
- redhats influence is hurting SELinux in GNU/Linux, Dominick Grift
- [PATCH] policycoreutils: fix 'semanage permissive -l' subcommand,
Petr Lautrbach
- [GIT PULL] SELinux fixes for 4.4 (#1), Paul Moore
- [PATCH] policycoreutils: replace string.join() with str.join(),
Petr Lautrbach
- libsepol bug report, David Binderman
- [PATCH] selinux: fix bug in conditional rules handling,
Stephen Smalley
- [PATCH] libselinux: Correct line count for property and service contexts files,
Richard Haines
- (Userspace) AVC denial generated even if allowed by the policy?,
Laurent Bigonville
- [PATCH] libsepol: Fully expand neverallowxperm rules,
Richard Haines
- ANN: Experimental Fedora Rawhide kernels (selinux-next and audit-next), Paul Moore
- Obtaining Default Context for SELinux Users,
Mike Palmiotto
- BTRFS/SELinux patch just got merged in docker., Daniel J Walsh
- [PATCH v3 0/7] User namespace mount updates,
Seth Forshee
- [PATCH] policycoreutils: Require at least one argument for 'semanage permissive -d',
Petr Lautrbach
- [PATCH] policycoreutils: improve sepolicy command line interface,
Petr Lautrbach
- the user space object manager code seems to fragile,
Dominick Grift
- [PATCH] policycoreutils/sandbox: Fix sandbox to propagate specified MCS/MLS Security Level.,
Miroslav Grepl
- CIL: question with regard to CIL ioctl filtering support and neverallow,
Dominick Grift
- [PATCH v3] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm(),
Vladis Dronov
- [PATCH] sepolgen: Use key function in sort(),
Petr Lautrbach
- [PATCH] secilc: Add support for unordered classes,
ykhodorkovskiy
- get_default_context() hit the SIMPLE_TRANSACTION_LIMIT,
Miroslav Grepl
- [PATCH] libselinux, policycoreutils: Man page warning fixes,
Ville Skyttä
- neverallow rules and self negation,
Nick Kralevich
- Wrong audit message type when policy is reloaded,
Laurent Bigonville
- New SELinux userspace release supporting extended ioctl permissions?,
Paul Moore
- [selinux-testsuite PATCH 0/4] inet_socket and mmap patches,
Jan Stancek
- selinux-testsuite: mmap execmod test failure on RHEL6.7 s390x,
Jan Stancek
- [PATCH v2] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm(),
Vladis Dronov
- [PATCH] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm(), Vladis Dronov
- [PATCH v5 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v4 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v3] selinux: export validatetrans decisions,
Andrew Perepechko
- [sandbox] init script of sandbox returns an improper return code in status function, Keigo Noha
- Macro help,
Dan
- [PATCH] Load libsepol.so.1 instead of libsepol.so,
Laurent Bigonville
- [PATCH v3] libselinux: label_file: fix memory leaks and uninitialized jump,
william . c . roberts
- [PATCH v2] selinux: export validatetrans decisions,
Andrew Perepechko
- [PATCH v2] fix memory leaks and uninitialized jump,
william . c . roberts
- [PATCH] selinux: export validatetrans decisions,
Andrew Perepechko
- [PATCH] selinux-testsuite: unix_socket: fix uninitialized sockaddr len arguments, Stephen Smalley
- [PATCH v3 0/7] Inode security label invalidation,
Andreas Gruenbacher
- [PATCH v3 1/7] selinux: Remove unused variable in selinux_inode_init_security, Andreas Gruenbacher
- [PATCH v3 5/7] security: Add hook to invalidate inode security labels, Andreas Gruenbacher
- [PATCH v3 2/7] selinux: Add accessor functions for inode->i_security, Andreas Gruenbacher
- [PATCH v3 4/7] selinux: Push dentry down from {dentry, path, file}_has_perm, Andreas Gruenbacher
- [PATCH v3 7/7] gfs2: Invalide security labels of inodes when they go invalid, Andreas Gruenbacher
- [PATCH v3 6/7] selinux: Revalidate invalid inode security labels, Andreas Gruenbacher
- [PATCH v3 3/7] selinux: Get rid of file_path_has_perm, Andreas Gruenbacher
- Re: [PATCH v3 0/7] Inode security label invalidation, Stephen Smalley
- Re: [PATCH v3 0/7] Inode security label invalidation, Paul Moore
- [PATCH] fix memory leaks and uninitialized jump,
william . c . roberts
- setoolsv4: tracking origin of a policy element,
Elena Reshetova
- [PATCH] sepolgen: Reset line numbers when parsing files,
Nicolas Iooss
- [PATCH V3] libselinux: Add selinux_restorecon function, Richard Haines
- [PATCH V2] libselinux: Replace selabel_digest hash function,
Richard Haines
- [GIT PULL] SELinux patches for 4.4,
Paul Moore
- [PATCH] libselinux: Replace selabel_digest hash function,
Richard Haines
- Static analysis to assist policy creation?,
Andrew Ruef
- how to troubleshoot SELinux when auditd won't start?,
Bond Masuda
- did libselinux grow a new build dependency? (openssl-devel: openssl.h),
Dominick Grift
- [PATCH] libselinux: Fix selabel_open(3) services if no digest requested, Richard Haines
- does load_policy default to loading the lowest polvers available?,
Dominick Grift
- [PATCH v4 00/11] Smack namespace,
Lukasz Pawelczyk
- [PATCH v4 05/11] smack: extend capability functions and fix 2 checks, Lukasz Pawelczyk
- [PATCH v4 04/11] lsm: inode_pre_setxattr hook, Lukasz Pawelczyk
- [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments, Lukasz Pawelczyk
- [PATCH v4 06/11] smack: don't use implicit star to display smackfs/syslog, Lukasz Pawelczyk
- [PATCH v4 08/11] smack: misc cleanups in preparation for a namespace patch, Lukasz Pawelczyk
- [PATCH v4 01/11] user_ns: 3 new LSM hooks for user namespace operations, Lukasz Pawelczyk
- [PATCH v4 10/11] smack: namespace implementation, Lukasz Pawelczyk
- [PATCH v4 11/11] smack: documentation for the Smack namespace, Lukasz Pawelczyk
- [PATCH v4 07/11] smack: abstraction layer for 2 common Smack operations, Lukasz Pawelczyk
- [PATCH v4 02/11] lsm: /proc/$PID/attr/label_map file and getprocattr_seq hook, Lukasz Pawelczyk
- [PATCH v4 09/11] smack: namespace groundwork, Lukasz Pawelczyk
- Re: [PATCH v4 00/11] Smack namespace, Lukasz Pawelczyk
- [PATCH v2 0/7] User namespace mount updates,
Seth Forshee
- [PATCH] libselinux: Fix parallel build with swig python,
Jason Zaman
- [RFC PATCH v3 0/5] kdbus LSM/SELinux hooks,
Paul Moore
- [RFC PATCH v2 0/5] kdbus LSM/SELinux hooks,
Paul Moore
- [PATCH] security: selinux: Use a kmem_cache for allocation struct file_security_struct,
Sangwoo
- [PATCH v2 1/2] security: Add hook to invalidate inode security labels,
Andreas Gruenbacher
- Computer Science and SE Linux,
Russell Coker
- MAP_STACK and execstack,
Nick Kralevich
- av_decision on audit callback,
Roberts, William C
- [PATCH 1/3] Fix newrole to not drop capabilities from the bounding set.,
Stephen Smalley
- [PATCH 0/5] User namespace mount updates,
Seth Forshee
- [RFC PATCH V3] libselinux: Add selabel_digest function,
Richard Haines
- [PATCH 0/5] Security: Provide unioned file support,
David Howells
- [PATCH 1/2] selinux: ioctl_has_perm should be static,
Geliang Tang
- [PATCH 0/5] selinux: minor cleanup suggestions,
Rasmus Villemoes
- [RFC PATCH V2] libselinux: Add selinux_restorecon function,
Richard Haines
- newrole not working when built with LSPP_PRIV=y,
Laurent Bigonville
- selinux network control question,
Dominick Grift
- Cil Macros,
Dan
- Find attributes for a type with sepol,
Roberts, William C
- [RFC PATCH v1 0/3] Another take on the kdbus LSM hooks,
Paul Moore
- [PATCH v4 0/7] Initial support for user namespace owned mounts,
Seth Forshee
- [PATCH v2] libselinux: flush the class/perm string mapping cache on policy reload,
Stephen Smalley
- [PATCH] libselinux: flush the class/perm string mapping cache on policy reload, Stephen Smalley
- [RFC PATCH] selinux: change CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE default,
Paul Moore
- overlayfs+selinux error: OPNOTSUPP,
Matthew Cengia
- [PATCH] libselinux: Fix restorecon when path has no context,
Nir Soffer
- How can i remove net_raw capability from unconfined?,
Gmail
- [RFC PATCH] libselinux: Add selinux_restorecon function, Richard Haines
- [RFC PATCH V2] libselinux: Add selabel_digest function,
Richard Haines
- [PATCH] Add neverallow support for ioctl extended permissions,
Jeff Vander Stoep
- [PATCH v2] selinux: do not check open perm on ftruncate call,
Jeff Vander Stoep
- [PATCH] selinux: do not check open perm on ftruncate call, Jeff Vander Stoep
- http process running as initrc_t,
Divya Vyas
- [PATCH v3 0/7] Initial support for user namespace owned mounts,
Seth Forshee
- ftruncate triggering open denial,
Jeffrey Vander Stoep
- remove unconfined user,
Divya Vyas
- Neverallow in http policy,
Divya Vyas
- [PATCH v2] libsepol/cil: improve recursion detection,
Steve Lawrence
- [PATCH] libselinux: Free memory when processing media and x specfiles,
Richard Haines
- [PATCH] libselinux: Fix mmap memory release for file labeling,
Richard Haines
- [PATCH] libsepol/cil: improve recursion detection,
Steve Lawrence
- Policy disable error,
Divya Vyas
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]