Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: load_policy fails to load policy with ENOENT, (continued)
- [PATCH 1/2] libselinux,libsemanage: fall back to gcc in exception.sh,
Nicolas Iooss
- [PATCH 1/1] secilc: do not build secilc man page if it is up to date,
Nicolas Iooss
- [PATCH 1/4] libselinux,libsemanage: use Ruby to define RUBYINC,
Nicolas Iooss
- [PATCH] libselinux: fix subdir build and usage of cmdline CFLAGS,
Stephen Smalley
- [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug,
Stephen Smalley
- [PATCH] libsepol: fix checkpolicy dontaudit compiler bug,
Stephen Smalley
- [PATCH] Security: selinux - Improvement in code readability when,
Shailendra Verma
- how to assign process to user, Naina Emmanuel
- [PATCH 1/2] policycoreutils: Force GTK3.0 for sepolicy gui,
Laurent Bigonville
- [PATCH 1/1] libsemanage: semanage_seuser_key_create: copy name,
Nicolas Iooss
- MLS is disabled, but MLS context "s0" found,
Nicolas Iooss
- [PATCH] libsepol: cil: remove double-free.,
Daniel Cashman
- checkpolicy dontaudit compiler bug?,
Nick Kralevich
- [PATCH 0/4] selinux: Fix invalidate deadlock with GFS2,
Andreas Gruenbacher
- [SECILC] does not seem to filter redundant attributes and rules,
Dominick Grift
- [PATCH v4 0/9] SELinux support for Infiniband RDMA,
Dan Jurgens
- GPF in sidtab_context_to_sid,
Roberts, William C
- [PATCH] libsepol: sepol_{bool|iface|user}_key_create: copy name, Stephen Smalley
- Re: [PATCH 1/1 V2] mqueue: Implment generic xattr support,
Paul Moore
- [PATCH 1/2] Sandbox: Use next() over the sepolicy.info() result,
Laurent Bigonville
- setsebool or audit2allow rule,
Vaughn Clinton
- [PATCH 1/1] libselinux, libsemanage: remove *swig_python_exception.i if its creation failed,
Nicolas Iooss
- [PATCH 1/1] libsemanage: remove ruby_semanage.so with "make clean", Nicolas Iooss
- [PATCH 1/1] libselinux: remove rpm_execcon from SWIG wrappers, Nicolas Iooss
- Security context of shared libraries,
mm
- [PATCH] mqueue: security xattr setting on inode creation,
David Graziano
- [PATCH] policycoreutils: Run 2to3 over the sepolicy python code,
Laurent Bigonville
- selinux user to linux mapping, Naina Emmanuel
- [PATCH] libsepol/cil: Exit with an error for an unknown map permission,
James Carter
- [PATCH] Revert "libselinux: support new python3 functions",
Laurent Bigonville
- [PATCH] policycoreutils: Use "new" sepolicy icon in .desktop file for sepolicy gui,
Laurent Bigonville
- [PATCH] libsemanage: fix kernel pathname in semanage_verify_kernel(), Stephen Smalley
- [PATCH] libselinux/utils: fix all the noreturn errors,
william . c . roberts
- Backtrace in sandbox command, Laurent Bigonville
- [PATCH] libselinux: avc_internal.c: allow building with clang,
Stephen Smalley
- [PATCH] libselinux: fix compiler flags for linux + clang,
william . c . roberts
- Use-after-free in semanage boolean with Python 3,
Nicolas Iooss
- Is it possible to prevent a binary executable file from being read via SELinux?,
Patrick Doyle
- Discussion on setting the /proc/self/oom_score_adj file label.,
Daniel J Walsh
- [PATCH] libsepol: Add symver with explicit version to build with ld.gold,
Jason Zaman
- secilc crashes on unknown permissions, Nicolas Iooss
- [PATCH 1/1] policycoreutils: semodule_package: do not fail with an empty fc file,
Nicolas Iooss
- State of rpm_execcon SWIG wrapper,
Nicolas Iooss
- [PATCH 1/1] policycoreutils: restorecond: use pkg-config to find dbus-glib-1 files,
Nicolas Iooss
- [PATCH 1/2] selinux-testsuite: mmap: fix shmat SHM_EXEC test for old kernels,
Stephen Smalley
- [PATCH] selinux-testsuite: mmap: add shmat SHM_EXEC test, Stephen Smalley
- selinux: should execmem disable shmat(..., SHM_EXEC)?,
Topi Miettinen
- [PATCH] libselinux: fix pointer handling in realpath_not_final,
Vit Mojzis
- [PATCH] libselinux: Allow overriding libsepol.a location during build,
Laurent Bigonville
- [PATCH v2] libselinux: Add clean-pywrap and clean-rubywrap targets,
Laurent Bigonville
- [PATCH] libselinux: Add clean-pywrap and clean-rubywrap targets, Laurent Bigonville
- Mapping of subject context to CIPSO,
Casey Schaufler
- MLS issue,
Kashif ali
- Android Fork Dies on AOSP,
William Roberts
- POSIX mqueues,
David Graziano
- Question for the experts -- DIRTY COW and SELinux,
Robert Lee
- [RFC] Split up policycoreutils,
Stephen Smalley
[PATCH] policycoreutils/gui: fix system-config-selinux editing features,
Vit Mojzis
[PATCH] libsepol: cil: cil_strpool: Allow multiple strpool users.,
Daniel Cashman
[PATCH 0/7] libsepol/cil: Fix bugs found by Nicolas Looss with AFL,
James Carter
[PATCH 1/8] libsepol/cil: disable symver on Mac builds,
william . c . roberts
[PATCH] libsemanage: genhomedircon: only set MLS level if MLS is enabled,
Stephen Smalley
speeding up nodups_specs, need large fc file.,
Roberts, William C
read_spec_entry question, Roberts, William C
CIL policies which make secilc crash, Nicolas Iooss
should module_load be checked on a kernel module object?,
Dominick Grift
ANN: SELinux userspace 2.6-rc2 release, Stephen Smalley
[PATCH] libsemanage: genhomedircon: do not suppress logging from libsepol, Stephen Smalley
Fuzzing /usr/libexec/selinux/hll/pp with AFL,
Milos Malik
[PATCH v2 0/1] supporting RBACSEP in genhomedircon,
Gary Tierney
[PATCH] libsepol, libsemanage: fix linker scripts / map files, Stephen Smalley
[PATCH v2] libselinux: selinux_restorecon: fix realpath logic, Stephen Smalley
[PATCH] libselinux: selinux_restorecon: fix realpath logic, Stephen Smalley
Gold linker build failures,
Jason Zaman
restorecon -r goes up the tree?,
Jason Zaman
[PATCH V2] libsepol: Add support for converting extended permissions to CIL,
James Carter
[PATCH 0/3] Fuzzing secilc with AFL,
Nicolas Iooss
[PATCH] libsepol: Add support for converting extended permissions to CIL,
James Carter
[PATCH] libsemanage: Fixes bug preventing the installation of base modules,
James Carter
Received a base module, expected a non-base module.,
Jason Zaman
[PATCH v2 0/1] libsepol/cil: create role/user caches for context validation,
Gary Tierney
[PATCH 0/1] libsepol/cil: create role/user caches for context validation,
Gary Tierney
[PATCH 1/2] libselinux: versioned ruby pkg-config and query vendorarchdir properly,
Jason Zaman
ANN: SELinux userspace 2.6-rc1 release, Stephen Smalley
[PATCH] policycoreutils: setfiles: make -I imply -D, Stephen Smalley
[PATCH] policycoreutils: setfiles: reverse the sense of -D,
Stephen Smalley
[PATCH] secilc: correct include path of cil.h for Android,
Bowgo Tsai
[PATCH] Remove Android.mk files and only keep them in Android tree,
Bowgo Tsai
[PATCH] libsepol/cil: Check for too many permissions in classes and commons,
James Carter
[PATCH] libselinux: re-introduce DISABLE_BOOL=y,
william . c . roberts
[PATCH] libsepol: fix xperm mapping between avrule and avtab,
Jeff Vander Stoep
[PATCH 1/3] libselinux: renamed andriod label backend source file,
Janis Danisevskis
[PATCH v2 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class,
Nicolas Iooss
[PATCH 1/1] Makefile: make distclean target work,
Nicolas Iooss
[PATCH 1/1] libsepol/cil: do not heap-overflow when too many permissions are in a class,
Nicolas Iooss
[PATCH 1/1] policycoreutils: setfiles: ignore restorecon_xattr in git,
Nicolas Iooss
[RFC] Build ANDROID_HOST=y on mac,
William Roberts
Question on restricting file access,
Raj Srinivasan
[PATCH v3] libselinux: add ANDROID_HOST=y build option,
william . c . roberts
[PATCH] libselinux: android: fix lax service context lookup,
Janis Danisevskis
[PATCH 1/2] libselinux: rename EMFLAGS to DISABLE_FLAGS,
william . c . roberts
[PATCH] libselinux: fix unused variable error,
william . c . roberts
[PATCH 1/3] libselinux: drop build config EMBEDDED=y,
william . c . roberts
DISABLE_AVC=y,
William Roberts
[PATCH] libsemanage: Do not always print a module name warning,
Miroslav Grepl
[Patch v3] sandbox: Use dbus-run-session instead of dbus-launch when available,
Laurent Bigonville
[Patch v2] sandbox: Use dbus-run-session instead of dbus-launch when available, Laurent Bigonville
[PATCH v2] libselinux: add ANDROID_HOST=y build option,
william . c . roberts
[PATCH] libselinux: add ANDROID_HOST=y build option,
william . c . roberts
[PATCH] sefcontext_compile: do not fail silently, Stephen Smalley
Android Fork,
william . c . roberts
[PATCH 2/2] policycoreutils: setfiles - Utility to find security.restorecon_last entries, Richard Haines
[PATCH 1/2] libselinux: Add function to find security.restorecon_last entries, Richard Haines
[PATCH 0/2] selinux: Add features to find security.restorecon_last entries,
Richard Haines
[PATCH 1/3] libselinux: Add architecture string to file_context.bin,
Janis Danisevskis
Re: bug#24541: runcon tty hijacking via TIOCSTI ioctl,
Paul Eggert
[PATCH v2] libsemanage: Use pp module name instead of filename,
Petr Lautrbach
[PATCH] policycoreutils: setfiles - Add option to stop setting the digest,
Richard Haines
[PATCH 1/1] libsepol/tests: fix mispelling of optimization option,
Nicolas Iooss
[PATCH 1/3] libselinux: silent -Wsign-compare warnings,
Nicolas Iooss
[PATCH] libselinux: drop unused stdio_ext.h header file,
william . c . roberts
Libsepol Mac Build Errors,
william . c . roberts
[PATCH] libselinux: kill logging check for selinux_enabled(), william . c . roberts
[PATCH] libselinux: drop usage of _D_ALLOC_NAMLEN,
william . c . roberts
[PATCH 1/2] sandbox: do not try setup directories without -X or -M,
Petr Lautrbach
[PATCH 0/1] supporting RBACSEP in genhomedircon,
Gary Tierney
[Secunia Research] policycoreutils Vulnerability - Request for Details,
Secunia Research
SELinux sandbox escape via TIOCSTI ioctl,
up201407890
[PATCH] libsemanage: use pp module headers as a source for a module name,
Petr Lautrbach
[PATCH v2 7/7] sepolicy: update setup.py to remove C module, Jason Zaman
Killing The Android libselinux Fork (available),
William Roberts
[PATCH 2/2] Add libsepol and secil host and device targets, Bowgo Tsai
[PATCH 1/2] libsepol, checkpolicy: Update Android.mk,
Bowgo Tsai
setools4 support,
Jason Zaman
[PATCH] Fix redefinition of XATTR_NAME_SELINUX,
william . c . roberts
[PATCH v2 0/1] genhomedircon: remove hardcoded refpolicy strings,
Gary Tierney
unlocked stdio,
Roberts, William C
selinux 2.6-rc1 release planned 9/30,
Stephen Smalley
[GIT PULL] SELinux patches for 4.9 (#2), Paul Moore
[RFC] mmap file_contexts and property_contexts:,
william . c . roberts
[PATCH v2] sandbox: Use GObject introspection binding instead of pygtk2,
Laurent Bigonville
[PATCH] sandbox: Use dbus-launch instead of dbus-run-session,
Laurent Bigonville
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]