Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [PATCH] libselinux: Enhance file context support, (continued)
- [PATCH] policy_define.c: fix compiler warnings,
Nick Kralevich
- R: R: SELinux: Interface Labeling Problem, Gmail
- [PATCH] Remove uses of -Wno-return-type.,
Dan Albert
- Kernel error: SELinux: Invalid class 0,
Tim Shearer
- [PATCH 2/2 v6] selinux: extended permissions for ioctls,
Jeff Vander Stoep
- [PATCH] checkpolicy: switch operations to extended perms,
Jeff Vander Stoep
- New module store + /var being split off,
Miroslav Grepl
- [PATCH] Fix -Wreturn-type issues.,
Dan Albert
- [PATCH v2] selinux: reduce locking overhead in inode_free_security(),
Waiman Long
- Why does semanage_migrate_store migrate file_contexts.local?, Sven Vermeulen
- [PATCH 00/10] Improve libsepol and CIL neverallow and bounds checking,
James Carter
- [PATCH 10/10] secilc: Add a CIL policy file to test bounds checking., James Carter
- [PATCH 01/10] libsepol: Add new ebitmap function named ebitmap_match_any(), James Carter
- [PATCH 07/10] libsepol/cil: Track number of classes and number of types and attributes., James Carter
- [PATCH 05/10] libsepol/cil: Add function to search the CIL AST for an AV rule., James Carter
- [PATCH 02/10] libsepol: Treat types like an attribute in the attr_type_map., James Carter
- [PATCH 04/10] libsepol: Refactored bounds (hierarchy) checking code, James Carter
- [PATCH 03/10] libsepol: Refactored neverallow checking., James Carter
- [PATCH 06/10] libsepol/cil: Refactored CIL neverallow checking and reporting., James Carter
- [PATCH 09/10] secilc: Add a CIL policy file to test neverallow checking., James Carter
- [PATCH 08/10] libsepol/cil: Add CIL bounds checking and reporting., James Carter
- Re: SELinux: Interface Labeling Problem,
Maurizio Pagani
- [PATCH] selinux: reduce locking overhead in inode_free_security(),
Waiman Long
- [PATCH] selinux-testsuite: update socket tests,
Stephen Smalley
- [PATCH] Initialize kernfs nodes with LSMs,
william . c . roberts
- [RFC][PATCH] net/unix: support SCM_SECURITY for stream sockets,
Stephen Smalley
- [PATCH] selinux: do not remap unknown SIDs to the unlabeled context,
Stephen Smalley
- [PATCH] Only invoke RPM on RPM-enabled Linux distributions,
Sven Vermeulen
- refpolicywarn usage,
Ted Toth
- SELinux tree updates,
Paul Moore
- [PATCH] sepolicy-generate: Handle more reserved port types,
Masatake YAMATO
- Seeing new denial on AOSP 5.1.1 w.r.t shell request read access on lnk_file .,
Ravi Kumar
- [PATCH v3 0/6] SELinux testsuite compilation fixes,
Paul Moore
- [GIT PULL] SELinux patches for 4.2,
Paul Moore
- [PATCH] selinux: fix setting of security labels on NFS,
J. Bruce Fields
- [PATCH] selinux-testsuite: adopt a more consistent style, Paul Moore
- [PATCH v2 0/6] SELinux testsuite compilation fixes,
Paul Moore
- [PATCH 0/3] SELinux testsuite compilation fixes,
Paul Moore
- [PATCH 2/2 v5] selinux: extended permissions for ioctls,
Jeff Vander Stoep
- [PATCH 0/2 v2] selinux: extended permissions for ioctl commands, Jeff Vander Stoep
- [RFC PATCH] libselinux: Add read_spec_entries function to replace sscanf,
Richard Haines
- getpidcon() behaviour when other LSM is enabled,
Laurent Bigonville
- postgresql policy,
Ted Toth
- [PATCH V2] libselinux: Support consistent mode size for bin files,
Richard Haines
- [PATCH] libselinux: Expunge remaining references to flask.h and av_permissions.h., Stephen Smalley
- [RFC][PATCH] selinux: Remove unused permission definitions,
Stephen Smalley
- [PATCH] libselinux: Support consistent mode size for bin files,
Richard Haines
- [PATCH V4] Fix more bin file processing core dumps,
Richard Haines
- [PATCH] libsepol/cil: Do not allow categories/sensitivities inside blocks,
Yuli Khodorkovskiy
- [RFC] [PATCH] kernfs: hook inode initialization for LSMs,
william . c . roberts
- [PATCH 1/2] libsepol: with pp to CIL, only associate declared roleattributes with in-scope types,
Steve Lawrence
- string_to_av_perm behavior,
Ted Toth
- [PATCH v2] selinux: enable genfscon labeling for sysfs and pstore files,
Stephen Smalley
- [PATCH] libselinux: add selinux_openssh_contexts_path(),
Petr Lautrbach
- CIL: migrate_store issues with MLS policy,
Miroslav Grepl
- [PATCH] libselinux: setrans_client: minimize overhead when mcstransd is not present., Stephen Smalley
- [PATCH] selinux: enable genfscon-based labeling for sysfs files, Stephen Smalley
- [PATCH] selinux: update netlink socket classes,
Stephen Smalley
- FYI: Is SELinux good anti-venom?, Daniel J Walsh
- [PATCH] selinux: enable per-file labeling for debugfs files.,
Stephen Smalley
- exec'ing new process with different type and MLS level,
Ted Toth
- [PATCH V3] Fix more bin file processing core dumps,
Richard Haines
- [PATCH] libselinux: Ensure selabel_lookup_best_match links NULL terminated,
Richard Haines
- [PATCH V2] Fix more bin file processing core dumps,
Richard Haines
- [PATCH] mcstransd: don't reinvent getpeercon, badly., Stephen Smalley
- [PATCH] Fix more bin file processing core dumps,
Richard Haines
- How to start SELinux on embedded device,
rajkumar
- [PATCH] mcstransd: fix reload issue,
wenzong.fan
- SELinux talk,
Andrew Holway
- [PATCH] libselinux: is_selinux_enabled: Add /etc/selinux/config test., Stephen Smalley
- [PATCH] libselinux: matchpathcon/selabel_file: Fix man pages., Stephen Smalley
- [PATCH v4] Replace fmemopen() with internal function in libsepol.,
James Carter
- RFC: https://bugzilla.redhat.com/show_bug.cgi?id=1219718, Dominick Grift
- [PATCH v3] Replace fmemopen() with internal function in libsepol., James Carter
- [PATCH v2] Replace fmemopen() with internal function in libsepol., James Carter
- [PATCH] Replace fmemopen() with internal function in libsepol., James Carter
- [PATCH] libselinux: Fix core dumps with corrupt *.bin files,
Richard Haines
- [PATCH] libselinux: Add selabel partial and best match APIs,
Richard Haines
- [PATCH v2] libsepol/cil: Verify users prior to evaluating users,
Yuli Khodorkovskiy
- [PATCH] libsepol/cil: Verify users prior to evaluating users,
Yuli Khodorkovskiy
- Give out all the avc logs in ome time,
Zhi Xin
- Re: [PATCH 1/1] signals: don't abuse __flush_signals() in selinux_bprm_committed_creds(), Paul Moore
- [PATCH 2/2 v4] SELinux: per-command whitelisting of ioctls,
Jeff Vander Stoep
- SELinux policy for Xen with CloudStack,
Andrew Holway
- [PATCH] dispol: display operations as ranges,
Jeff Vander Stoep
- [PATCH] Don't assume SELinux code is already installed on host,
Nick Kralevich
- Re: bug#20437: ls links too many dynamic libraries,
Pádraig Brady
- [RFC PATCH] selinux: Merge Android libselinux changes with upstream,
Richard Haines
- [PATCH] libsepol: Binary modules do not support ioctl rules., Stephen Smalley
- Switching to enforcing mode introduces new policy issues?,
Spector, Aaron
- [PATCH] dispol: Extend to display operations., Stephen Smalley
- Yet another strange behavior.,
Minear, Spencer
- [PATCH] Add support for ioctl command whitelisting,
Jeff Vander Stoep
- [PATCH] libsemanage: do not copy contexts in semanage_migrate_store,
Jason Zaman
- [PATCH 2/2 v3] SELinux: per-command whitelisting of ioctls,
Jeff Vander Stoep
- [PATCH] libselinux: selinux.py - use os.walk() instead of os.path.walk(),
Petr Lautrbach
- HTCondor process visibility,
Steve Huston
- [PATCH] libselinux: is_selinux_enabled(): drop no-policy-loaded test.,
Stephen Smalley
- [PATCH] policycoreutils: setfiles/restorecon: fix -r/-R option,
Petr Lautrbach
- [PATCH] org.selinux.policy: Require auth_admin_keep for all actions.,
Stephen Smalley
- [PATCH] libselinux: Remove deprecated mudflap option., Stephen Smalley
- Impersonating a process for file creation purposes,
Florian Weimer
- [PATCH] Add empty top level Android.mk / CleanSpec.mk files,
Nick Kralevich
- [PATCH v2] libselinux: Mount procfs before checking /proc/filesystems,
Ben Shelton
- [PATCH] libselinux: Mount procfs before checking /proc/filesystems,
Ben Shelton
- [PATCH] libsepol: Don't use symbol versioning for static object files,
Yuli Khodorkovskiy
- selinux and thread local storage,
mm19827
- got some problems with the selinux policy,
kuangjiou
- [PATCH v2 2/2] SELinux: per-command whitelisting of ioctls,
Jeff Vander Stoep
- [PATCH 2/2] SELinux: per-command whitelisting of ioctls,
Jeff Vander Stoep
- [PATCH 1/2] security: lsm_audit: add ioctl specific auditing,
Jeff Vander Stoep
- [PATCH 0/2] selinux: add targeted whitelisting of ioctl commands.,
Jeff Vander Stoep
- CONFIG_SECURITY_SELINUX_DEVELOP flag is still enabled in most of the AOSP based releases , Can we remove this in production builds . .,
Ravi Kumar
- [PATCH v3] libsepol, secilc: Fix build for Android,
Stephen Smalley
- [PATCH] selinux: Print 'sclass' as string when unrecognized netlink message occurs,
Marek Milkovic
- [PATCH v2] libsepol: Fix build for Android., Stephen Smalley
- [PATCH] libsepol: Fix build for Android.,
Stephen Smalley
- [GIT PULL] SELinux patches for 4.1,
Paul Moore
- [PATCH 0/3 v5] libsepol, policycoreutils, and checkpolicy: Add support for generating CIL to libsepol and checkpolicy,
James Carter
- [PATCH 0/3 v4] libsepol, policycoreutils, and checkpolicy: Add support for generating CIL to libsepol and checkpolicy,
James Carter
- [PATCH 0/3 v3] libsepol, policycoreutils, and checkpolicy: Add support for generating CIL to libsepol and checkpolicy,
James Carter
- [PATCH v2 1/1] libsepol: Move secilc out of libsepol,
Yuli Khodorkovskiy
- Interpreter name reported in AVC comm field,
Minear, Spencer
- [PATCH 1/3 v2] libsepol, policycoreutils: Move functions to convert a module package to CIL, James Carter
- [PATCH 3/3 v2] checkpolicy: Add support for generating CIL, James Carter
- [PATCH 2/3 v2] libsepol: add function to generate CIL from a module policydb, James Carter
- [PATCH 0/3 v2] libsepol, policycoreutils, and checkpolicy: Add support for generating CIL to libsepol and checkpolicy, James Carter
- [PATCH 1/3] libsepol, policycoreutils: Move functions to convert a module package to CIL, James Carter
- [PATCH 3/3] checkpolicy: Add support for generating CIL, James Carter
- [PATCH 2/3] libsepol: add function to generate CIL from a module policydb, James Carter
- [PATCH 0/3] libsepol, policycoreutils, and checkpolicy: Add support for generating CIL to libsepol and checkpolicy, James Carter
- [PATCH] libsepol: Move secilc out of libsepol,
Yuli Khodorkovskiy
- [GIT PULL] SELinux fixes for 3.20 #2, Paul Moore
- Is there a macro for this?,
Tracy Reed
- [PATCH 1/3] selinux: convert avtab hash table to flex_array,
Stephen Smalley
- [PATCH] selinuxfs: Fix sel_write_enforce broken return value,
Joe Perches
- Added project policy code and got "semodule_package: ...",
John Chludzinski
- [PATCH] libsepol: Fix building Xen policy with devicetreecon,
Richard Haines
- Reset SELinux booleans,
Aleksey Chudov
- Trying to update sysadm module in CLIP,
John Chludzinski
[PATCH] libsepol: bool_copy_callback set state on creation,
Thomas Hurd
[PATCH] libsemanage: Fix logic in bunzip for uncompressed pp files,
Thomas Hurd
New Article on Future Docker Security., Daniel J Walsh
Got some problem when using the type_transition, look for some helps! thank you!,
kuangjiou
[PATCH v3 0/3] Xen/FLASK policy updates for device contexts,
Daniel De Graaf
SE Linux savvy union FS?,
Minear, Spencer
[PATCH] libsemanage: fix fname[] initialization in test_utilities.c,
Petr Lautrbach
Strange behavior: type boundaries,
Dominick Grift
Saltstack and ipa-install on Centos7 failing,
Andrew Holway
selinux category relabel (puppet),
Higgs, Stephen
[PATCH] Fix -Wformat errors,
Petr Lautrbach
[PATCH v2 0/3] Xen/FLASK policy updates for device contexts,
Daniel De Graaf
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]