Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: Initial SIDs., (continued)
- [GIT PULL] SELinux fix for 3.16-rcX,
Paul Moore
- NetLabel lead to kernel panic with some SELinux levels,
Christian Evans
- [PATCH v2] selinux: fix the default socket labeling in sock_graft(),
Paul Moore
- Fwd: [lca-announce] LCA CFP extended until Sunday 20th July 2014,
Russell Coker
- Audit support on ARM,
Dave Quigley
- Showing port Labels,
Dave Quigley
- Where does semanage store changes?,
dE
- Re: directory fcontext, dE
- [PATCH] selinux: fix the default socket labeling in sock_graft(),
Paul Moore
- Suppress avc denial logs,
Avijit Das
- libselinux 2.3 incompatibility, Stephen Smalley
- pcre compiled context files invalid with pcre updates?,
Sven Vermeulen
- SELinux with overlayfs between squashfs and jffs2,
Antoine MOISE
- ANN: SETools 4 open-sourced, Christopher J. PeBenito
- genhomedircon support for groups, Cretu Adrian
- What's a 'permission map'?,
dE
- [PATCH] LSM: Generalize existing module stacking, Casey Schaufler
- secilc: is anyone able to confirm that type_change ...,
Dominick Grift
- Enforcing default_user, default_role, default_type, default_range,
dE
- Listing restrictions on roles.,
dE
- Re: Weird un-audited denial on tmp_t, dE
- semanage commit forces CPU to 100%,
Andy Ruch
- libselinux-2.0.94-2.el6.i686 issue, Sebastian Brestin
- Where's the class defined in file_contexts*,
dE
- [RFC PATCH] selinux: reduce the number of calls to synchronize_net() when flushing caches,
Paul Moore
- ANN: SELinux Userspace moved to GitHub, Steve Lawrence
- Fwd: Booting time is increased after applying kernel 3.10,
Stephen Smalley
- [PATCH] Add db_exception and db_datatype support to label_db backend,
Artyom Smirnov
- strange AVC message, Russell Coker
- Different authentication with different user roles,
Krzysztof Katowicz-Kowalewski
- [PATCH] SELinux: use ARRAY_SIZE,
Himangi Saraogi
- [PATCH] selinux: introduce str_read() helper,
Namhyung Kim
- [PATCH 1/2] selinux: simple cleanup for cond_read_node(),
Namhyung Kim
- [PATCH 0/2] Bug fixes for libsemanage/src/pywrap-test.py,
Nicolas Iooss
- [PATCH] selinux: Permit transitions under NO_NEW_PRIVS or NOSUID under certain, circumstances.,
Stephen Smalley
- ANN: SETools moved to GitHub, Christopher J. PeBenito
- ANN: Reference Policy moved to GitHub,
Christopher J. PeBenito
- Default context with context mount option.,
dE
- RBAC along with MLS?,
dE
- How does matchpathcon/setfiles work?,
dE
- SETools patch for libselinux-2.3,
Sven Vermeulen
- attempting to run a sftpserver in a confined domain,
Kim Lawson-Jenkins
- change selinux user's roles,
toản cù
- AVCs errors generated when CLI comands executed,
Kim Lawson-Jenkins
- The use of fscontext(iso9660_t),
dE
- secilc: issues with policy compiled by secilc, Dominick Grift
- SAMBA WITH SELINUX,
toản cù
- [PATCH] libselinux: fix typo in man page, Nicolas Iooss
- user_t more restrictive than sshd_t (e.g.)?,
dE
secilc CIL Reference Guide patches,
Richard Haines
[GIT PULL] SELinux patches for 3.16,
Paul Moore
secilc: in statement ordering limitations,
Dominick Grift
Re: [PATCH] selinux:cleanup redundant code in selinux_init(), Paul Moore
Significance of SELinux user and roles on objects.,
dE
system_u process does not have system_r, dE
How does SELinux work without roles?,
dE
semanage: TypeError: cannot concatenate 'str' and 'NoneType' objects,
Laurent Bigonville
create new roles for user,
toản cù
secilc: classmappings do not work,
Dominick Grift
Single init script for multiple daemons,
Mladen Sekara
[RFC PATCH] selinux: prevent setting a security label on MNT_NOSUID applications,
Paul Moore
Presidency of user/role/type permissions.,
dE
Patches from Fedora on the sandbox package.,
Dan Walsh
Refactor installation of policies and modules,
Victor Porton
svirt & labeled network,
vlad halilov
selinux and static label for sVirt,
vlad halilov
[PATCH 1/1] add module for the entropy key daemon,
Petre Rodan
sshd and default security context.,
dE
PAM modules ordering,
Laurent Bigonville
No AVCs written to /var/log/messages,
Kim Lawson-Jenkins
staff_u permission,
Steve Huston
Re: [PATCH (for 3.15) 0/5] Fix cross rename race window for LSM.,
Tetsuo Handa
What's a module exactly?,
dE
How does policy loading work at bootup?,
dE
What's a policy configuration file?,
dE
AVC cache size unit?,
dE
[RFC][PATCH] selinux: Report result in avc messages,
Stephen Smalley
selinux_check_access() and unknown classes/perms,
Eric Paris
SELINUX=disabled vs. "enforce=1", Will Woods
[PATCH] selinux_init_load_policy: setenforce(0) if security_disable() fails,
Will Woods
[RFC] Source Policy, CIL, and High Level Languages,
Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Dominick Grift
- <Possible follow-ups>
- [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Dominick Grift
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Dominick Grift
- Re: [RFC] Source Policy, CIL, and High Level Languages, Dominick Grift
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Daniel J Walsh
- Re: [RFC] Source Policy, CIL, and High Level Languages, Daniel J Walsh
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Christopher J. PeBenito
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, James Carter
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Dominick Grift
- Re: [RFC] Source Policy, CIL, and High Level Languages, Steve Lawrence
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
- Re: [RFC] Source Policy, CIL, and High Level Languages, Stephen Smalley
No chance of using SELinux on rootfs without security namespace?,
dE
fpp/cilpolicy potential bug, Dominick Grift
[secilc] typeattributeset with "and" expression does not work,
Dominick Grift
Cannot enable selinux.,
dE
In case you do not follow me on Twitter @rhatdan,
Daniel J Walsh
Why is SELINUXTYPE policy specific?,
dE
Allowing access other then permissive mode.,
Kernel freak
LIbselinux: Correctness of context decision, how its made?,
Rastislav Hepner
Unreadable or missing xattr security.selinux on jffs2,
jkmeinde
[PATCH 0/6] audit: implement multicast socket for journald,
Richard Guy Briggs
Transition domain in SELinux,
toản cù
selinux_init_load_policy() and systemd switch-root,
Will Woods
Regarding call security_compute_av(),
Kernel Geek
Message not available
<Possible follow-ups>
Re: Regarding call security_compute_av(), Stephen Smalley
[PATCH] selinux, kbuild: remove unnecessary $(hostprogs-y) from clean-files,
Masahiro Yamada
[PATCH] libsepol: Skip duplicate filename_trans rules in state->out policy.,
Richard Haines
2.3-rc1, Stephen Smalley
[PATCH] setools: Update to load v29 policy source files.,
Richard Haines
/data used as two filesystem mountpoint,then seandroid how to lable file secontext?,
ge
Security server responses always based on class?,
dE
[PATCH 4/4] setools: APOL Add default_objects and CIL policy namespaces tabs, Richard Haines
[PATCH 3/4] setools: APOL Add type, user, role bounds support, Richard Haines
[PATCH 1/4] setools: APOL Add constraints and filename transition support, Richard Haines
[PATCH 2/4] setools: APOL Add support for permissive types, polcaps, handle_unknown, Richard Haines
[PATCH 0/4] APOL Enhancements to support additional policy features,
Richard Haines
The purpose of SID.,
dE
files in /root labeled admin_home_t, Kim Lawson-Jenkins
What do you mean by a 'domain'.,
dE
SELinux Coloring Book will be at the Red Hat Summit.,
Daniel J Walsh
Labelling problems with a user directly running an application in a confined domain,
Kim Lawson-Jenkins
Re: Plz ask for help :),
Daniel J Walsh
tycho.nsa.gov mailing list memberships reminder,
mailman-owner
SSSD on a read-only filesystem,
Andy Ruch
[PATCH] libsemanage: fix memory leak in semanage_genhomedircon, Thomas Hurd
[SELinux] We found that there was bug on at /kernel/security/selinux/avc.c:158!,
Tim_lee
SELinux policy updates in a post-%post world,
Colin Walters
What should the context of ICMP packets be on a ranged network interface be?,
Joe Nall
The sepol_set_policydb method - to be used or not?,
Sven Vermeulen
How to restore a policy module,
Kim Lawson-Jenkins
SELinux design and Domain Name resolution,
Langland, Blake
[GIT PULL] SELinux patches for 3.15,
Paul Moore
[RFC PATCH v1] selinux: add transitions for kernel keys,
Paul Moore
[PATCHv2 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers,
Nikolay Aleksandrov
[PATCH V3] ss: Add support for retrieving SELinux contexts,
Richard Haines
Re: [PATCH 2/2] selinux: add gfp argument to security_xfrm_policy_alloc and fix callers,
Paul Moore
[PATCH] selinux: correctly label /proc inodes in use before the policy is loaded,
Paul Moore
sshd and setcurrent,
Andy Ruch
OSTree <3 SELinux, Colin Walters
What is Type Enforcement Model in SELinux?,
Kernel freak
[PATCH] selinux: put the mmap() DAC controls before the MAC controls,
Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]