Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: As we move to use Linux Containers User Namespace, (continued)
- Re: [PATCH 00/11] cross rename v3,
Tetsuo Handa
- Web Application access to files in /mnt/,
Ken Smith
- Create new NetFilter table,
Victor Porton
- Waiting for programs to stop,
Victor Porton
- new to selinux,
Bryan Harris
- Changing unlabeled_t on files to invalid_label_t.,
Daniel J Walsh
- My proposal for a new feature in Linux kernel,
Victor Porton
- Restrict to a fixed Internet domain in a sandbox,
Victor Porton
- Re: [PATCH] SELinux: Fix possible NULL pointer dereference in selinux_inode_permission(),
Eric Paris
- what is the default context of a program without selinux-aware,
bigclouds
[PATCH] LSM: Pass commname via get_task_comm(), Tetsuo Handa
[RFC] CIL and Source Policy Integration,
Steve Lawrence
how to use interface and node?,
bigclouds
[GIT PULL] SELinux patches for 3.14 (part two),
Paul Moore
any selinux program and architeture books,
bigclouds
Allowing all access in SELinux without permissive mode.,
Kernel freak
[PATCH] SELinux: Fix memory leak upon loading policy,
Tetsuo Handa
Mounting selinuxfs as read-only inside chroot,
Laurent Bigonville
[GIT PULL] SELinux patches for 3.14,
Paul Moore
question about basic selinux concept,
bigclouds
[PATCH libselinux] Fix a bug in the userspace AVC that broke per-domain permissive mode.,
Stephen Smalley
Bug in libselinux/src/setrans_client.c,
Nicolas Iooss
[GIT PULL] SELinux fixes for 3.13 (part three),
Paul Moore
Change in list manager software, Stephen Smalley
New SELinux support in Coreutils, Daniel J Walsh
selinux control for network interface using SOCK_RAW,
Andy Ruch
sepolicy-ifgen: Syntax error on line 179876 gen_context [type=GEN_CONTEXT]",
Laurent Bigonville
/bin/bash: Bad interpreter: Permission denied.,
Jay Corrales
Re: /bin/bash: Bad interpreter: Permission denied., Stephen Smalley
Re: [PATCH v2] selinux: selinux_setprocattr()->ptrace_parent() needs rcu_read_lock(), Paul Moore
Re: [PATCH -next] SELinux: remove duplicated include from hooks.c, Paul Moore
[GIT PULL] SELinux fixes for 3.13 (part two),
Paul Moore
[PATCH] selinux: revert 102aefdda4d8275ce7d7100bc16c88c74272b260, Paul Moore
[GIT PULL] SELinux fixes for 3.13, Paul Moore
Fix broken peer recv check,
Chad Hanson
[PATCH 0/2] Additional TCP SYN-ACK fixes for labeled IPsec,
Paul Moore
[PATCH 1/1] Ignore selevel/serange if MLS is disabled,
Sven Vermeulen
Re: kmemleak: filename_trans_read()?,
Eric Paris
Re: avtab dense hash table,
Stephen Smalley
RE: subscribe selinux,
Marino, Claudio
[PATCH 0/2] Fix TCP SYN-ACK labeling and access controls,
Paul Moore
MLS required even when MLS is disabled?,
Sven Vermeulen
[PATCH 03/05] selinux_current_policy_path will return none on a disabled SELinux system,
Dan Walsh
[PATCH 02/05] Add new icons for sepolicy gui, Dan Walsh
[PATCH 01/05] Make sure we do the polkit check on all dbus interfaces.,
Dan Walsh
SELinux Coloring book?,
Daniel J Walsh
Message not available
Message not available
Current upstreamable patch set from Fedora,
Dan Walsh
[PATCH 1/3] Add systemd unit file for mcstrans daemon,
Laurent Bigonville
kernel function to verify rootcontext,
Matthew Thode
Patch to remove default encoding patch.,
Daniel J Walsh
No module named policycoreutils.default_encoding_utf8 ?,
Sven Vermeulen
review of a dbus-selinux patch,
Colin Walters
[RFC PATCH 0/2] checkpolicy: Add constraint info to -d option, Richard Haines
[PATCH 2/2] checkpolicy: Add debug feature to display constraints / validatetrans,
Richard Haines
[PATCH 1/2] libsepol: Add sepol_validate_transition_reason_buffer function, Richard Haines
[PATCH] libsepol: Fix valgrind errors in constraint_expr_eval_reason, Richard Haines
[PATCH 1/2] Explicitly link libselinux against -lpthread,
Laurent Bigonville
Android emulator,
Gabriele Scotti
Handling unknown permissions in userspace object managers,
Eric Paris
[PATCH] SELinux: V2-Update policy version to support constraints info,
Richard Haines
[PATCH 01/01] Make yum/extract_rpms optional so that apt based systems can use tool,
Dan Walsh
[PATCH 01/01] Add test suite for audit2allow and sepolgen_ifgen,
Dan Walsh
[PATCH 01/1] Add back attributes flag to fix exception crash.,
Dan Walsh
Split policycoreutils up?,
Stephen Smalley
Been looking at further shrinkage of the SELinux footprint on Linux.,
Daniel J Walsh
Pruning dead/obsolete branches?,
Stephen Smalley
rlpkg -a -r causes a kernel bug,
Matthew Thode
Previous patch set, is complete Only sending 1-9., Daniel J Walsh
[PATCH 09/17] Have sepolgen return additional constraint information,
Daniel J Walsh
[PATCH 08/17] Have audit2allow output additional constraint, Daniel J Walsh
[PATCH 07/17] Fix line spacing on audit2allow output, Daniel J Walsh
[PATCH 06/17] Return the sections of the source and target context, Daniel J Walsh
[PATCH 05/17] Change audit2why to return constraint information on, Daniel J Walsh
[PATCH 04/17] libsepol: V1 Allow constraint denials to be determined., Daniel J Walsh
[PATCH 02/17] Catch IOError errors within audit2allow, Daniel J Walsh
[PATCH 03/17] Make sure userdel cleans up after itself in test, Daniel J Walsh
[PATCH 01/17] Do not return error if system is in permissive mode.,
Daniel J Walsh
avc_has_perm() returns -1 even when SELinux is in permissive mode,
Laurent Bigonville
Sven Vermeulen patch to fix sepolgen test code,
Daniel J Walsh
Michal Trunecka patch to allow restorecon to accept {}, Daniel J Walsh
[PATCH 2/2] Need to delete all managed objects before readding them,
Daniel J Walsh
[PATCH 1/2] semanage user customized should use -L not -l, Daniel J Walsh
Need information on building embedded systems.,
Don Hoefer
[PATCH 52/74] Add deleteall customizations field for modules., Daniel J Walsh
[PATCH 72/74] Mount sys before trying to mount selinuxfs, Daniel J Walsh
[PATCH 70/74] Use power of 2 for STAR_COUNT, Daniel J Walsh
[PATCH 73/74] Update pkgconfig definition, Daniel J Walsh
[PATCH 71/74] Patch from Sven Vermeulen to use RANLIB., Daniel J Walsh
[PATCH 74/74] Make RANLIB variable overridable,
Daniel J Walsh
[PATCH 69/74] Need to document -o filename in usage statement, Daniel J Walsh
[PATCH 66/74] Make setsebool be less verbose., Daniel J Walsh
[PATCH 68/74] setfiles should always return -1 on failures., Daniel J Walsh
[PATCH 64/74] Fix error when policy does not match the system., Daniel J Walsh
[PATCH 63/74] seinfo needs to work if mls is disabled., Daniel J Walsh
[PATCH 59/74] Change polgengui to use latest interfaces availabel in, Daniel J Walsh
[PATCH 62/74] Return the type aliases., Daniel J Walsh
[PATCH 57/74] If users of seobject set serange or seuser to "", Daniel J Walsh
[PATCH 61/74] Add new test suite for sepolicy tool set., Daniel J Walsh
[PATCH 55/74] Make sure file equivalance target and source do not end, Daniel J Walsh
[PATCH 58/74] Mv some of the setup we were doing in the, Daniel J Walsh
[PATCH 56/74] Fix customized of fcontext and booleans to return, Daniel J Walsh
[PATCH 54/74] <<none>> should be a valid type to be used with the, Daniel J Walsh
[PATCH 53/74] Return the level when looking at the customized changes, Daniel J Walsh
[PATCH 51/74] If a user specifies a module to add that does not exist, Daniel J Walsh
[PATCH 50/74] Only list disabled modules if the user ask for, Daniel J Walsh
[PATCH 49/74] Add customized calls for modules to list disabled, Daniel J Walsh
[PATCH 48/74] Fix bug in logger., Daniel J Walsh
[PATCH 47/74] Add new FILE_STRING constands, Daniel J Walsh
[PATCH 46/74] Cleanup handling of translations code, Daniel J Walsh
[PATCH 45/74] Fix lots of bugs in the bash completion script., Daniel J Walsh
[PATCH 44/74] Convert semanage command to use argparse, Daniel J Walsh
[PATCH 43/74] Add test script for testing semanage functionality., Daniel J Walsh
[PATCH 38/74] Lots of fixes for fixfiles, Daniel J Walsh
[PATCH 40/74] genhomedircon is no longer a script, Daniel J Walsh
[PATCH 41/74] bash completsion scripts have moved., Daniel J Walsh
[PATCH 42/74] Break the semanage man page into different man pages, Daniel J Walsh
[PATCH 39/74] Fix spelling, Daniel J Walsh
[PATCH 37/74] Give people who use run_init or newrole an indicator to, Daniel J Walsh
[PATCH 36/74] Handle cleanup of locks properly, Daniel J Walsh
[PATCH 35/74] Add support for systemd service for restorecond, Daniel J Walsh
[PATCH 33/74] Allow users to have homedir as a symbolic link but, Daniel J Walsh
[PATCH 32/74] Xephry now supports resizable flag, Daniel J Walsh
[PATCH 34/74] Fix spelling mistake, Daniel J Walsh
[PATCH 31/74] Swith to using openbox for window manager rather then, Daniel J Walsh
[PATCH 30/74] Handle audit2allow and audit2why with the same, Daniel J Walsh
[PATCH 29/74] We were asked to open output file for append rather, Daniel J Walsh
[PATCH 28/74] Need to set the locale to current locale, Daniel J Walsh
[PATCH 27/74] Update Translations, Daniel J Walsh
[PATCH 26/74] Fix test matching to use proper constants, Daniel J Walsh
[PATCH 25/74] sepolgen did not work with filename transitions., Daniel J Walsh
[PATCH 24/74] fix bug in calls to attributes, Daniel J Walsh
[PATCH 23/74] If you are pushing data onto the list that already, Daniel J Walsh
[PATCH 22/74] Pull auditing into libsemanage., Daniel J Walsh
[PATCH 21/74] Remove the policy.kern after policy is build and, Daniel J Walsh
[PATCH 20/74] Add Laurent Bigonville fix to look at MAX_UID as well, Daniel J Walsh
[PATCH 19/74] Fix handling of temporary file in sefcontext_compile.c, Daniel J Walsh
[PATCH 18/74] Fixes for procattr calls to handle cache properly., Daniel J Walsh
[PATCH 17/74] Add decent constants for python for return of, Daniel J Walsh
[PATCH 16/74] Fix label substituion to work with the equiv path of, Daniel J Walsh
[PATCH 15/74] Add selinux_current_policy_path, Daniel J Walsh
[PATCH 13/74] Support udev-197 and higher, Daniel J Walsh
[PATCH 14/74] Change get_context_list to return an error rather then, Daniel J Walsh
[PATCH 12/74] Separate out the calling of local subs and dist subs in, Daniel J Walsh
[PATCH 11/74] Patch to change *setfilecon to not return ENOSUP if, Daniel J Walsh
[PATCH 10/74] This patch fixes python parsing., Daniel J Walsh
[PATCH 09/74] define SELINUX_TRANS_DIR in selinux.h, Daniel J Walsh
[PATCH 05/74] Laurent Bigonville patch to fix various minor manpage, Daniel J Walsh
[PATCH 08/74] Add selinux_systemd_contexts_path, Daniel J Walsh
[PATCH 07/74] Add selinux_set_policy_root sets an alternate policy, Daniel J Walsh
[PATCH 06/74] Add missing man page for sefcontext_compile, Daniel J Walsh
[PATCH 04/74] Allow " " and ":" in file name transtions, Daniel J Walsh
[PATCH 03/74] handle-unknown should be an optional argument, Daniel J Walsh
[PATCH 02/74] Laurent Bigonville patch to allow overriding PATH, Daniel J Walsh
Allow audit2allow to return constraint information from policy,
Daniel J Walsh
Re: filtering outgoing packets with SELinux and iptables, Daniel J Walsh
[PATCH selinux-testsuite] fix policy Makefile for RHEL4/5,
Jan Stancek
Re: Need information for building embedded system., Daniel J Walsh
[PATCH] libselinux: support building on older PCRE libs,
Joe MacDonald
[RFC]: Stephen Smalley Facts, William Roberts
SELinux: Update policy version to support constraints info,
Eric Paris
[PATCH 0/2] Repair two build failures on older host,
Joe MacDonald
Update to CIL,
James Carter
[GIT PULL] SELinux updates for 3.12,
Paul Moore
Policycoreutils: refactoring Python 2.* to Python 3.*,
Leonidas S. Barbosa
Re: There is question about command semodule_deps, Daniel J Walsh
MLS over loopback interface,
Langland, Blake
Re: [PATCH] conditionally reschedule while loading selinux policy.,
Paul Moore
Re: [PATCH] selinux: Use kmemdup instead of kmalloc + memcpy, Paul Moore
[PATCH 1/1] Support user-provided RANLIB, Sven Vermeulen
[PATCH 0/5] libselinux gentoo patches,
Sven Vermeulen
[selinux-testsuite RFC PATCH 0/4] selinux-testsuite patches,
Paul Moore
linux-next tree update for SELinux,
Paul Moore
[PATCH] selinux: add Paul Moore as a SELinux maintainer,
Paul Moore
Is this a bug in sesearch, or ...?,
Dominick Grift
RFC policycoreutils packaging,
Dominick Grift
is there a validation mechanism or tool for SELinux policy configuration?,
solomon
libselinux's __attribute__((constructor)) versus nVidia libGL.so,
Colin Walters
setools and gold linker, Sven Vermeulen
Programmatic domain change to unprivileged role,
Dan Pou
[PATCH] netlabel: use domain based selectors when address based selectors are not available, Paul Moore
[PATCH] selinux: correct locking in selinux_netlbl_socket_connect),
Paul Moore
Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect), Paul Moore
Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect), Paul Moore
Building the Base Policy Module,
Thomas COUDRAY
Common Intermediate Language (CIL) Update,
James Carter
Re: Common Intermediate Language (CIL) Update, Dominick Grift
This patch stops semanage from removing user records that are still in use., Daniel J Walsh
Currently we handle adding audit records with semanage command in pocliycoreutils., Daniel J Walsh
[PATCH v14 0/6] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v14 3/6] LSM: Explicit individual LSM associations, Casey Schaufler
Re: [PATCH v14 3/6] LSM: Explicit individual LSM associations, Paul Moore
[PATCH v14 6/6] LSM: Multiple LSM Documentation and cleanup, Casey Schaufler
Message not available
<Possible follow-ups>
Re: [PATCH v14 0/6] LSM: Multiple concurrent LSMs, Casey Schaufler
Re: [PATCH] xattr: Constify ->name member of "struct xattr".,
Paul Moore
Re: [refpolicy] Want to make typeattribute declarations possible in conditionals,
Christopher J. PeBenito
[PATCH 1/2] sepolgen: Fix test that compares matchlist length, Sven Vermeulen
[PATCH 2/2] sepolgen: Fix AttributeError: 'dict' object has no attribute 'attributes',
Sven Vermeulen
Now you too, can get the "setenforce 1" t-shirt., Daniel J Walsh
matchportcon?,
Dave Quigley
AVC for unlabeled_t on cgroup,
Andy Ruch
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]