Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
Re: [PATCH 1/2 v5] SELinux: Reduce overhead of mls_level_isvalid() function call, Paul Moore
[PATCH] --handle-unknown option takes a required argument,
Laurent Bigonville
Labeled IPSec trying to match policy for peer label?,
Sven Vermeulen
[PATCH 0/9] Labeled networking patches for 3.11,
Paul Moore
- [PATCH 4/9] selinux: cleanup selinux_xfrm_policy_lookup() and selinux_xfrm_state_pol_flow_match(), Paul Moore
- [PATCH 6/9] selinux: cleanup some comment and whitespace issues in the XFRM code, Paul Moore
- [PATCH 3/9] selinux: cleanup and consolidate the XFRM alloc/clone/delete/free code, Paul Moore
- [PATCH 1/9] selinux: fix problems in netnode when BUG() is compiled out, Paul Moore
- [PATCH 9/9] selinux: remove the BUG_ON() from selinux_skb_xfrm_sid(), Paul Moore
- [PATCH 7/9] selinux: cleanup selinux_xfrm_decode_session(), Paul Moore
- [PATCH 8/9] selinux: cleanup the XFRM header, Paul Moore
- [PATCH 2/9] lsm: split the xfrm_state_alloc_security() hook implementation, Paul Moore
- [PATCH 5/9] selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last(), Paul Moore
- Re: [PATCH 0/9] Labeled networking patches for 3.11, Casey Schaufler
pcre 8.33 changes restorecon behavior,
Sven Vermeulen
Problems regarding booting devices,
Haiqing Jiang
Deprecating policy capabilities (was: Clarification of labeled IPsec checks),
Paul Moore
[PATCH 0/8] Labeled IPsec cleanups,
Paul Moore
use case,
Franck
selinux on zfs(onlinux),
Matthew Thode
xt_SECMARK and "unable to map security context 'httpcontext'" error,
Kevin Wilson
[RFC PATCH 1/2] selinux: merge selinux_inode_permission and inode_has_perm,
Eric Paris
Re: [RFC PATCH 1/2] selinux: merge selinux_inode_permission and inode_has_perm, Eric Paris
Role associated with an attribute is not being associated with all types having that attribute., James Carter
[PATCH v3 0/2] Fix the SELinux dynamic network access controls,
Paul Moore
[PATCH v2 0/2] Fix the SELinux dynamic network access controls,
Paul Moore
[RFC PATCH 0/2] Fix the SELinux dynamic network access controls,
Paul Moore
high to low UDP stream,
Langland, Blake
Last version of policycoreutils using Fedora only API,
Laurent Bigonville
Re: [PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model., Eric Paris
Re: [PATCH 04/13] SELinux: Add new labeling type native labels, Eric Paris
Re: [PATCH 01/13] Security: Add hook to calculate context based on a negative dentry., Eric Paris
Re: [PATCH 03/13] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data., Eric Paris
Re: [PATCH 13/13] Kconfig: Add Kconfig entry for Labeled NFS V4 client, Eric Paris
[PATCH] Properly build the swig exception file even if the headers are missing,
Laurent Bigonville
[PATCH] libselinux: Requires libpcre and libpthread for static linking,
Laurent Bigonville
network, deep drive,
vlad halilov
[PATCH] netlabel: improve domain mapping validation,
Paul Moore
connection between different labels,
vlad halilov
Future of SETools and CIL,
Steve Lawrence
marking ipv6 loopback for cipsov?,
vlad halilov
[PATCH/RFC 0/2] Test failures when building sepolgen,
Sven Vermeulen
[PATCH] Enable setting security contexts on rootfs inodes.,
Stephen Smalley
audit2allow/sepolgen not setting the locale properly when calculating the bootdate,
Laurent Bigonville
Disabling rules,
Sven Vermeulen
Re: [PATCH 09/17] NFSv4: Introduce new label structure, Casey Schaufler
[PATCH 1/1] Fix KeyError when using sepolicy transition, Sven Vermeulen
[ANNOUNCE] Linux Security Summit 2013 - CFP,
James Morris
Re: [PATCH 00/17] lnfs: linux-3.9 release,
James Morris
Re: [PATCH 13/17] NFS: Client implementation of Labeled-NFS, James Morris
Clarification of labeled IPsec checks,
Christopher J. PeBenito
[PATCH 1/1] Add SELinux policy capability for always checking packet and peer classes.,
Chris PeBenito
Re: [PATCH 05/17] Security: Add Hook to test if the particular xattr is part of a MAC model., James Morris
Re: [PATCH 14/17] NFS: Extend NFS xattr handlers to accept the security namespace, James Morris
Re: [PATCH 06/17] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data., James Morris
'av.data' may be used uninitialized,
Michael Seyfert
[PATCH 1/1] Open stdin as read/write,
Sven Vermeulen
[PATCH 1/1] Fix referenced before assignment error,
Sven Vermeulen
What provides _policy?,
Sven Vermeulen
Current Makefile system is inconvenient/limited,
Michael Seyfert
SELinux errors with pam_faillock,
Andy Ruch
Re: [PATCH 07/17] SELinux: Add new labeling type native labels,
David Quigley
Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry.,
David Quigley
Re: [PATCH 04/17] Security: Add hook to calculate context based on a negative dentry., James Morris
Re: Build regressions/improvements in v3.9-rc8, Paul Moore
Re: [PATCH 00/19] lnfs: 3.9-rc5 release, Mimi Zohar
[PATCH v13 1/9] LSM: Security blob abstraction, Casey Schaufler
[PATCH v13 9/9] LSM: Documentation and cleanup, Casey Schaufler
[PATCH v13 3/9] LSM: Multiple concurrent secids, Casey Schaufler
[PATCH v13 4/9] LSM: Multiple security context maintenance, Casey Schaufler
[PATCH v13 8/9] LSM: Hook list management, Casey Schaufler
[PATCH v13 0/9] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v13 2/9] LSM: Complete conversion to kill_pid_info_as_cred, Casey Schaufler
[PATCH v13 6/9] LSM: Additional interfaces in /proc/pid/attr, Casey Schaufler
[PATCH v13 7/9] LSM: remove Yama special case stacking, Casey Schaufler
[PATCH v13 5/9] LSM: Networking component isolation,
Casey Schaufler
semenage-argparse: Now with full help test (except -E) and support for the login subcommand,
Dave Quigley
First crack at argparse parser for semanage., David Quigley
Not sending AVC denials to audit.log,
Rodney Simioni
[PATCH v2] selinux: consider filesystem subtype in policies,
Anand Avati
Re: [PATCH v2] selinux: consider filesystem subtype in policies, Eric Paris
[RFC PATCH 0/3] Shrink sk_buff and add a security blob,
Paul Moore
[PATCH] selinux: consider filesystem subtype in policies,
Anand Avati
[PATCH] filesystem.te: Add support for fuse.glusterfs, Anand Avati
Stop Disabling SELinux,
David Quigley
sysadm restarting services,
Andy Ruch
I am new to selinux,
Rodney Simioni
ipc security context,
Ondrej Oprala
appending to an existing policy,
Rodney Simioni
Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet,
Paul Moore
<Possible follow-ups>
Re: [PATCH] tcp: assign the sock correctly to an outgoing SYNACK packet, Paul Moore
newrole and tmux,
Sven Vermeulen
[PATCH v3] selinux: fix problems in netnode when BUG() is compiled out,
Paul Moore
Re: [PATCH 01/19] Security: Add hook to calculate context based on a negative dentry., David Quigley
Simple fixes for libsepol for DARWIN, Eric Mertens
Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling,
Dave Quigley
<Possible follow-ups>
Re: [PATCH 13/14] NFSD: Server implementation of MAC Labeling, Dave Quigley
Re: Filesystem module,
Christopher J. PeBenito
sudo best practices,
Andy Ruch
File context not applied due to regex ordering,
Laurent Bigonville
Compiling Selinux from Source,
Kernel freak
semanage support for nsswitch,
Matthew Thode
SELinux network labeling,
Langland, Blake
AF_VSOCK and the LSMs,
Paul Moore
Re: EXTERNAL: Re: Developinng SELinux MLS aware software, Daniel J Walsh
Mount of cgroup filesystems fails when booting in SELinux enforcing mode,
aranea
Monitoring the Openshift Logs each day for AVCs I am struct by how often we get AVC's for stuff that is blocked by DAC.,
Daniel J Walsh
Re: [PATCH 00/15] lnfs: 3.8-rc6 release,
Casey Schaufler
[PATCH] Add db_materialized_view object class,
Kohei KaiGai
[no subject],
Brian Iván Martínez
[selinux-testsuite][PATCH] use extfs ioctls only when running on ext[234],
Jan Stancek
[PATCH] flask: add the attach_queue permission to the tun_socket object class, Paul Moore
[PATCH 79/84] policycoreutils: secon: add support for setrans color, Daniel J Walsh
[PATCH 45/84] sepolgen: audit.py: Handle times in foreign locals for, Daniel J Walsh
[PATCH 21/84] libselinux: include hidden_proto for, Daniel J Walsh
[PATCH 22/84] libselinux: sefcontontext_compile: Add error handling, Daniel J Walsh
[PATCH 82/84] libselinux: optimize set*con functions, Daniel J Walsh
[PATCH 83/84] sepolgen: understand role attributes, Daniel J Walsh
[PATCH 81/84] sepolgen: Use refpolicy_makefile() instead of,
Daniel J Walsh
[PATCH 80/84] policycoreutils: restorecond: remobe /etc/mtab from, Daniel J Walsh
[PATCH 77/84] libselinux: audit2why: use the new constraint,
Daniel J Walsh
[PATCH 78/84] libselinux: audit2why: remove a useless policy vers, Daniel J Walsh
[PATCH 74/84] checkpolicy: libsepol: implement default type policy, Daniel J Walsh
[PATCH 73/84] libselinux: Change boooleans.subs to, Daniel J Walsh
[PATCH 76/84] libsepol: constraint queue overflow, Daniel J Walsh
[PATCH 68/84] checkpolicy: Fix errors found by coverity, Daniel J Walsh
[PATCH 70/84] libsepol: coverity fixes, Daniel J Walsh
[PATCH 71/84] libselinux: Fix errors found by coverity, Daniel J Walsh
[PATCH 72/84] policycoreutils: gui: system-config-selinux: do not use, Daniel J Walsh
[PATCH 67/84] libselinux: selinux_status_open: do not leak statusfd, Daniel J Walsh
[PATCH 69/84] libsemanage: fixes from coverity, Daniel J Walsh
[PATCH 61/84] libselinux: man: Fix typo in man page, Daniel J Walsh
[PATCH 64/84] libselinux: man: context_new(3): fix the return value, Daniel J Walsh
[PATCH 66/84] libselinux: selinux_status_open: handle error from, Daniel J Walsh
[PATCH 46/84] policycoreutils: sandbox: Copy /var/tmp to /tmp as they, Daniel J Walsh
[PATCH 65/84] libsemange: redo genhomedircon minuid, Daniel J Walsh
[PATCH 54/84] policycoreutils: semanage: list logins file entries in, Daniel J Walsh
[PATCH 63/84] libselinux: Use ENOTSUP instead of EOPNOTSUPP for, Daniel J Walsh
[PATCH 62/84] libselinux: man: Add references and man page links to, Daniel J Walsh
[PATCH 57/84] libsemanage: Cleanup/fix enable/disable/remove module., Daniel J Walsh
[PATCH 59/84] libselinux: man: Fix program synopsis and function, Daniel J Walsh
[PATCH 58/84] libselinux: audit2why: Cleanup audit2why analysys, Daniel J Walsh
[PATCH 56/84] policycoreutils: semanage: good error message is, Daniel J Walsh
[PATCH 51/84] policycoreutils: gui: system-config-selinux: Catch no, Daniel J Walsh
[PATCH 52/84] policycoreutils: setfiles: print error if no default, Daniel J Walsh
[PATCH 49/84] policycoreutils: semanage: Fix handling of boolean_sub, Daniel J Walsh
[PATCH 50/84] policycoreutils: semanage: man: roles instead of role, Daniel J Walsh
[PATCH 44/84] libselinux: audit2why: do not leak on multiple init(), Daniel J Walsh
[PATCH 47/84] libselinux: mode_to_security_class: interface to, Daniel J Walsh
[PATCH 48/84] policycoreutils: qualifier to shred content, Daniel J Walsh
[PATCH 41/84] libselinux: man: make selinux.8 mention service man, Daniel J Walsh
[PATCH 43/84] policycoreutils: gui: Start using Popen, Daniel J Walsh
[PATCH 42/84] libselinux: audit2why: Fix segfault if finish() called, Daniel J Walsh
[PATCH 35/84] policycoreutils: gui: switch to use sepolicy, Daniel J Walsh
[PATCH 40/84] policycoreutils: semanage: seobject verify policy types, Daniel J Walsh
[PATCH 38/84] policycoreutils: add po file configuration information, Daniel J Walsh
[PATCH 37/84] policycoreutils: semanage: use sepolicy for boolean, Daniel J Walsh
[PATCH 36/84] policycoreutils: gui: sepolgen: use sepolicy to, Daniel J Walsh
[PATCH 34/84] policycoreutils: sandbox: use sepolicy to look for, Daniel J Walsh
[PATCH 33/84] policycoreutils: sepolicy: Update Makefiles and po, Daniel J Walsh
[PATCH 29/84] global: gitignore: .#*, Daniel J Walsh
[PATCH 30/84] global: gitignore: ignore vim swap files, Daniel J Walsh
[PATCH 31/84] global gitignore: Something about filenames starting, Daniel J Walsh
[PATCH 27/84] policycoreutils: seunshare: NO NO 100 times NO CHECK, Daniel J Walsh
[PATCH 26/84] policycoreutils: load_policy: make link at the, Daniel J Walsh
[PATCH 24/84] policycoreutils: Allow the users to override the, Daniel J Walsh
[PATCH 25/84] policycoreutils: mention percent display in man page, Daniel J Walsh
[PATCH 23/84] libsemanage: Add sefcontext_compile to compile regex, Daniel J Walsh
[PATCH 20/84] libselinux: do not leak mmapfd, Daniel J Walsh
[PATCH 18/84] libsemanage: FIME binary_policy_path error checking, Daniel J Walsh
[PATCH 13/84] libselinux: label_file: use precompiled filecontext, Daniel J Walsh
[PATCH 12/84] libselinux: utils: new file context regex compiler, Daniel J Walsh
[PATCH 04/84] libselinux: audit2why: make sure path is nul terminated, Daniel J Walsh
ERROR 'type staff_java_t is not within scope' at token,
Hung Truong
Turn off "dontaudit" rules in monolithic policy,
Hung Truong
Re: Turn off "dontaudit" rules in monolithic policy, Christopher J. PeBenito
SELinux List going down this after noon, James Carter
Re: __thread and fork() is a big no-no,
Eric Paris
__thread and fork() is a big no-no,
Eric Paris
[PATCH 0/2] Fix some multiqueue TUN problems,
Paul Moore
Re: Security label of file in Yaffs2 on Android,
Stephen Smalley
[PATCH] sepolgen: Use refpolicy_makefile() instead of hardcoding Makefile path, Laurent Bigonville
setfscreatecon optimizations,
Ondrej Oprala
[PATCH v12 0/9] LSM: Multiple concurrent LSMs,
Casey Schaufler
Message not available
Message not available
Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs, Stephen Smalley
Fixing external/libsepol issues found by Klocwork,
Alice Chu
Fixing external/checkpolicy issues found by Klocwork,
Alice Chu
[PATCH] secon: add support for setrans color information in prompt output, Paul Moore
Re: order 4 alloc failures in security_context_to_sid_core,
Casey Schaufler
Reloading policy fills audit log with "selinux_audit_rule_match: stale rule",
Sven Vermeulen
Re: Labeled NFS Meeting Info for Tonight Dec 20/Dec 21st for our friends in Singapore, Dave Quigley
Labeled NFS Linux Prototype Meeting, David Quigley
[PATCH v11 0/9] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v11 8/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 7/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 6/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 5/9] LSM: Multiple concurrent LSMs, Casey Schaufler
Message not available
[RFC PATCH v3 0/2] Fix some multiqueue TUN problems,
Paul Moore
SELinux networking question,
Langland, Blake
Reachable SIDs given a context,
Sven Vermeulen
semanage cleanup,
David Quigley
Re: [PATCH v10] LSM: Multiple concurrent LSMs,
Casey Schaufler
SELinux Google+ Community,
David Quigley
[PATCH v2] selinux: fix problems in netnode when BUG() is compiled out, Paul Moore
[PATCH] selinux: fix problems in netnode when BUG() is compiled out,
Paul Moore
[RFC PATCH v2 0/3] Fix some multiqueue TUN problems,
Paul Moore
Message not available
[RFC PATCH v2 1/3] tun: correctly report an error in tun_flow_init(), Paul Moore
[RFC PATCH v2 2/3] selinux: add the "create_queue" permission to the "tun_socket" class, Paul Moore
[PATCH] doc: context_new(3): fix the return value description,
Pádraig Brady
policy for PowerDNS,
Sander Hoentjen
Re: policy for PowerDNS, grift
[PATCH v9 2/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v9 1/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v9 0/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[RFC PATCH 0/2] Fix some multiqueue TUN problems,
Paul Moore
Message not available
[PATCH v8 2/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v8 1/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v8 0/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH RFC] Package script(let)s SELinux execution context,
Guillem Jover
[PATCH] libselinux: Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions, Guillem Jover
[PATCH 0/4] libselinux: Man pages cleanups and updates,
Guillem Jover
Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netnode_insert(), Paul Moore
Labeled NFS [v5],
David Quigley
[PATCH 05/13] KConfig: Add KConfig entries for Labeled NFS, David Quigley
[PATCH 07/13] NFSv4: Introduce new label structure, David Quigley
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]