Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
Message not available
Message not available
Re: [PATCH v12 0/9] LSM: Multiple concurrent LSMs, Stephen Smalley
Fixing external/libsepol issues found by Klocwork,
Alice Chu
Fixing external/checkpolicy issues found by Klocwork,
Alice Chu
[PATCH] secon: add support for setrans color information in prompt output, Paul Moore
Re: order 4 alloc failures in security_context_to_sid_core,
Casey Schaufler
Reloading policy fills audit log with "selinux_audit_rule_match: stale rule",
Sven Vermeulen
Re: Labeled NFS Meeting Info for Tonight Dec 20/Dec 21st for our friends in Singapore, Dave Quigley
Labeled NFS Linux Prototype Meeting, David Quigley
[PATCH v11 0/9] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v11 8/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 7/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 6/9] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v11 5/9] LSM: Multiple concurrent LSMs, Casey Schaufler
Message not available
[RFC PATCH v3 0/2] Fix some multiqueue TUN problems,
Paul Moore
SELinux networking question,
Langland, Blake
Reachable SIDs given a context,
Sven Vermeulen
semanage cleanup,
David Quigley
Re: [PATCH v10] LSM: Multiple concurrent LSMs,
Casey Schaufler
SELinux Google+ Community,
David Quigley
[PATCH v2] selinux: fix problems in netnode when BUG() is compiled out, Paul Moore
[PATCH] selinux: fix problems in netnode when BUG() is compiled out,
Paul Moore
[RFC PATCH v2 0/3] Fix some multiqueue TUN problems,
Paul Moore
Message not available
[RFC PATCH v2 1/3] tun: correctly report an error in tun_flow_init(), Paul Moore
[RFC PATCH v2 2/3] selinux: add the "create_queue" permission to the "tun_socket" class, Paul Moore
[PATCH] doc: context_new(3): fix the return value description,
Pádraig Brady
policy for PowerDNS,
Sander Hoentjen
Re: policy for PowerDNS, grift
[PATCH v9 2/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v9 1/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v9 0/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[RFC PATCH 0/2] Fix some multiqueue TUN problems,
Paul Moore
Message not available
[PATCH v8 2/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH v8 1/2] LSM: Multiple concurrent LSMs,
Casey Schaufler
[PATCH v8 0/2] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH RFC] Package script(let)s SELinux execution context,
Guillem Jover
[PATCH] libselinux: Use ENOTSUP instead of EOPNOTSUPP for getfilecon functions, Guillem Jover
[PATCH 0/4] libselinux: Man pages cleanups and updates,
Guillem Jover
Re: [PATCH] SELinux: Fix RCU deref check warning in sel_netnode_insert(), Paul Moore
Labeled NFS [v5],
David Quigley
[PATCH 05/13] KConfig: Add KConfig entries for Labeled NFS, David Quigley
[PATCH 07/13] NFSv4: Introduce new label structure, David Quigley
[PATCH 02/13] Security: Add Hook to test if the particular xattr is part of a MAC model., David Quigley
[PATCH 01/13] Security: Add hook to calculate context based on a negative dentry., David Quigley
[PATCH 13/13] NFSD: Server implementation of MAC Labeling, David Quigley
[PATCH 11/13] NFS: Client implementation of Labeled-NFS, David Quigley
[PATCH 03/13] LSM: Add flags field to security_sb_set_mnt_opts for in kernel mount data., David Quigley
[PATCH 09/13] NFS:Add labels to client function prototypes, David Quigley
[PATCH 06/13] NFSv4: Add label recommended attribute and NFSv4 flags, David Quigley
[PATCH 08/13] NFSv4: Extend fattr bitmaps to support all 3 words, David Quigley
[PATCH 04/13] SELinux: Add new labeling type native labels, David Quigley
Message not available
Message not available
Re: Labeled NFS [v5], Casey Schaufler
Re: Labeled NFS [v5], Casey Schaufler
Re: Bisected regression: iterate_fd() selinux change affects flash plugin,
Pavel Roskin
reload seandroid policy,
Shuiqing Wang
Possible issues with dpkg SELinux support,
Guillem Jover
semanage fails when conflicting types are in current or subdirectory, Daniel Black
Re: [PATCH v6] LSM: Multiple concurrent LSMs,
Casey Schaufler
With systemd taking care of starting services, is there any reason to continue to ship run_init?,
Daniel J Walsh
[PATCH] Update my email address.,
Stephen Smalley
Question about SELinux capability,
Moyer, Thomas - 0668 - MITLL
Re: [PATCH v5.1] LSM: Multiple concurrent LSMs, Casey Schaufler
[PATCH 1/1] setools-3.3.7:apol: Add constraints search tab, Richard Haines
Question about policy module error message,
Moyer, Thomas - 0668 - MITLL
Fwd: Re: [libvirt] [PATCH] selinux: Don't fail RestoreAll if file doesn't have a default label, Daniel J Walsh
Call for presentations LCA2013 Security Miniconf, Casey Schaufler
[PATCH v5] LSM: Multiple concurrent LSMs,
Casey Schaufler
Message not available
Message not available
Message not available
[selinux-testsuite][PATCH] fix execshare/parent segfault on ia64, Jan Stancek
First attempt for the patch on extending the plugin interface for rpm,
Reshetova, Elena
Re: [selinux-testsuite][PATCH] use auth_read_passwd only if defined,
Serge E. Hallyn
Re: [selinux-testsuite][PATCH] corenet_all_recvfrom_unlabeled requires domain, Serge E. Hallyn
Re: [selinux-testsuite][PATCH] test_ptrace: fix policy to allow building with relro, Serge E. Hallyn
semanage not properly logging new seuser, Laurent Bigonville
[PATCH] policycoreutils: Fix semange alternative logging code, Laurent Bigonville
[PATCH 00/15] Patches from the Debian packages,
Laurent Bigonville
- [PATCH 05/15] checkpolicy: Allow overriding LIBDIR in test/Makefile, Laurent Bigonville
- [PATCH 09/15] libselinux: Do not use LDFLAGS to set -lpcre, Laurent Bigonville
- [PATCH 12/15] checkpolicy: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 02/15] policycoreutils: Create correct man directory for run_init manpages, Laurent Bigonville
- [PATCH 10/15] libselinux: Fix various minor manpage issues and correct section numbering., Laurent Bigonville
- [PATCH 15/15] policycoreutils: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 07/15] libsemanage: Also check for the uppoer bound on user ids in login.defs, Laurent Bigonville
- [PATCH 08/15] libselinux: Allow overriding LIBBASE in src/Makefile, Laurent Bigonville
- [PATCH 14/15] libsepol: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 04/15] policycoreutils: Add new open_init_pty that doesn't waste CPU time, Laurent Bigonville
- [PATCH 11/15] libselinux: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 03/15] policycoreutils: Allow overriding CFLAGS in setfiles and sestatus Makefiles, Laurent Bigonville
- [PATCH 06/15] libsepol: Allow overriding LIBBASE in src/Makefile, Laurent Bigonville
- [PATCH 01/15] Policycoreutils: Allow overriding INITDIR in restorecond Makefile, Laurent Bigonville
- [PATCH 13/15] libsemanage: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- <Possible follow-ups>
- [PATCH 00/15] Patches from the Debian packages, Laurent Bigonville
- [PATCH 05/16] libsepol: Allow overriding LIBBASE in src/Makefile, Laurent Bigonville
- [PATCH 06/16] libsemanage: Also check for the uppoer bound on user ids in login.defs, Laurent Bigonville
- [PATCH 11/16] libsemanage: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 08/16] libselinux: Do not use LDFLAGS to set -lpcre and -lpthread, Laurent Bigonville
- [PATCH 14/16] policycoreutils: Fix semange alternative logging code, Laurent Bigonville
- [PATCH 09/16] libselinux: Fix various minor manpage issues and correct section numbering., Laurent Bigonville
- [PATCH 15/16] policycoreutils: init_policy() takes no arguments, Laurent Bigonville
- [PATCH 04/16] checkpolicy: Allow overriding LIBDIR in test/Makefile, Laurent Bigonville
- [PATCH 01/16] Policycoreutils: Allow overriding INITDIR in restorecond Makefile, Laurent Bigonville
- [PATCH 12/16] libsepol: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 02/16] policycoreutils: Create correct man directory for run_init manpages, Laurent Bigonville
- [PATCH 07/16] libselinux: Allow overriding LIBBASE in src/Makefile, Laurent Bigonville
- [PATCH 10/16] checkpolicy: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
- [PATCH 03/16] policycoreutils: Allow overriding CFLAGS in setfiles and sestatus Makefiles, Laurent Bigonville
- [PATCH 16/16] policycoreutils: Do not include LDFLAGS in CFLAGS when building sepolicy, Laurent Bigonville
- [PATCH 13/16] policycoreutils: Fix cases where hyphen were used as minus sign in manpages, Laurent Bigonville
apol permission map weights,
Hayawardh Vijayakumar
Re: [PATCH v4] LSM: Multiple concurrent LSMs, Casey Schaufler
run_init change in latest policycoreutils,
Sven Vermeulen
semanage: should -a imply -m?,
Eric Paris
Source policy files for Tomcat?, Chris O'Neil
SE Android: New list set up, Stephen Smalley
[PATCH v3 5/6] LSM: SELinux changes to allow LSM stacking, Casey Schaufler
[RFC frameworks/base] Initial implementation of colored stripe., Joshua Brindle
Call for presentations at the 2013 LCA Security Miniconf, Casey Schaufler
level,
William Roberts
SELinux Branded USB Thumb Drives,
David Quigley
seandroid 4.1.1,
Alexandra Test
Upstream changes,
William Roberts
signature clause in mac_permisions,
William Roberts
ImportError: /usr/lib64/libvirt.so.0: undefined symbol: selinux_virtual_domain_context_path,
Lentes, Bernd
clean up in android.c,
William Roberts
dev ion,
William Roberts
policycoreutils build failure,
Pat McClory
[RFC] Add initial clipboard access control implementation,
Joshua Brindle
[PATCH v2 5/of5] LSM: SELinux changes to allow LSM stacking, Casey Schaufler
Update to docs,
William Roberts
system without libsepol,
Eric Paris
[PATCH] selinux-testsuite: Allow test domains to read /etc/passwd,
Stephen Smalley
Re: extract old file (proprietary application, f.e. camera) for maguro 4.1.4, Alexandra Test
maguro 4.1.4,
Alexandra Test
[PATCH] Allow domain access to /dev/ion,
William Roberts
Message not available
Re: [PATCH] Allow domain access to /dev/ion, Stephen Smalley
Problem with SEManager app on Seandroid 4.0.4,
Cesar Maiorino
mmac-4.1.1?,
Joshua Brindle
Security hooks for rpm,
Elena Reshetova
Assertion `new_role != ((void *)0) && new_role->flavor == 1' when installing modules,
Laurent Bigonville
SELinux book,
Kevin W. Wall
New pull request for SEAndroid sepolicy, William Roberts
domain_kill_all_domains in login programs,
Joe Nall
[PATCH 5/5] LSM: SELinux changes to allow LSM stacking,
Casey Schaufler
Pull request for check_seapp, William Roberts
'Context Separation', Ole Kliemann
RBAC to SELinux policy migration,
Marcel Butucea
An MCS policy,
Ole Kliemann
The SELinux Notebook 3rd Edition,
Richard Haines
how to extract old files, Alexandra Test
Segmentation fault in context_type_get(),
Gaurav Kumar
[PATCH 01/18] libselinux: label_file: use PCRE instead of glibc regex functions,
Eric Paris
- [PATCH 15/18] libselinux: label_file: struct reorg, Eric Paris
- [PATCH 17/18] libselinux: utils: new file context regex compiler, Eric Paris
- [PATCH 03/18] libselinux: label_file: move definitions to include file, Eric Paris
- [PATCH 18/18] libselinux: label_file: use precompiled filecontext when possible, Eric Paris
- [PATCH 14/18] libselinux: label_file: break up find_stem_from_spec, Eric Paris
- [PATCH 08/18] libselinux: label_file: move spec_hasMetaChars to header, Eric Paris
- [PATCH 02/18] libselinux: label_file: remove all typedefs, Eric Paris
- [PATCH 05/18] libselinux: label_file: move error reporting back into caller, Eric Paris
- [PATCH 10/18] libselinux: label_file: move regex sorting to the header, Eric Paris
- [PATCH 13/18] libselinux: label_file: new process_file function, Eric Paris
- [PATCH 11/18] libselinux: label_file: add accessors for the pcre extra data, Eric Paris
- [PATCH 12/18] libselinux: label_file: only run regex files one time, Eric Paris
- [PATCH 09/18] libselinux: label_file: fix potential read past buffer in spec_hasMetaChars, Eric Paris
- [PATCH 16/18] libselinux: label_file: only run array once when sorting, Eric Paris
- [PATCH 07/18] libselinux: label_file: drop useless ncomp field from label_file data, Eric Paris
- [PATCH 06/18] libselinux: label_file: move stem/spec handling to header, Eric Paris
- [PATCH 04/18] libselinux: label_file: do string to mode_t conversion in a helper function, Eric Paris
- Re: [PATCH 01/18] libselinux: label_file: use PCRE instead of glibc regex functions, Stephen Smalley
PCRE work and results, Eric Paris
[PATCH] libsepol: fix neverallow checking,
Stephen Smalley
network packet context,
Ole Kliemann
proof selinux,
Raul da Silva {Sp4wn}
Re: proof selinux, Russell Coker
selinux context_new return value question,
Gaurav Kumar
check_seapp sepolicy integration,
William Roberts
neverallow and attributes,
Ole Kliemann
Unified set of RPM security hooks for different LSMs, Elena Reshetova
[PATCH 1/7] SELinux: remove crazy contortions around proc,
Eric Paris
[PATCH] libselinux: Only call regfree if regcomp was previously called on the regex,
Stephen Smalley
Inheriting labels,
William Roberts
sepol help,
William Roberts
Problems getting source using repo sync,
Cesar Maiorino
[PATCH v2]: genhomedircon manual page improvements (was Re: [PATCH] genhomedircon installation and manual page improvements), Guido Trentalancia
[PATCH v2]: dynamically create genhomedircon (was Re: [PATCH] genhomedircon installation and manual page improvements), Guido Trentalancia
[PATCH v2]: setfiles/restorecon minor improvements,
Guido Trentalancia
Porting seandroid to qualcomm MSM8960,
Cesar Maiorino
[PATCH/RFC] setools: update swig interfaces for swig-2.0.7 (and higher?),
Sven Vermeulen
[PATCH]: libselinux: improve the file_contexts.5 manual page, Guido Trentalancia
[PATCH v2]: seobject.py must skip comments while reading external configuration files, Guido Trentalancia
[PATCH]: seobject.py must skip comments while reading external configuration files (was Re: [refpolicy] [PATCH]: clarify the file_contexts.subs_dist configuration file usage), Guido Trentalancia
check_seapp script,
William Roberts
overriding booleans,
William Roberts
[PATCH] per device seapp_context support,
William Roberts
SE Android: Recent changes, Stephen Smalley
Support for device specific seapp_context additions,
William Roberts
SEAndroid policy question,
William Roberts
I think we need to quiet SELinux in log files on setattr., Daniel J Walsh
system_app should be signed platform,
William Roberts
Possible bug in finding default context?,
Ole Kliemann
A filename to label translation daemon,
Eric Paris
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]