Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH 1/1] appdomain r/w apk_tmp_file and shell_data_file on android_cts enabled,
Haiqing Jiang
- [PATCH 1/1] mediaserver and system require abstract socket connnection, Haiqing Jiang
- [PATCH] You can now specify a sebool= flag in seapp_contexts,
William Roberts
- [PATCH 1/1] installd unlink platform_app_data_file,
Haiqing Jiang
- [PATCH 1/1] allocate perms to platformappdomain over system_data_file,
Haiqing Jiang
- [PATCH 1/1] Platform app domain sdcard accesses,
Haiqing Jiang
- Issue with setting booleans in SEManager app,
Michal Mašek
- Questions about the MLS to "read down",
Haiqing Jiang
- Could we set them as "mlstrustedsubject"?,
Haiqing Jiang
- [PATCH] Support for sebool in seapp_contexts,
William Roberts
- Re: [PATCH] Support for sebool in seapp_contexts, Stephen Smalley
kernel/omap,
William Roberts
external/libselinux,
William Roberts
[PATCH: system/core 4.0.4] Fix an init segfault.,
Nogin, Aleksey
kernel/omap seandroid-tuna-3.0,
William Roberts
What is the reason for the denial?,
Haiqing Jiang
SE Android: bitbucket repo created,
Stephen Smalley
[no subject],
Haiqing Jiang
[no subject],
Haiqing Jiang
I have modified the policy for installd over app_data_file,
Haiqing Jiang
Writing policy: default_contexts etc., Ole Kliemann
[PATCH]: document the "-f" option in the setfiles' manual page, Guido Trentalancia
[PATCH]: allow setfiles to continue on errors (new option),
Guido Trentalancia
[PATCH]: fix symbolic links creation to the shared libraries, Guido Trentalancia
[PATCH] Fix broken peer recv check,
Chad Hanson
San Diego: libvirt/LXC/systemd/SELinux Integration Hackfest,
Daniel J Walsh
Is the CIL project still active,
Richard Haines
frameworks/base out of date, needs merge with upstream,
William Roberts
kernel/omap seandroid-omap-tuna-3.0,
William Roberts
packages/apps/settings master string localization, William Roberts
[PATCH 3/6] external/sepolicy: mediaserver talk to rild via socket,
Haiqing Jiang
[PATCH 2/6] external/sepolicy: mediaserver open application data files,
Haiqing Jiang
updates from Haiqing Jiang on Jul. 19, Haiqing Jiang
[PATCH 5/6] external/sepolicy: allow media_app read to application data files,
Haiqing Jiang
[PATCH 1/6] external/sepolicy: allow media_app more permissions on sdcard,
Haiqing Jiang
[PATCH 4/6] external/sepolicy: system talk to rild via socket,
Haiqing Jiang
[PATCH 6/6] external/sepolicy: android_cts test denials,
Haiqing Jiang
three patches to external/sepolicy,
Haiqing Jiang
Re: [PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qta, Haiqing Jiang
Re: [PATCH 1/1] add sepolicy.genfs_contexts file for device-specific labels,
Stephen Smalley
Re: [PATCH 1/1] GPS chip requires uart rts level control, Stephen Smalley
[PATCH 1/1] Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.,
hqjiang
[PATCH] allow camera calibration,
hqjiang
[PATCH 1/1] We make two changes: 1. GPS-chip-requires-uart-rts-level-control; 2. We label our specific context to misc/camera(./*) in order to allow camera calibration.,
hqjiang
seapp_contexts boolean support,
William Roberts
[PATCH] Initial support for translatable SEAndroid strings,
William Roberts
Change-Id: I61d34a9fd6975f23023f70f205a510e3357d843c,
William Roberts
Information about XSELinux,
Ole Kliemann
SE Android on provider with custom firmware, Kurt Ellzey
[PATCH 1/1] Android build project: Fix 'mkyaffs2image -f ...' selabel_lookup error,
Richard Haines
The criteria for seandroid policies,
Haiqing Jiang
SEAndroid and OpenSSL/ECC support, Gia T. Nguyen
Add two device-specific labelings to target CSR GPS Chips.,
hqjiang
build failure for SE Android 4.1.1_r1,
Radzykewycz, T (Radzy)
dalvik2 libcore2, William Roberts
Local manifests, William Roberts
[PATCH] libcore2 and dalvik2 in local_manifest.xml, William Roberts
[PATCH] local_manifest.xml for 4.1.1 branch has dalvik instead of dalvik2, William Roberts
[PATCH] Support for ocontexts per device.,
William Roberts
Patches to target denies of GpsLocationProvider and media_app over mtp_device,
hqjiang
The order of policies in file "seapp_context",
Haiqing Jiang
SE Android: 4.1/JB merged, 4.1.1 branch created,
Stephen Smalley
[PATCH] correct denies of inter system processes communication over named pipe,
hqjiang
seandroid and policy version,
Joshua Brindle
Adding support for ro.build.selinux to Android.os.SELinux,
William Roberts
external/strace build breakage,
William Roberts
Patches to target denies of LocationManager (GPS).,
hqjiang
Fwd: [PATCH] Add build property ro.build.selinux when building,
William Roberts
Re: Anon_inodefs denials in SEAndroid with genlock,
Stephen Smalley
SEAndroid: Labels of files in /data/data/APPDIR/lib directory,
Michal Mašek
SEAndroid Licensing?,
Gunnar Hellekson
Installing SEAndroid on Mac OS X Lion (10.7.4), Hsieh, George
[PATCH 1/2] SELinux: include definition of new capabilities,
Eric Paris
[PATCH 0/3] Patches from the Debian policycoreutils package,
Laurent Bigonville
[PATCH 1/1] dix: Check whether grab allowed by security provider, Richard Haines
[V3] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults, Richard Haines
[RFC PATCH v2 1/2] selinux: cleanup the security_node_sid() function,
Paul Moore
Re: [RFC PATCH v1 2/2] selinux: redefine a port definition to include the IP address,
Eric Paris
Is it time to move seandroid policy messages off of the selinux lists and onto there own list?,
Daniel J Walsh
Re: Welcome to selinux,
Alexandra Test
setools FTBFS in python module,
Laurent Bigonville
SE Android: Install-time MAC update, possible merge to seandroid,
Stephen Smalley
strange labelling error,
Russell Coker
SE Android Galaxy Nexus recovery image,
William Roberts
Patch for rild denial,
William Roberts
Patch for mmac denials,
William Roberts
samsung galaxy nexus,
Alexandra Test
[PATCH] hiding SELinux status on Settings app if HAVE_SELINUX:=false,
William Roberts
Denials of changing wallpaper on Galaxy Nexus,
ken.masumitsu
[PATCH] SE Android local manifest patch dalvik and lobcore,
William Roberts
AOSP commit 0cd29e3a3268f99ef0cb72a51782a35f407de1ae to manifests cause failure,
William Roberts
AOSP patches,
William Roberts
libsepol segmentation fault on policy load (role expansion), Guido Trentalancia
[PATCH external/sepolicy] Add selinux network script to policy,
jbrindle
[PATCH] ion fix,
William Roberts
SE Android patch -- Fix for bug on factory labeling,
William Roberts
KDE and SE Linux,
Russell Coker
[PATCH external/sepolicy] Add iptables script to policy,
Joshua Brindle
[PATCH]: relabel all mount runtime files in the restorecond example config, Guido Trentalancia
[v2] [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults, Richard Haines
SE Android: Middleware MAC updates, rpcraig
[PATCH 1/2] libsepol: Move context_copy() after switch block in ocontext_copy_*().,
Chris PeBenito
[PATCH 0/2] libsepol: fix segfault for missing initial sid context, Christopher J. PeBenito
Subject: [PATCH 1/1] XSELinux: When SELinux is enabled the xserver seg faults,
Richard Haines
How to use the refpolicy in a embedded linux system?, casinee app
Boolean change of names.,
Daniel J Walsh
Patches for maguro denials,
William Roberts
[PATCH 1/1] libsepol: Add always_check_network policy capability, Chris PeBenito
[PATCH 1/2] Add SELinux policy capability for always checking packet class.,
Chris PeBenito
[PATCH 1/3] SELinux: require open policycap in truncate checks,
Eric Paris
"operation not support" when execute #restorecon -R /,
casinee app
[PATCH]: allow standard compilation of GIT development tree (was Re: [PATCH]: do not link static libraries from the system library directory),
Guido Trentalancia
SE Android: Middleware MAC, Stephen Smalley
[PATCH]: do not link static libraries from the system library directory,
Guido Trentalancia
[PATCH 52/90] policycoreutils: polgen: FIXME Add mgrepl patch to, Daniel J Walsh
[PATCH 53/90] FIXME NO IDEA!!!, Daniel J Walsh
[PATCH 42/90] policycoreutils: FIXME add .tx to gitignore, Daniel J Walsh
[PATCH 25/90] libselinux: Fix bug in hidden_def FIXME, Daniel J Walsh
[PATCH 74/90] Po files updated from transifex, Daniel J Walsh
[PATCH 58/90] Add -N, Daniel J Walsh
[PATCH 17/90] libselinux: avc_netlink_recieve handle EINTR FIXME, Daniel J Walsh
[PATCH 24/90] policycoreutils: audit2allow: sepolgen-ifgen: use, Daniel J Walsh
[PATCH 14/90] policycoreutils: setfiles: If you are not changing any, Daniel J Walsh
[PATCH 76/90] Sven Vermeulen patch for python3.2 support., Daniel J Walsh
[PATCH 63/90] Fix sort selinux types of user controls, Daniel J Walsh
[PATCH 81/90] Optimize expand_filename_trans() function, Daniel J Walsh
[PATCH 88/90] libselinux: libsemanage: more ruby python so file, Daniel J Walsh
[PATCH 16/90] policycoreutils: mcstransd: write a pid file FIXME, Daniel J Walsh
[PATCH 11/90] policycoreutils: FIXME Change restorecon to just, Daniel J Walsh
[PATCH 08/90] policycoreutils: newrole: FIXME do not drop, Daniel J Walsh
[PATCH 06/90] policycoreutils: setfiles: FIXME Allow, Daniel J Walsh
[PATCH 05/90] libselinux: FIXME Allow SELinux labelling to support, Daniel J Walsh
[PATCH 04/90] policycoreutils: run_init: FIXME If open_init_pty is, Daniel J Walsh
[PATCH 86/90] Android/MacOS X build support, Daniel J Walsh
[PATCH 54/90] fcontext customized was not returning the customized, Daniel J Walsh
[PATCH 89/90] libselinux: libsemanage: do not set soname needlessly, Daniel J Walsh
[PATCH 29/90] policycoreutils: setfiles: Fix process_glob error, Daniel J Walsh
[PATCH 12/90] policycoreutils: restorecond: wrong options should, Daniel J Walsh
[PATCH 69/90] Fix boolean handling of = when setting multiple, Daniel J Walsh
[PATCH 85/90] Android/MacOS X build support, Daniel J Walsh
[PATCH 28/90] policycoreutils: Make restorecon return 0 when a file, Daniel J Walsh
[PATCH 31/90] policycoreutils: semanage: only allow enable/disable, Daniel J Walsh
[PATCH 35/90] libselinux: boolean name equivalency, Daniel J Walsh
[PATCH 64/90] Fix semanage dontaudit off to work correctly, Daniel J Walsh
[PATCH 33/90] libsemanage: Use default semanage.conf as a fallback, Daniel J Walsh
[PATCH 51/90] policycoreutils: semanage: manpage update for -e, Daniel J Walsh
[PATCH 59/90] Fix template to place ', Daniel J Walsh
[PATCH 30/90] policycoreutils: mcstrans: add -f to run in foreground, Daniel J Walsh
[PATCH 15/90] policycoreutils: load_policy: do not force link file, Daniel J Walsh
[PATCH 87/90] libselinux: additional makefile support for rubywrap, Daniel J Walsh
[PATCH 80/90] Add lnk_file handling to te_rules, Daniel J Walsh
[PATCH 26/90] policycoreutils: Disable user restorecond by default, Daniel J Walsh
[PATCH 77/90] Allow matchpathcon to use multiple prefixes and test, Daniel J Walsh
[PATCH 73/90] realpath_not_final was returning '//NAME' if /NAME was, Daniel J Walsh
[PATCH 47/90] libselinux: libsemanage: remove build warning when, Daniel J Walsh
[PATCH 68/90] Fix missing error function and change to not use =, Daniel J Walsh
[PATCH 84/90] libselinux: label_android_property whitespace cleanups, Daniel J Walsh
[PATCH 32/90] policycoreutils: semanage: bash completion for modules, Daniel J Walsh
[PATCH 60/90] Add support for not loading the kernel with semanage, Daniel J Walsh
[PATCH 50/90] policycoreutils: Add Makefiles to support new gui code, Daniel J Walsh
[PATCH 49/90] libselinux: Add support for lxc_contexts_path, Daniel J Walsh
[PATCH 72/90] Fortify source now requires all code to be compiled, Daniel J Walsh
[PATCH 75/90] Fixfiles needs to tell restorecon to ignore missing, Daniel J Walsh
[PATCH 83/90] libselinux: New Android property labeling backend, Daniel J Walsh
[PATCH 57/90] add some definition to the standard types available, Daniel J Walsh
[PATCH 66/90] Add rules to all streams to be stored in /tmp and, Daniel J Walsh
[PATCH 67/90] sepolgen should follow symlinks and get the real path, Daniel J Walsh
[PATCH 82/90] Optimize expand_filename_trans() function, Daniel J Walsh
[PATCH 71/90] asprintf return code must be checked, Daniel J Walsh
[PATCH 41/90] policycap for ptrace_child, Daniel J Walsh
[PATCH 70/90] Fix restorecon to return errors when bad paths are, Daniel J Walsh
[PATCH 48/90] policycoreutils: po: silence build process, Daniel J Walsh
[PATCH 79/90] Cleanup templates, Daniel J Walsh
[PATCH 78/90] Fix seusers potential crash. Change getdefaultcon to, Daniel J Walsh
[PATCH 46/90] libselinux: audit2why: silence -Wmissing-prototypes, Daniel J Walsh
[PATCH 45/90] Update translations, Daniel J Walsh
[PATCH 36/90] checkpolicy: sepolgen: We need to support files that, Daniel J Walsh
[PATCH 13/90] policycoreutils: scripts: Don't syslog setfiles, Daniel J Walsh
SE Android Maguro denials,
William Roberts
SE Android patch for internal fuse sdcard policy,
William Roberts
setools python bindings are blowing up in Fedora 18 with latest compiler flags., Daniel J Walsh
[PATCH 1/1] Add SELinux policy capability for always checking packet class.,
Chris PeBenito
[PATCH 1/1] libsepol: Add always_check_packets policy capability, Chris PeBenito
Where to go for advice on local policy secuirity implications,
James B. Byrne
[PATCH] Two optimizations for libsepol, Adam Tkac
Show SELinux packet type of packets,
Jason Axelson
Update patches for hci_attach service in SE Android,
William Roberts
Patch for bcrm_patchram_plus [DRAFT], William Roberts
sepolgen requires unofficial setools patch,
Sven Vermeulen
local_mainfest.xml,
William Roberts
Re: Tuna policy files,
Stephen Smalley
fail to get seandroid code,
ken.masumitsu
Re: [RFC PATCH] selinux: fix a RCU dereference in sel_netnode_insert(), Paul E. McKenney
Re: [selinux-testsuite][PATCH] test_file: fix policy to allow building with relro, Serge E. Hallyn
Trying to support Python 3 but fails on libsemanage,
Sven Vermeulen
Assertion failed in checkmodule,
Laurent Bigonville
labeled NFS,
zyxel
Re: [PATCH 02/12] selinux: tag avc cache alloc as non-critical, Casey Schaufler
execute system-config-selinux while enforcing,
Andy Warner
RFC: packet checks always on option,
Christopher J. PeBenito
Mounting /sys within libselinux?, Sven Vermeulen
regression test of security policy,
Kohei KaiGai
Can't login the embedded linux with seliux support,
casinee app
an't login, casinee app
generate the policy for embedded device by seedit-cross,
casinee app
Re: compile the libselinux for embedded device,
Daniel J Walsh
Re: Success - SEAndroid on Galaxy Nexus maguro,
Stephen Smalley
[PATCH 49/49] libsepol: allocate enough space to hold filename in, Daniel J Walsh
[PATCH] SELinux: remove all unneeded AVC callback code, Eric Paris
Any SELinux policy development/analysis training workshops?,
Jason Axelson
[UPDATED] Patch for SE Android Manager AVC logging feature,
William Roberts
libselinux: Provide new labeling backend,
rpcraig
Re: [PATCH] Add security.selinux XATTR support for the UBIFS. Also fix couple of bugs in UBIFS extended attribute length calculation.,
Casey Schaufler
upcoming patch bomb!, Eric Paris
Fwd: [nfsv4] Last call for "Requirements for Labeled NFS" - ends on April 27th,
David Quigley
Re: [selinux-testsuite][PATCH] make the RHEL4,5-only testcases exceptions obvious, Serge E. Hallyn
[PATCH 1/1] XSELinux: Fix initialisation of polyinstantiated properties and selections, Richard Haines
DexOpt freezes on SettingsProvider.apk@xxxxxxxxxxx,
michael
[PATCH] libsepol: introduce new policy capability ptrace_child, Eric Paris
[PATCH] SELinux: apply a different permission to ptrace a child vs non-child,
Eric Paris
Adding a booleans.subs file to selinux policy.,
Daniel J Walsh
Re: Requesting for materials regarding "SE Android",
Stephen Smalley
libsemanage test failure on several architectures, Laurent Bigonville
User Mode Linux, Bill Chimiak
Android ashmem driver update, Radzykewycz, T (Radzy)
[PATCH 44/73] policycoreutils: mcstrans: creating a pid file, Daniel J Walsh
[PATCH 28/73] libselinux: utils: Enable many more gcc warnings for, Daniel J Walsh
[PATCH 29/73] libselinux: Change annotation on include/selinux/avc.h, Daniel J Walsh
[PATCH 43/73] libselinux: avc_netlink_recieve handle EINTR FIXME,
Daniel J Walsh
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]