Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
/etc/selinux/$P/users/local.users and system.users are they deprecated?,
Sam Gandhi
[GIT PULL] SELinux: for 3.0, Eric Paris
Updated libselinux man pages, Richard Haines
SELinux Common Intermediate Language Update,
Steve Lawrence
I wrote up an semanage bash command completion script., Daniel J Walsh
This is a patch to allow libsemanage to handle an alternate root., Daniel J Walsh
Why user/type/role identifiers duplicated to a block/decl's symtab?,
HarryCiao
Is there way to set some specific domain to have all permissions?,
Sam Gandhi
Can we eliminate or optimize nodups_specs within libselinux,
Daniel J Walsh
[v2 PATCH 6/6] Support adding one role attribute into another,
Harry Ciao
v1 Add role attribute support to libsepol,
Harry Ciao
Regarding SELinux User mapping,
c.r.madhusudhanan@xxxxxxxxx
v0 Add role attribute support to libsepol,
Harry Ciao
[PATCH] cgroupfs: use init_cred when populating new cgroupfs mount,
Eric Paris
mounting cgroupfs causes directory search before sb initialization,
Eric Paris
SELinux: Fix arguments when expanding user_datum_t.roles,
Harry Ciao
Is it possible to assign different labels to symbolic links and actual files?,
Sam Gandhi
[v0 PATCH 0/2] Review request for reorganizing the role transition rule,
rongqing.li
[git] pull selinux tree for 2.6.40,
Eric Paris
[v0 PATCH 0/1] Review request for skipping file_name_trans_write() when policy downgraded,
rongqing.li
selinux_inode_init_security() initialises XATTR_SELINUX_SUFFIX and not XATTR_NAME_SELINUX?,
Sam Gandhi
FUSE and SELinux labeling,
Sam Gandhi
[GIT PULL] selinux tree for linus, Eric Paris
A few questions about module compile/link source code,
HarryCiao
[2/2] libselinux: fix case of names with whitespace/multibytes on /selinux/create,
Kohei Kaigai
[1/2] selinux: fix case of names with whitespace/multibytes on /selinux/create, Kohei Kaigai
[PATCH] SELinux: Fix an RCU dereference warning in selinux_setprocattr(), David Howells
[PATCH v2]: setfiles should provide an option to avoid abortion on a missing file, Guido Trentalancia
[PATCH 2/2 v2]: improve the manual page for setfiles, Guido Trentalancia
[PATCH 1/2 v2]: clean-up setfiles source code and document two options, Guido Trentalancia
[PATCH 0/2 v2]: minor improvements and clean-ups for policycoreutils/setfiles, Guido Trentalancia
[PATCH v2] policycoreutils: alternative configuration file support for sestatus,
Guido Trentalancia
Patch Review Process,
Steve Lawrence
libselinux mountpoint changing patch.,
Daniel J Walsh
This is the current libsepol-patch after the update.,
Daniel J Walsh
I believe you will need this patch also to build reference policy.,
Daniel J Walsh
[GIT PULL REQUEST] selinux tree for linus, Eric Paris
Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs,
Stephen Smalley
xattr support in cgroupfs,
Matthew Ife
[RFC][PATCH 0/4] eCryptfs credentials patches,
Roberto Sassu
[PATCH] SELinux: introduce path_has_perm, Eric Paris
[PATCH -v2] flex_arrays: allow zero length flex arrays,
Eric Paris
[PATCH] SELinux: pass last path component in may_create, Eric Paris
[PATCH] policy module for atop,
Elia Pinto
[PATCH] Delete redundant role system_r assignments after init_daemon_domain, Elia Pinto
Is there difference betweek sefiles and restorecon in terms of labels,
Sam Gandhi
[PATCH] fix description of init_system_domain in init.if,
Elia Pinto
[RFC][PATCH 0/7] File descriptor labeling,
Roberto Sassu
- [RFC][PATCH 6/7] security: new LSM hook security_file_getsecid(), Roberto Sassu
- [RFC][PATCH 3/7] smack: assign the label set in file->f_cred to new file descriptors, Roberto Sassu
- [RFC][PATCH 5/7] smack: import the security label in smack_secctx_to_secid(), Roberto Sassu
- [RFC][PATCH 2/7] selinux: label new file descriptors using file->f_cred, Roberto Sassu
- [RFC][PATCH 4/7] smack: fix label check in smack_kernel_act_as(), Roberto Sassu
- [RFC][PATCH 1/7] fs: initialize file->f_cred with credentials provided, Roberto Sassu
- [RFC][PATCH 7/7] ima: added new LSM conditions in the policy, Roberto Sassu
- Re: [RFC][PATCH 0/7] File descriptor labeling, Casey Schaufler
- Re: [RFC][PATCH 0/7] File descriptor labeling, Casey Schaufler
- <Possible follow-ups>
- Re: [RFC][PATCH 0/7] File descriptor labeling, Roberto Sassu
[PATCH 1/6] SELinux: fix comment to state filename_compute_type takes an objname not a qstr,
Eric Paris
[PATCH 1/3] flex_array: flex_array_prealloc takes a number of elements, not an end,
Eric Paris
Message not available
[PATCH] SELINUX: Make selinux cache VFS RCU walks safe, Eric Paris
Re: Help with toolchain, Joshua Brindle
[PATCH 0/9] Open loaders and interpreters with new creds during exec,
David Howells
- [PATCH 2/9] TOMOYO: Derive the new domain for an exec'd process in tomoyo_bprm_set_creds(), David Howells
- [PATCH 7/9] LSM: Allow an LSM to indicate that it wants bprm->file reopening with new creds, David Howells
- [PATCH 6/9] LSM: Pass linux_binprm pointer to kernel_read() so creds are available, David Howells
- [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available, David Howells
- [PATCH 9/9] LSM: Use derived creds for accessing an executable's interpreter and binary loader, David Howells
- [PATCH 1/9] TOMOYO: Fix tomoyo_dentry_open() to use the right creds, David Howells
- [PATCH 5/9] LSM: Install the new credentials earlier in the exec procedure, David Howells
- [PATCH 4/9] LSM: Make the linux_binfmt creds pointer const and pass creds to bprm_set_creds, David Howells
- [PATCH 3/9] LSM: Permit commit_creds() to take a const pointer, David Howells
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, Stephen Smalley
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, Casey Schaufler
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, David Howells
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, David Howells
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, David Howells
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, David Howells
- Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec, David Howells
Re: suspicious rcu_dereference_check in security/selinux/netnode.c,
Eric Paris
[PATCH 1/2] SELinux: silence build warning when !CONFIG_BUG,
Eric Paris
[PATCH 1/1] selabel_open fix processing of substitution files (update), Richard Haines
[PATCH] selinux: revise /selinux/create to handle whitespace/multibytes correctly,
Kohei KaiGai
Writing SEPostGreSQL Database Policies,
David Quigley
Generating policy for embedded platforms.,
Sam Gandhi
[PATCH] libsepol: support policy modules when roletrans rules not supported,
Eric Paris
[PATCH 1/2] libsepol: add support for filenametrans rule,
Eric Paris
[PATCH 1/1] mcstransd select correct colour range.,
Richard Haines
[PATCH 1/1] Add libselinux man pages for colour functions,
Richard Haines
SELinux mixed/virtualisation policy,
Ramon de Carvalho Valle
Re: [Rhel6-cc-external-list] Processes executing as qemu_t SELinux type are not allowed to access vhost_device_t, Daniel J Walsh
[PATCH] Permit fixfiles to skip configurable directory from relabelling,
Elia Pinto
SELinux: Initialize process_class earlier,
Harry Ciao
This patch causes the mount points created in load_policy to have a proper name,
Daniel J Walsh
This patch adds a new subs_dist file.,
Daniel J Walsh
This patch cleans up a couple of crashes caused by libselinux,
Daniel J Walsh
Minor query on selabel_x(5) man page, Richard Haines
[ANN] Linux Security Summit 2011 - Announcement and CFP,
James Morris
Named TYPE_TRANSITION and userspace AVC,
Kohei KaiGai
fwknop, fwknopd, fwknop_serv,
Bill Chimiak
[PATCH] libselinux: fix a noise in manpage, Kohei Kaigai
[PATCH] libselinux: add security_compute_create_name() API, Kohei Kaigai
[PATCH] selinux: add type_transition with name extension support for selinuxfs,
Kohei Kaigai
How to make restorecon/matchpathcon recognize role_transition rule for non-process classes?,
HarryCiao
[PATCH 1/1] mapping fix for invalid class/perms after selinux_set_mapping call, Richard Haines
[PATCH] libsepol: add support for filenametrans rules, Eric Paris
[PATCH] checkpolicy: add support for using last path component in type transition rules,
Eric Paris
[PATCH] checkpolicy: use #define for dismod selections,
Eric Paris
v2 Add class support to the role_transition rule,
Harry Ciao
v1 Add class support to the role_transition rule,
Harry Ciao
v0 Add class support to the role_transition rule,
Harry Ciao
SELinux: avc_has_perm: unexpected error 22,
Justin P. Mattock
[PATCH] policycoreutils: alternative configuration file support for sestatus, Guido Trentalancia
[PATCH 1/1] selabel_open fix for processing the substitution file, Richard Haines
about ss,
Yao
SE Linux use - was: Question: and the policy grows...,
Russell Coker
I have been asked for a use case that says I want to allow X domain to only be able to use eth1.,
Daniel J Walsh
[PATCH] selinux: select correct default LSM_MMAP_MIN_ADDR on ARM.,
Paul Gortmaker
[v2] [SELinux] Discussions about rbacsep,
Harry Ciao
Discussions about rbacsep,
Harry Ciao
libselinux version bump past 99,
Eamon Walsh
Flask Policy Parser (FPP) support to convert Refpolicy to CIL, James Carter
[GIT PULL] selinux for 2.6.39,
Eric Paris
Re: [SELinux] Wildcard for object classes?,
Russell Coker
Rules.modular:154: *** No enabled modules! modules.conf may need to be generated by using "make conf". Stop.,
Jingkang Zhou
Need Help Compiling Reference Policy on Mobile Device,
waqar afridi
Sorry about cross posting to multiple lists., Daniel J Walsh
[v2 PATCH 1/3] SELinux: Auto-generate security_is_socket_class,
Harry Ciao
[v2 PATCH 2/3] SELinux: Socket retains creator role and MLS attribute,
Harry Ciao
[PATCH 1/2] LSM: Pass -o remount options to the LSM,
Eric Paris
Separate socket SID than its creator,
HarryCiao
RIP: 0010:[<ffffffff811bdec1>] [<ffffffff811bdec1>] avc_audit_post_callback+0xc6/0xfe,
Justin Mattock
adobe on FC 14,
Bill Chimiak
Separate type for AF_UNIX socket created by syslogd_t,
HarryCiao
Re: [PATCH 4/4] selinux: xfrm - notify users on dropped packets,
Paul Moore
type_datum changed from define_type() and type_write() ?,
HarryCiao
Need Help with Booleans,
waqar afridi
[PATCH] Revert "selinux: simplify ioctl checking",
Eric Paris
[PATCH] selinux: drop unused packet flow permissions,
Eric Paris
I want to add the following to mcs constraints in SELinux policy,
Daniel J Walsh
SELinux MLS and Virtual Machines,
Qwyjibo Jones
[PATCH]: setfiles should provide an option to avoid abortion on a missing file, Guido Trentalancia
[PATCH 2/2]: improve the manual page for setfiles, Guido Trentalancia
[PATCH 1/2]: clean-up setfiles source code and document two options, Guido Trentalancia
[PATCH 0/2]: minor improvements and clean-ups for policycoreutils/setfiles, Guido Trentalancia
inode security state and cluster file systems,
Yuri L Volobuev
Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets, James Morris
Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case,
Paul Moore
[Fwd: Re: [PATCH 09/10] selinux: xfrm - notify users on dropped packets], Paul Moore
Re: [PATCH 08/10] selinux: Fix handling of kernel generated packets on labeled IPsec,
Paul Moore
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]