Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH 59/77] policycoreutils: sandbox: seunshare: introduce helper, Daniel J Walsh
- [PATCH 57/77] policycoreutils: sandbox: add -C option to not drop, Daniel J Walsh
- [PATCH 56/77] policycoreutils: sandbox: split seunshare caps, Daniel J Walsh
- [PATCH 54/77] policycoreutils: sandbox: use dbus-launch, Daniel J Walsh
- [PATCH 53/77] policycoreutils: sandbox: numerous simple updates to, Daniel J Walsh
- [PATCH 51/77] policycoreutils: sandbox: Makefile: new man pages, Daniel J Walsh
- [PATCH 44/77] policycoreutils: sandbox: whitespace fix, Daniel J Walsh
- [PATCH 52/77] policycoreutils: sandbox: do not require selinux, Daniel J Walsh
- [PATCH 43/77] policycoreutils: semodule_package: Add, Daniel J Walsh
- [PATCH 48/77] policycoreutils: sandbox: check for paths up front, Daniel J Walsh
- [PATCH 49/77] policycoreutils: sandbox: allow users specify sandbox, Daniel J Walsh
- [PATCH 45/77] policycoreutils: sandbox: move seunshare globals to, Daniel J Walsh
- [PATCH 42/77] policycoreutils: restorecon: Always check return code, Daniel J Walsh
- [PATCH 50/77] policycoreutils: sandbox: rename dir to srcdir, Daniel J Walsh
- [PATCH 47/77] policycoreutils: sandbox: use defined values for paths, Daniel J Walsh
- [PATCH 24/77] policycoreutils: setfiles: get rid of some stupid, Daniel J Walsh
- [PATCH 22/77] policycoreutils: setfiles: move, Daniel J Walsh
- [PATCH 17/77] global: Makefile: create global 'all' target, Daniel J Walsh
- [PATCH 09/77] checkpolicy: fix spacing in output message, Daniel J Walsh
- [PATCH 03/77] libselinux: selinux_file_context_verify function, Daniel J Walsh
- [PATCH 02/77] libselinux: move realpath helper to matchpathcon, Daniel J Walsh
- [PATCH 06/77] libsemanage: python wrapper makefile changes, Daniel J Walsh
- [PATCH 01/77] libselinux: python wrapper makefile changes, Daniel J Walsh
- We have an interesting problem with pam_namespace on mls boxes, Daniel J Walsh
- [refpolicy] My patchset to test "Separating tunables from booleans",
HarryCiao
- v0 Separate tunables from booleans,
Harry Ciao
- SELinux+IPTables+Non SELINUX Aware Network Daemon,
GProcunier
- install,
Russell Coker
- load_policy memory error,
Russell Coker
- su vs runuser,
Ted Toth
- RHEL5, selinux-policy-2.4.6.30-el5, and pidof AVC issue,
rarob
- inclusion of selinux.h in cred.h,
Casey Schaufler
- v2 Skip role attributes for policy.X and downgraded pp,
Harry Ciao
- v1 Skip role attributes for policy.X,
Harry Ciao
- v0 Skip role attributes for policy.X,
Harry Ciao
- [PATCH 69/96] policycoreutils: semodule_package: Add, Daniel J Walsh
- [PATCH 61/96] policycoreutils: run_init: clarification of the usage, Daniel J Walsh
- [PATCH 60/96] policycoreutils: semanage: fix usage header around, Daniel J Walsh
- [PATCH 57/96] policycoreutils: semanage: remove useless empty lines, Daniel J Walsh
- [PATCH 55/96] policycoreutils: semanage: add -e to fcontext usage, Daniel J Walsh
- [PATCH 54/96] policycoreutils: semanage: update man page with new, Daniel J Walsh
- [PATCH 53/96] policycoreutils: semanage: update usage text, Daniel J Walsh
- [PATCH 52/96] policycoreutils: semanage: introduce file context, Daniel J Walsh
- [PATCH 51/96] policycoreutils: semanage: enable and disable modules, Daniel J Walsh
- [PATCH 50/96] policycoreutils: semanage: output all local, Daniel J Walsh
- [PATCH 49/96] policycoreutils: semanage: introduce extraction of, Daniel J Walsh
- [PATCH 47/96] policycoreutils: semanage: cleanup error on invalid, Daniel J Walsh
- [PATCH 45/96] policycoreutils: semanage: handle being called with no, Daniel J Walsh
- [PATCH 43/96] policycoreutils: semanage: return sooner to save CPU, Daniel J Walsh
- [PATCH 42/96] policycoreutils: semanage: surround getopt with, Daniel J Walsh
- [PATCH 41/96] policycoreutils: semanage: use define/raise instead of, Daniel J Walsh
- [PATCH 40/96] policycoreutils: semanage: some options are only valid, Daniel J Walsh
- [PATCH 39/96] policycoreutils: semanage: introduce better deleteall, Daniel J Walsh
- [PATCH 35/96] policycoreutils: semanage: do not allow spaces in file, Daniel J Walsh
- [PATCH 33/96] policycoreutils: semanage: distinguish between builtin, Daniel J Walsh
- [PATCH 32/96] policycoreutils: semanage: centralized ip node, Daniel J Walsh
- [PATCH 30/96] policycoreutils: setfiles: make the restore function, Daniel J Walsh
- [PATCH 28/96] policycoreutils: setfiles: use glob to handle ~ and ., Daniel J Walsh
- [PATCH 25/96] policycoreutils: fixfiles: do not hard code types, Daniel J Walsh
- [PATCH 23/96] policycoreutils: fixfiles: stop trying to be smart, Daniel J Walsh
- [PATCH 22/96] policycoreutils: fixfiles: use new kernel seclabel, Daniel J Walsh
- [PATCH 21/96] policycoreutils: fixfiles: pipe everything to cat, Daniel J Walsh
- [PATCH 20/96] policycoreutils: fixfiles: introduce, Daniel J Walsh
- [PATCH 19/96] policycoreutils: semodule: support for alternative, Daniel J Walsh
- [PATCH 15/96] libsemanage: print error debug info for buggy fc files, Daniel J Walsh
- [PATCH 12/96] libsemanage: introduce semanage_set_root and friends, Daniel J Walsh
- [PATCH 11/96] libsemanage: throw exceptions in python rather than, Daniel J Walsh
- [PATCH 10/96] libsemanage: python3 support., Daniel J Walsh
- [PATCH 09/96] libsemanage: patch for MCS/MLS in user files, Daniel J Walsh
- [PATCH 07/96] libselinux: mapping fix for invalid class/perms after, Daniel J Walsh
- [PATCH 06/96] libselinux: audit2why: work around python bug not, Daniel J Walsh
- [PATCH 04/96] libselinux: resolv symlinks and dot directories before, Daniel J Walsh
- [PATCH 02/96] checkpolicy: add missing ; to attribute_role_def, Daniel J Walsh
- [PATCH 01/96] checkpolicy: Redo filename/filesystem syntax to, Daniel J Walsh
- [v2 PATCH 0/6] Export the sock's security context to proc,
rongqing.li
[PATCH 0/5] Export the sock's security context to proc,
rongqing.li
Re: checkpolicy is broken (which is not),
Harry Ciao
SELinux policy regarding LD_LIBRARY_PATH,
Aaron Sowry
[PATCH 090/155] policycoreutils: semanage: whitespace changes in, Daniel J Walsh
[PATCH 087/155] policycoreutils: semanage: fix indention, Daniel J Walsh
[PATCH 088/155] policycoreutils: semanage: remove useless empty, Daniel J Walsh
[PATCH 080/155] libsepol: Only call role_fix_callback for, Daniel J Walsh
[PATCH 078/155] policycoreutils: semodule_package: fix man page typo, Daniel J Walsh
[PATCH 077/155] policycoreutils: semodule_expand: update man page, Daniel J Walsh
[PATCH 068/155] policycoreutils: semanage: handle os errors, Daniel J Walsh
[PATCH 067/155] policycoreutils: semanage: fix traceback with bad, Daniel J Walsh
[PATCH 063/155] policycoreutils: semanage: show usage on -h or, Daniel J Walsh
[PATCH 056/155] policycoreutils: semanage: introduce more deleteall, Daniel J Walsh
[PATCH 049/155] policycoreutils: semanage: verify ports < 65536, Daniel J Walsh
[PATCH 047/155] policycoreutils: transaction into semanageRecords, Daniel J Walsh
[PATCH 046/155] policycoreutils: make get_handle a method of, Daniel J Walsh
[PATCH 044/155] policycoreutils: remove a needless blank line, Daniel J Walsh
[PATCH 043/155] policycoreutils: make process_one error if not, Daniel J Walsh
[PATCH 037/155] policycoreutils: fixfiles: correct usage for, Daniel J Walsh
[PATCH 040/155] policycoreutils: setfiles: use glob to handle ~ and,
Daniel J Walsh
[PATCH 036/155] policycoreutils: put -p in help for restorecon and, Daniel J Walsh
[PATCH 033/155] policycoreutils: fixfiles stop trying to be smart, Daniel J Walsh
[PATCH 034/155] policycoreutils: fixfiles: do not try to only label, Daniel J Walsh
[PATCH 032/155] policycoreutils: fixfiles use new kernel seclabel,
Daniel J Walsh
[PATCH 029/155] policycoreutils: fixfiles clean up /var/run and,
Daniel J Walsh
[PATCH 028/155] policycoreutils: fixfiles delete tmp sockets and, Daniel J Walsh
[PATCH 027/155] policycoreutils: fixfile use find -delete instead of, Daniel J Walsh
[PATCH 025/155] policycoreutils: chcat man page typo, Daniel J Walsh
[PATCH 024/155] policycoreutils: add man page for genhomedircon, Daniel J Walsh
[PATCH 023/155] policycoreutils: setfiles fix typo, Daniel J Walsh
[PATCH 022/155] policycoreutils: setsebool should inform users they, Daniel J Walsh
[PATCH 021/155] policycoreutils: setsebool typos, Daniel J Walsh
[PATCH 020/155] policycoreutils: open_init_tty man page typos, Daniel J Walsh
[PATCH 019/155] policycoreutils: Don't add user site directory to, Daniel J Walsh
[PATCH 018/155] policycoreutils: newrole retain CAP_SETPCAP, Daniel J Walsh
[PATCH 013/155] libsemanage: throw exceptions in python rather than, Daniel J Walsh
[PATCH 011/155] audit2allow: do not print statistics, Daniel J Walsh
[PATCH 010/155] libselinux: make python bindings for restorecon work, Daniel J Walsh
[PATCH 009/155] libselinux: fix python audit2why binding error, Daniel J Walsh
[PATCH 006/155] libselinux: do not check fcontext duplicates on use,
Daniel J Walsh
[PATCH 007/155] libselinux: support new python3 functions, Daniel J Walsh
[PATCH 153/155] Allow seunshare to run as root,
Daniel J Walsh
[PATCH 91/92] policycoreutils: sandbox: FIXME update sandbox,
Daniel J Walsh
[PATCH 46/92] policycoreutils: make ignore_enoent do something, Daniel J Walsh
[PATCH 14/92] libselinux: move .gitignore into utils, Daniel J Walsh
[PATCH 13/92] libselinux: new setexecon utility, Daniel J Walsh
[PATCH 12/92] libselinux: selabel_open fix processing of, Daniel J Walsh
[PATCH 10/92] libselinux mountpoint changing patch., Daniel J Walsh
[PATCH 09/92] checkmodule: Add note to checkmodule man page about, Daniel J Walsh
[PATCH 08/92] restorecond: first user logged in is not noticed, Daniel J Walsh
[PATCH 05/92] libselinux: simplify SRCS in Makefile, Daniel J Walsh
[PATCH 03/92] Repo: update .gitignore, Daniel J Walsh
[PATCH 02/92] checkpolicy: dispol: print role transition rules, Daniel J Walsh
v0 Only call role_fix_callback for base.p_roles during expansion,
Harry Ciao
[PATCH 0/2] Series short description,
Paul Moore
Howto transition socket,
Martin Christian
chown affecting type_transition?,
Ted Toth
Error in monolithic role attribute,
Christopher J. PeBenito
Fwd: How to extract file context patterns from selinux module,
Daniel J Walsh
ANN: SELinux Userspace Release,
Steve Lawrence
"netstat -Z" reimplementation,
Rongqing Li
Bumping Version Numbers,
Steve Lawrence
v4 Add role attribute support to libsepol,
Harry Ciao
apol and active modules,
Russell Coker
PythonSELinux binding problem,
rarob
[PATCH 16/93] semanage: update manpage to explain transactions, Daniel J Walsh
[PATCH 13/93] libsemanage: drop the -no-unused-parameter build flag, Daniel J Walsh
[PATCH 12/93] libsemanage: use -Werror, Daniel J Walsh
Incoming flood of updates to SELinux userspace,
Eric Paris
[PATCH 08/93] restorecond: Ignore IN_IGNORED inotify events, Daniel J Walsh
[PATCH 07/93] Rearranged audit2allow.1 to match the newer ways we, Daniel J Walsh
[PATCH 02/93] libsepol: store all filename transition rules when, Daniel J Walsh
[PATCH 03/93] checkpolicy: fix dispol/dismod display for filename, Daniel J Walsh
What is /selinux/null?,
Martin Orr
[PATCH] Further clarification of the usage of run_init in the manual page,
Guido Trentalancia
is "type poisoning" possible?,
Zoltan Arnold NAGY
subs_dist and libselinux releases,
Russell Coker
As we move to systemd, we are loosing some functionality from init scripts.,
Daniel J Walsh
mailing list: hypermail generated archive ends Thu 18 Feb 2010,
Paul Menzel
SELinux and CGI scripts,
Paul Menzel
Making new roles,
Julian Onions
context NFS mounts,
Russell Coker
MLS Not enforcing secadm and auditadm,
Kurt.Nelson
Best base policy to use,
Jeremiah Jahn
Sec context of unix domain sockets,
Martin Christian
htpasswd file outside of standard Apache location,
Paul Menzel
Linux kernel 2.6.32 from Debian Squeeze and Xen: SELinux seems to hang around 10 minutes during boot,
Paul Menzel
v3 Add role attribute support to libsepol,
Harry Ciao
login process unable to execute /bin/sh,
Sam Gandhi
Wrong context for user,
c.r.madhusudhanan@xxxxxxxxx
Missing configure script and instructions?,
David Doria
Re: Missing configure script and instructions?, Stephen Smalley
/etc/selinux/$P/users/local.users and system.users are they deprecated?,
Sam Gandhi
[GIT PULL] SELinux: for 3.0, Eric Paris
Updated libselinux man pages, Richard Haines
SELinux Common Intermediate Language Update,
Steve Lawrence
I wrote up an semanage bash command completion script., Daniel J Walsh
This is a patch to allow libsemanage to handle an alternate root., Daniel J Walsh
Why user/type/role identifiers duplicated to a block/decl's symtab?,
HarryCiao
Is there way to set some specific domain to have all permissions?,
Sam Gandhi
Can we eliminate or optimize nodups_specs within libselinux,
Daniel J Walsh
[v2 PATCH 6/6] Support adding one role attribute into another,
Harry Ciao
v1 Add role attribute support to libsepol,
Harry Ciao
Regarding SELinux User mapping,
c.r.madhusudhanan@xxxxxxxxx
v0 Add role attribute support to libsepol,
Harry Ciao
[PATCH] cgroupfs: use init_cred when populating new cgroupfs mount,
Eric Paris
mounting cgroupfs causes directory search before sb initialization,
Eric Paris
SELinux: Fix arguments when expanding user_datum_t.roles,
Harry Ciao
Is it possible to assign different labels to symbolic links and actual files?,
Sam Gandhi
[v0 PATCH 0/2] Review request for reorganizing the role transition rule,
rongqing.li
[git] pull selinux tree for 2.6.40,
Eric Paris
[v0 PATCH 0/1] Review request for skipping file_name_trans_write() when policy downgraded,
rongqing.li
selinux_inode_init_security() initialises XATTR_SELINUX_SUFFIX and not XATTR_NAME_SELINUX?,
Sam Gandhi
FUSE and SELinux labeling,
Sam Gandhi
[GIT PULL] selinux tree for linus, Eric Paris
A few questions about module compile/link source code,
HarryCiao
[2/2] libselinux: fix case of names with whitespace/multibytes on /selinux/create,
Kohei Kaigai
[1/2] selinux: fix case of names with whitespace/multibytes on /selinux/create, Kohei Kaigai
[PATCH] SELinux: Fix an RCU dereference warning in selinux_setprocattr(), David Howells
[PATCH v2]: setfiles should provide an option to avoid abortion on a missing file, Guido Trentalancia
[PATCH 2/2 v2]: improve the manual page for setfiles, Guido Trentalancia
[PATCH 1/2 v2]: clean-up setfiles source code and document two options, Guido Trentalancia
[PATCH 0/2 v2]: minor improvements and clean-ups for policycoreutils/setfiles, Guido Trentalancia
[PATCH v2] policycoreutils: alternative configuration file support for sestatus,
Guido Trentalancia
Patch Review Process,
Steve Lawrence
libselinux mountpoint changing patch.,
Daniel J Walsh
This is the current libsepol-patch after the update.,
Daniel J Walsh
I believe you will need this patch also to build reference policy.,
Daniel J Walsh
[GIT PULL REQUEST] selinux tree for linus, Eric Paris
Re: [PATCH] SELINUX: add /sys/fs/selinux mount point to put selinuxfs,
Stephen Smalley
xattr support in cgroupfs,
Matthew Ife
[RFC][PATCH 0/4] eCryptfs credentials patches,
Roberto Sassu
[PATCH] SELinux: introduce path_has_perm, Eric Paris
[PATCH -v2] flex_arrays: allow zero length flex arrays,
Eric Paris
[PATCH] SELinux: pass last path component in may_create, Eric Paris
[PATCH] policy module for atop,
Elia Pinto
[PATCH] Delete redundant role system_r assignments after init_daemon_domain, Elia Pinto
Is there difference betweek sefiles and restorecon in terms of labels,
Sam Gandhi
[PATCH] fix description of init_system_domain in init.if,
Elia Pinto
[RFC][PATCH 0/7] File descriptor labeling,
Roberto Sassu
- [RFC][PATCH 6/7] security: new LSM hook security_file_getsecid(), Roberto Sassu
- [RFC][PATCH 3/7] smack: assign the label set in file->f_cred to new file descriptors, Roberto Sassu
- [RFC][PATCH 5/7] smack: import the security label in smack_secctx_to_secid(), Roberto Sassu
- [RFC][PATCH 2/7] selinux: label new file descriptors using file->f_cred, Roberto Sassu
- [RFC][PATCH 4/7] smack: fix label check in smack_kernel_act_as(), Roberto Sassu
- [RFC][PATCH 1/7] fs: initialize file->f_cred with credentials provided, Roberto Sassu
- [RFC][PATCH 7/7] ima: added new LSM conditions in the policy, Roberto Sassu
- Re: [RFC][PATCH 0/7] File descriptor labeling, Casey Schaufler
- Re: [RFC][PATCH 0/7] File descriptor labeling, Casey Schaufler
- <Possible follow-ups>
- Re: [RFC][PATCH 0/7] File descriptor labeling, Roberto Sassu
[PATCH 1/6] SELinux: fix comment to state filename_compute_type takes an objname not a qstr,
Eric Paris
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]