Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
[PATCH linux-cr] cr: add selinux support (v6), Serge E. Hallyn
tun/tap and SE Linux in 2.6.32,
Russell Coker
Sample logs of alert types,
Zaina AFOULKI
Re: [HACKERS] Adding support for SE-Linux security, KaiGai Kohei
Tutorial on setting up SELinux / X Server,
Tyler Durvik
[PATCH] Dynamic port labeling V2,
Paul Nuzzi
[PATCH] Contributed manual pages for libselinux (second and last part), Guido Trentalancia
MCS read only cats implemented, Michal Svoboda
Confining Applications to Specific Directories,
Timothy L. Watt
MLS support for RHEL5?,
Dyson, Mark L (IS)
SELinux document - any use!!!, RICHARD HAINES
List of all alert types, Zaina AFOULKI
A question about genhomedircon,
Manoj Srivastava
[PATCH] SELinux: header generation may hit infinite loop,
Eric Paris
[PATCH] Fix bug in semanage fcontext, Chad Sellers
[PATCH] semanage node -a bug, Chad Sellers
[PATCH] kernel: Dynamic port labeling,
Paul Nuzzi
[PATCH] libselinux: selabel_*() support for database objects,
KaiGai Kohei
Re: [PATCH] selinux: Fix warnings, James Morris
WIndow Managers,
Bill Chimiak
[PATCH] libsemanage: Fix the format of the NAME lines,
Manoj Srivastava
[PATCH] [typo-fix]: cannnot -> cannot and suport -> support,
Manoj Srivastava
Debian SSH bugs, Russell Coker
No rule to make target `/seusers', needed by `tmp/seusers'. Stop.,
Justin Mattock
Windows-level enforcement in SELinux?,
Dyson, Mark L (IS)
Using IBM's GPFS with SE Linux Extended Attributes,
David C Casler
get security_class_t for objects,
michel m
Type boundaries: questions on the semantics / is the enforcement correct ?,
Jacques Thomas
"security_compute_sid: invalid context" error when starting/stopping mysqld daemon,
Larry Ross
[PATCH] security: report the module name to security_module_request,
Eric Paris
This patch removes OUTPUT from fixfiles which was never used and was broken,
Daniel J Walsh
Small fixes for chcat in policycoreutils,
Daniel J Walsh
Here is the sandbox patch for policycoreutils., Daniel J Walsh
MCS read only cats,
Michal Svoboda
Contributed manual pages for libselinux,
Guido Trentalancia
selinux_check_passwd_access() behaviour when passwd class does not exist,
Guido Trentalancia
Patch for Ticket #1 [1672486] (policycoreutils), Guido Trentalancia
Patch for Ticket #1 [1672486] (checkpolicy/checkmodule),
Guido Trentalancia
assigning context to disk on Debian/Lenny, Russell Coker
SELinux : Project (opinions and suggestions),
Raul da Silva {Sp4wn}
RPM support for SELinux,
Chad Sellers
[PATCH] SELinux: add .gitignore files for dynamic classes,
Eric Paris
[PATCH] libsemanage: Add function to turn off file contexts validation, Chad Sellers
'make policy' issues,
Eric Laganowski
useradd,
Russell Coker
[PATCH] pkgconfig support for libsepol, libselinux, and libsemanage,
Eamon Walsh
[PATCH] [topic--exception-fix] exception.sh contains bashisms,
Manoj Srivastava
[PATCH] libselinux: Export reset_selinux_config(),
Chad Sellers
Conference info needed, Joshua Brindle
Re: sshd error: Failed to get default security context,
Daniel J Walsh
bounds domain,
michel m
sesearch question,
Joe Nall
what is http authenticated user?,
michel m
/lib/libsemanage.so.1 links to /usr/lib/libustr-1.0.so.1,
Manoj Srivastava
SECMARK: implementation question,
Jacques Thomas
[PATCH 4/4] cr: add selinux support (v6),
Serge E. Hallyn
[PATCH] libselinux: raw string_to_class/string_to_av_perm variants,
Eamon Walsh
[RFC PATCH v2] refpol: Add netif, node and peer constraints for MCS based policies,
Paul Moore
get request context,
michel m
[PATCH 4/4] cr: add selinux support (v5.1), Serge E. Hallyn
Re: [PATCH]: chcon: no longer abort on SELinux disabled kernel,
Jim Meyering
How to trace why MCS permissions granted?,
selinux
[PATCH 1/3] cr: add generic LSM c/r support (v4),
Serge E. Hallyn
Message not available
[RFC PATCH v1] refpol: Add netif, node and peer constraints for MCS based policies,
Paul Moore
[PATCH] selinux: drop remapping of netlink classes,
Stephen Smalley
semanage Equal.patch, Daniel J Walsh
Add modules support to semanage,
Daniel J Walsh
Fix boolean handling in semanage,
Daniel J Walsh
Remove setrans management from semanage,
Daniel J Walsh
load_policy has to be moved to /sbin from /usr/sbin to handle initrd executing load_policy,
Daniel J Walsh
[PATCH v5 1/2] selinux: dynamic class/perm discovery,
Stephen Smalley
Configuring libsemanage to invoke a policy checker,
Stephen Smalley
[PATCH v4 1/2] selinux: dynamic class/perm discovery,
Stephen Smalley
[PATCH v3 1/2] selinux: dynamic class/perm discovery,
Stephen Smalley
Re: SElinux troubles,
Daniel J Walsh
The SELinux Documentation Project [Request for topics],
Joshua Brindle
Re: is any use of runcon by arbitrary users valid when enforcing?, Daniel J Walsh
Final year project ideas,
Zbynek Houska
pam_namespace context inside of name.inst,
Justin Mattock
[RFC][PATCH v2 2/2] selinux: generate flask headers during kernel build,
Stephen Smalley
[RFC][PATCH v2 1/2] selinux: dynamic class/perm discovery, Stephen Smalley
[PATCH] restorecond: Ignore IN_IGNORED inotify events,
Martin Orr
[RFC][cr_tests PATCH] checkpoint/restart: define selinux tests, Serge E. Hallyn
[RFC][PATCH] selinux: dynamic class/perm discovery,
Stephen Smalley
Re: [PATCH] SELinux: audit_access perm used only to dontaudit denials in that access syscall, Eric Paris
[PATCH] SELinux: reset the security_ops before flushing the avc cache,
Eric Paris
[PATCH] SELinux: do not destroy the avc_cache_nodep, Eric Paris
Naive question on ftp selinux policy,
Elia Pinto
CIL infrastructure repo and talks at Summit/LPC, Joshua Brindle
Re: [GIT] security / creds fixes,
Eric Paris
SELinux BOFs at LinuxCon and Linux Plumbers Conference,
debora
[PATCH] setfiles fails to relabel if selinux not enabled,
Caleb Case
[PATCH 1/3] libsepol: Add support for multiple target OSes,
pjnuzzi
[PATCH] SELinux: inline selinux_is_enabled in !CONFIG_SECURITY_SELINUX,
Eric Paris
[PATCH] libsepol/checkpolicy: Add support for multiple target OSes,
pjnuzzi
how to always add rules to a policy,
briaeros007
[PATCH 1/3] Creds: creds->security can be NULL is selinux is disabled,
Eric Paris
[git bisected] 25354c4fee169710fd9da15f3bb2abaa24dcf933 is first bad commit,
Justin Mattock
Installing modular policy using RPM,
Jeff Johnson
I think I sent this patch before, it is the upgrade patch.,
Daniel J Walsh
[PATCH] id: don't print context if POSIXLY_CORRECT is set, Jim Meyering
Policy file and Selinux Policy question,
Elia Pinto
how to use require and gen_require properly,
Stefan Schulze Frielinghaus
[PATCH 0/4] LSM checkpoint/restart: introduction,
Serge E. Hallyn
[refpolicy] new policy for dkim-filter,
Stefan Schulze Frielinghaus
[PATCH] setools: missing \ in libqpol/src/include/qpol/Makefile.{am,in},
Manoj Srivastava
XACE: tclass malformed,
Dominick Grift
setfiles leaks file descriptors,
Daniel J Walsh
opensuse and SELinux = some dbus roblem with xdm/gdm,
Justin Mattock
RHEL, RHCS, and Selinux : hype, reality or dream?,
Elia Pinto
MCS and default labels,
Michal Svoboda
Limitations in modular policy,
KaiGai Kohei
[PATCH] Add functionality to upstart to load policy early in boot,
Manoj Srivastava
Re: Problem install Reference Policy,
zheyeung
[refpolicy] shutdown domain,
Stefan Schulze Frielinghaus
[policy] post a message to logged in users,
Stefan Schulze Frielinghaus
Problem install Reference Policy, waqar afridi
can't login in enforcing mode for some reason.,
Justin Mattock
[RFC PATCH 1/2] cr: lsm: provide hooks for an LSM to track policy changes,
Serge E. Hallyn
[PATCH] libselinux: disable refcounting in the userspace AVC,
Eamon Walsh
I cannot change my shell context,
zheyeung
CentOS / RHEL5: where is setrans.conf?,
Joshua Kramer
Re: vsftpd not changing security context while dropping privileges, Daniel J Walsh
[libsepol] Unchecked input leades to integer underflow,
Manoj Srivastava
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]