Selinux Reference Policy
[Prev Page][Next Page]
- Re: [PATCH 3/9] xserver: ICEauthority can be in /run/user
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/9] udev: Allow udevadm access to udev_tbl_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 6/9] fstools: add zfs-auto-snapshot
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/9] systemd: Add elogind support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] Fix indent to match the rest of the file (space -> tab)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] Add interface to read efivarfs_t directory
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] miscfiles: reading certs allows map permission also
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 9/9] virt: allow lvm_control access
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 8/9] virt: Add unix socket for virtlogd/virtlockd
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/9] chromium: allow dbus chat to inhibit power
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/9] fstools: add zfs-auto-snapshot
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/9] dirmngr: accept unix stream socket
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/9] devicekit: udisks needs access to /run/mount/utab.lock
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/9] xserver: ICEauthority can be in /run/user
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/9] udev: Allow udevadm access to udev_tbl_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/9] systemd: Add elogind support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] Add interface to read efivarfs_t directory
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/2] Fix indent to match the rest of the file (space -> tab)
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [RFC 2/3] Add policy for apt-cacher-ng
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [RFC 3/3] Add policy for acngtool
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [RFC 1/3] Add an interface to allow the specified domain to mmap the general network configuration files
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Add support for apt-cacher-ng
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] miscfiles: reading certs allows map permission also
- From: "Lawrence, Stephen" <slawrence@xxxxxxxxxx>
- [PATCH 0/2] Fixes to enable slapd to run
- From: "Lawrence, Stephen" <slawrence@xxxxxxxxxx>
- [PATCH 1/2] ldap: various permissions required by slapd
- From: "Lawrence, Stephen" <slawrence@xxxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Allow systemd to getattr configfile
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow syslog to write to the runtime socket
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] resolve syslog imuxsock denial
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] resolve syslog imuxsock denial
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: Intent to add support for cryfs
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Intent to add support for cryfs
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [PATCH] Add missing gen_require for init_t in init_script_domain
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 06/10] Allow alsa_t to create alsa_runtime_t file as well
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 06/10] Allow alsa_t to create alsa_runtime_t file as well
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 06/10] Allow alsa_t to create alsa_runtime_t file as well
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 10/10] Allow vpnc to create and write its pid file in /run/NetworkManager
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 02/10] Allow geoclue to log in syslog
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 08/10] Allow colord_t to read snmpd_var_lib_t files
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 09/10] Allow systemd_locale_t to talk to systemd notify socket
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 01/10] Allow the systemd dbus-daemon to talk to systemd
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 04/10] Allow realmd_t to read localization files
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 05/10] Allow colord_t to read the color profile stored in ~/.local/share/icc/
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 03/10] Allow colord_t to exec colord_exec_t type
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 07/10] Allow alsa_t to set scheduling priority and send signal to itself
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: systemd --user for GDM started as unconfined_t instead of xdm_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: systemd --user for GDM started as unconfined_t instead of xdm_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: systemd --user for GDM started as unconfined_t instead of xdm_t
- From: Dominick Grift <dac.override@xxxxxxxxx>
- systemd --user for GDM started as unconfined_t instead of xdm_t
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [RFC] Rename *_var_run_t to *_runtime_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] Rename *_var_run_t to *_runtime_t
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- [RFC] Rename *_var_run_t to *_runtime_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 2/2] Allow udevadm_t to use dac_read_search capability
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 1/2] Allow udevadm to read files in /run/udev/data
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Permissions in the udevadm_t domain
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] Remove shell automatic domain transitions to unconfined_t from various pam login programs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Permissions in the udevadm_t domain
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Remove shell automatic domain transitions to unconfined_t from various pam login programs
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] domain: unconfined access to bpf
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Processes to target
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] domain: unconfined access to bpf
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Daniel Jurgens <danielj@xxxxxxxxxxxx>
- [PATCH] Remove shell automatic domain transitions to unconfined_t from various pam login programs
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] ssh: remove unconfined_shell_domtrans(sshd_t)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] ssh: remove unconfined_shell_domtrans(sshd_t)
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] ssh: remove unconfined_shell_domtrans(sshd_t)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [RFC] ssh: remove unconfined_shell_domtrans(sshd_t)
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: Adding a typo-checker for the .fc files of refpolicy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Why is /usr/include matched with /usr/inclu.e?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Adding a typo-checker for the .fc files of refpolicy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Why is /usr/include matched with /usr/inclu.e?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: Why is /usr/include matched with /usr/inclu.e?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Why is /usr/include matched with /usr/inclu.e?
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Adding a typo-checker for the .fc files of refpolicy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] Module for tpm2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Module for tpm2
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Module for tpm2-abrmd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Module for tpm2-abrmd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Module for tpm2-abrmd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Module for tpm2-abrmd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: systemd reboot
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: systemd reboot
- From: Dominick Grift <dac.override@xxxxxxxxx>
- systemd reboot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v4] Add knot module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/1 v2] grant rpm_t permission to map security_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v4] Add knot module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH v3] Add knot module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v3] Add knot module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH 1/1 v2] grant rpm_t permission to map security_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Add knot module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 5/5] Allow rpm scripts to alter systemd services
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 4/5] Allow rpm to map file contexts
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/5] grant rpm permissions to map locale_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/5 - v2] grant permission for rpm to write to audit log
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/5] grant rpm permission to map rpm_var_lib_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/1] grant permission to map security_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Add knot module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH 2/5 - v2] grant permission for rpm to write to audit log
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/5] grant permission for rpm to write to audit log
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/5] grant permission for rpm to write to audit log
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Add knot module
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/1] grant permission to map security_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 5/5] Allow rpm scripts to alter systemd services
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 4/5] Allow rpm to map file contexts
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 3/5] grant rpm permissions to map locale_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/5] grant permission for rpm to write to audit log
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/5] grant rpm permission to map rpm_var_lib_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 0/5] Updates for RPM module
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add knot module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] Add support for openrc-init
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] Add support for openrc-init
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Add support for openrc-init
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Add lldpd policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH v2 1/2] ssh: Add ssh_exec_keygen interface
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH v2 2/2] ssh: Add interface ssh_search_dir
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] ssh: Add ssh_exec_keygen interface
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH v2 0/2] ssh policy new interfaces
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] Add interface ssh_search_dir
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH] Add interface ssh_search_dir
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] add lldpd policy
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH v2] Add lldpd policy
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- ANN: SETools 4.2.2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] add lldpd policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] add lldpd policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] add lldpd policy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] add lldpd policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: fs_use_xattr question
- From: Dominick Grift <dac.override@xxxxxxxxx>
- fs_use_xattr question
- From: Dan Noland <dan@xxxxxxxxxx>
- [PATCH] add lldpd policy
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20190609
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add nginx policy taken from Gentoo hardened-refpolicy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add nginx policy taken from Gentoo hardened-refpolicy
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Add nginx policy taken from Gentoo hardened-refpolicy
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] Introduce allow_bluetooth boolean
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Introduce allow_bluetooth boolean
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] Introduce allow_bluetooth boolean
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Introduce allow_bluetooth boolean
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] Introduce allow_bluetooth boolean
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Introduce allow_bluetooth boolean
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Introduce allow_bluetooth boolean
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: New boolean for using bluetooth
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: New boolean for using bluetooth
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: New boolean for using bluetooth
- From: Russell Coker <russell@xxxxxxxxxxxx>
- New boolean for using bluetooth
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/3] Allow xdm (lightdm) execute plymouth
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 1/3] Allow xdm (lightdm) execute plymouth
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v3] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v3] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v2] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/3] Changes to support plymouth working in enforcing
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 3/3] Some items that seem they can be dontaudited for plymouthd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/3] Changes to support plymouth working in enforcing
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/3] Allow xdm (lightdm) execute plymouth
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 0/3] Resolve issues with plymouth in enforcing
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Testing changes to "refpolicy"
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Testing changes to "refpolicy"
- From: Jag Raman <jag.raman@xxxxxxxxxx>
- [PATCH] Add kernel_dgram_send() into logging_send_syslog_msg()
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: Testing changes to "refpolicy"
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Label /sys/kernel/ns_last_pid as sysctl_kernel_ns_last_pid_t
- From: Lukas Vrabec <lvrabec@xxxxxxxxxx>
- Re: [PATCH] Resolve some denials related to sending journal messages
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Resolve some denials related to sending journal messages
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Resolve some denials related to sending journal messages
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add interface xdm_run_domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Resolve some denials related to sending journal messages
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Resolve some denials related to sending journal messages
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface xdm_run_domain
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Denial of cryptsetup reading cracklib database
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 4/4-v2] Allow ntpd to read unit files
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Denial of cryptsetup reading cracklib database
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 4/4-v2] Allow ntpd to read unit files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 1/1] Resolve denial about logging to journal from dbus
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/1] Resolve denial about logging to journal from chkpwd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 4/4] Allow ntpd to read unit files
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/4] Allow ntpd to update timezone symlink
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/4] Allow ntpd to update chronyd service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/4] Add interface ntp_dbus_chat
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 1/1] Resolve denial about logging to journal from dbus
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/1] Resolve denial about logging to journal from chkpwd
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 4/4] Allow ntpd to read unit files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 0/4] Resolve issues using /usr/bin/timedatectl
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 3/4] Allow ntpd to update timezone symlink
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/4] Allow ntpd to update chronyd service
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/4] Add interface ntp_dbus_chat
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v4] Separate out udevadm into a new domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Setup attribute for fixed_disk_device and removable_device
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v4] Separate out udevadm into a new domain
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Setup attribute for fixed_disk_device and removable_device
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Setup attribute for fixed_disk_device and removable_device
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] Separate out udevadm into a new domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Setup attribute for fixed_disk_device and removable_device
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH v3] Separate out udevadm into a new domain
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Allow additional map permission when reading hwdb
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Resolve denial while changing password
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: /run types
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Add interface udev_run
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: what's up with mac_admin
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: expiry time of aliases
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Resolve denial while changing password
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: what's up with mac_admin
- From: Dominick Grift <dac.override@xxxxxxxxx>
- what's up with mac_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v2] Allow additional map permission when reading hwdb
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- expiry time of aliases
- From: Russell Coker <russell@xxxxxxxxxxxx>
- /run types
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v2] Add interface udev_run
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Allow map permission when reading hwdb
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Add interface udev_run
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to allow relabeling of iso 9660 filesystems.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Update cron use to pam interface
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Allow map permission when reading hwdb
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH v2] Add interface udev_run
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add interface to allow relabeling of iso 9660 filesystems.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add interface to allow relabeling of iso 9660 filesystems.
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Setup attribute for fixed_disk_device and removable_device
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Add interface udev_run
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Update cron use to pam interface
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Setup attribute for fixed_disk_device and removable_device
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface to allow relabeling of iso 9660 filesystems.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface udev_run
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: strange daemon startup issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: strange daemon startup issue
- From: Dominick Grift <dac.override@xxxxxxxxx>
- strange daemon startup issue
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: strange execmem
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Fix incorrect type in clamav_enableddisable_clamd interface
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow freshclam to read sysctl_crypto_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interfaces to run freshclam
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow AIDE to mmap files
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow AIDE to read kernel sysctl_crypto_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow AIDE to sendto kernel datagram socket
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow AIDE to sendto kernel datagram socket
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] Allow AIDE to sendto kernel datagram socket
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Allow AIDE to sendto kernel datagram socket
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: strange execmem
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] Add interfaces to run freshclam
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Fix incorrect type in clamav_enableddisable_clamd interface
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow AIDE to mmap files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow AIDE to read kernel sysctl_crypto_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow AIDE to sendto kernel datagram socket
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow freshclam to read sysctl_crypto_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- strange execmem
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v2] Add interface to get status of rsyslog service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] New interface to dontaudit access to cert_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Add interface to get status of rsyslog service
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH v2] New interface to dontaudit access to cert_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] New interface to dontaudit access to cert_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to get status of rsyslog service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to run cdrecord in caller domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow init_t to read net_conf_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow systemd-hostnamed to set the hostname
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Add interface to run cdrecord in caller domain
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface to get status of rsyslog service
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow systemd-hostnamed to set the hostname
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow init_t to read net_conf_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] New interface to dontaudit access to cert_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] New interface to dontaudit access to cert_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] New interface to dontaudit access to cert_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] New interface to dontaudit access to cert_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- IB pkey policy problem found via the selinux-testsuite
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] New interface to dontaudit access to cert_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: read_file_perms vs mmap_read_file_perms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: read_file_perms vs mmap_read_file_perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Separate domain for systemd-modules-load
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow systemd-networkd to get IP address from dhcp server
- From: Chris PeBenito <pebenito@xxxxxxxx>
- read_file_perms vs mmap_read_file_perms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Separate domain for systemd-modules-load
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Allow systemd-networkd to get IP address from dhcp server
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- ANN: SETools 4.2.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- netlink perms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: Reference Policy release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: strange systemd audit message
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] more misc stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] minor updates redis module to be able to start the app
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: strange system_dbusd_t stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: strange systemd audit message
- From: Chris PeBenito <pebenito@xxxxxxxx>
- strange system_dbusd_t stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- strange systemd audit message
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] chromium
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] yet another little patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] minor updates redis module to be able to start the app
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: [PATCH] chromium
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] yet another little patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add hostapd service module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Add hostapd service module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- [PATCH] yet another little patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] chromium
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Last call before next release
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Add hostapd service module
- From: Alexander Miroshnichenko <alex@xxxxxxxxxxxxxx>
- Re: __pycache__
- From: Chris PeBenito <pebenito@xxxxxxxx>
- __pycache__
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 5/5] Add chromium policy upstreamed from Gentoo
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] yet more tiny stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] tiny stuff for today
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 5/5] Add chromium policy upstreamed from Gentoo
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] tiny stuff for today
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Interface to read and write the mount_runtime_t directory.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] tiny stuff for today
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] tiny stuff for today
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: nnp_transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: nnp_transition
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: nnp_transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] yet more tiny stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- nnp_transition
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] map systemd private dirs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] more tiny stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to read journal files
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface clamav_run
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] map systemd private dirs
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] map systemd private dirs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Add interface to read journal files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface clamav_run
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: What is this GetDynamicUsers about?
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] more tiny stuff
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] more tiny stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- What is this GetDynamicUsers about?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] Modify type for /etc/hostname
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] Interface with systemd_hostnamed over dbus to set hostname
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] label journald configuraiton files syslog_conf_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Interface to read and write the mount_runtime_t directory.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] some little stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Alternate ClamAV temp directory
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] Add interface to create unit files with specified type via filetrans.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] some little stuff
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] some little stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 2/2 v2] Modify type for /etc/hostname
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] label journald configuraiton files syslog_conf_t
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/2] Interface with systemd_hostnamed over dbus to set hostname
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Interface to read and write the mount_runtime_t directory.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] another trivial
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] trivial system cronjob
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] trivial system cronjob
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] another trivial
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] s/mozilla/webbrowser/g
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] s/mozilla/webbrowser/g
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] s/mozilla/webbrowser/g
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Alternate ClamAV temp directory
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to start/stop iptables service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add interface to create unit files with specified type via filetrans.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] some little stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 5/5] Add chromium policy upstreamed from Gentoo
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/5] userdomain: introduce userdom_user_home_dir_filetrans_user_cert
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/5] kernel: introduce kernel_dontaudit_read_kernel_sysctl
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/5] files: introduce files_dontaudit_read_etc_files
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/5] devices: introduce dev_dontaudit_read_sysfs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] s/mozilla/webbrowser/g
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH] s/mozilla/webbrowser/g
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Setup private type for /etc/hostname.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/2] Setup private type for /etc/hostname.
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH 2/2] Setup private type for /etc/hostname.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface to start/stop iptables service
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/2] Interface with systemd_hostnamed over dbus to set hostname
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Alternate ClamAV temp directory
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] Add interface to create unit files with specified type via filetrans.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH] some little stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: connected_stream_socket_perms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] /run/systemd/units/ links
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: connected_stream_socket_perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] chrome/chromium
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] /run/systemd/units/ links
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] /run/systemd/units/ links
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- connected_stream_socket_perms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] chrome/chromium
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] chrome/chromium
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] gpg
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] chrome/chromium
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] /run/systemd/units/ links
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] logging
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] mls stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] gpg
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] chrome/chromium
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH cron 2/2] user_crontab_t etc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- fd use
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] /run/systemd/units/ links
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] logging
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] mls stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] gpg
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] chrome/chromium
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH cron 2/2] user_crontab_t etc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Add interface to get status of iptables service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH cron 2/2] user_crontab_t etc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Add interface to get status of iptables service
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH cron 2/2] user_crontab_t etc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH cron 1/2] stem
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: nss-systemd D-Bus call caused by getpwent
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: nss-systemd D-Bus call caused by getpwent
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2 v3] pam_faillock creates files in /run/faillock
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2 v3] Allow greeter to start dbus
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: nss-systemd D-Bus call caused by getpwent
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] missing from previous
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] last misc stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] systemd misc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 1/2 v3] Allow greeter to start dbus
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/2 v3] pam_faillock creates files in /run/faillock
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] Allow greeter to start dbus
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2 v2] Allow greeter to start dbus
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2 v2] Allow greeter to start dbus
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 2/2 v2] pam_faillock creates files in /run/faillock
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 1/2 v2] Allow greeter to start dbus
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH] last misc stuff
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: nss-systemd D-Bus call caused by getpwent
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH] cron trivial
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] missing from previous
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] systemd misc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] last misc stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc interfaces
- From: Russell Coker <russell@xxxxxxxxxxxx>
- nss-systemd D-Bus call caused by getpwent
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: net_admin
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] systemd misc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] systemd related interfaces
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] last misc stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc interfaces
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc services patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH misc 3/3] networkmanager apt bootloader dpkg raid modutils tor devicekit dicts irqbalance policykit and postfix
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: new release?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- net_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] systemd misc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] systemd related interfaces
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] last misc stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc services patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc interfaces
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH misc 2/3] selinuxutil sysnetwork consolekit apt dpkg udev iptables logrotate, and gpm
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v3] Add sigrok contrib module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Add sigrok contrib module
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- [PATCH v3] Add sigrok contrib module
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH misc 1/3] backup boinc fetchmail, gdomap jabber mon syncthing ssh and login
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Add sigrok contrib module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Add sigrok contrib module
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH misc 2/3] selinuxutil sysnetwork consolekit apt dpkg udev iptables logrotate, and gpm
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH misc 1/3] backup boinc fetchmail, gdomap jabber mon syncthing ssh and login
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH misc 3/3] networkmanager apt bootloader dpkg raid modutils tor devicekit dicts irqbalance policykit and postfix
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Add sigrok contrib module
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH misc 3/3] networkmanager apt bootloader dpkg raid modutils tor devicekit dicts irqbalance policykit and postfix
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH misc 2/3] selinuxutil sysnetwork consolekit apt dpkg udev iptables logrotate, and gpm
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH misc 1/3] backup boinc fetchmail, gdomap jabber mon syncthing ssh and login
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add sigrok contrib module
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: new release?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH misc 3/3] networkmanager apt bootloader dpkg raid modutils tor devicekit dicts irqbalance policykit and postfix
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH misc 2/3] selinuxutil sysnetwork consolekit apt dpkg udev iptables logrotate, and gpm
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH misc 1/3] backup boinc fetchmail, gdomap jabber mon syncthing ssh and login
- From: Russell Coker <russell@xxxxxxxxxxxx>
- new release?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Add sigrok contrib module
- From: Guido Trentalancia <guido@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/2] Allow greeter to start dbus and transition
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [PATCH 1/2] Allow greeter to start dbus and transition
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 2/2] pam_faillock creates files in /run/faillock
- From: David Sugar <dsugar@xxxxxxxxxx>
- Re: [PATCH 3/3] Allow dbus to access /proc/sys/crypto/fips_enabled
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/3] Allow kmod to read /proc/sys/crypto/fips_enabled
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/3] Allow X (xserver_t) to read /proc/sys/crypto/fips_enabled
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow auditctl_t to read bin_t symlinks.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Add missing require for 'daemon' attribute.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 3/3] Allow dbus to access /proc/sys/crypto/fips_enabled
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 2/3] Allow kmod to read /proc/sys/crypto/fips_enabled
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 1/3] Allow X (xserver_t) to read /proc/sys/crypto/fips_enabled
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 0/3] Grant permissions to read fips_enabled
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH] Allow auditctl_t to read bin_t symlinks.
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH] Add missing require for 'daemon' attribute.
- From: David Sugar <dsugar@xxxxxxxxxx>
- Re: [PATCH 1/3] build: add config for libc gnu and musl
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 3/3] sysnetwork: musl needs bind generic node for DNS
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/3] libraries: ldconfig is a shell script on Gentoo musl libc
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/3] build: add config for libc gnu and musl
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] Move 'locallogin_*' interface uses into 'optioal_policy'
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Interface to read cron_system_spool_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] interface to enable/disable systemd_networkd service
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] Add interfaces to control ntpd_unit_t systemd services
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3 1/2] dnsmasq: Require log files to have .log suffix
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] Move 'locallogin_*' interface uses into 'optioal_policy'
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 1/2] Add interfaces to control ntpd_unit_t systemd services
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 2/2] interface to enable/disable systemd_networkd service
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH] Interface to read cron_system_spool_t
- From: David Sugar <dsugar@xxxxxxxxxx>
- Re: [PATCH v3 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v3 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 1/2] dnsmasq: Require log files to have .log suffix
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] dnsmasq: Require log files to have .log suffix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/2] dnsmasq: Require log files to have .log suffix
- From: Petr Vorel <pvorel@xxxxxxx>
- ANN: SETools 4.2.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] dnsmasq: Require log files to have .log suffix
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: init_daemon_domain vs init_spec_daemon_domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow clamd to use sent file descriptor
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/3] Allow clamd_t to read /proc/sys/crypt/fips_enabled
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/3] Interface to add domain allowed to be read by ClamAV for scanning.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/3] Add interfaces to control clamav_unit_t systemd services
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/1 v2] Add interface udev_run_domain
- From: Chris PeBenito <pebenito@xxxxxxxx>
- init_daemon_domain vs init_spec_daemon_domain
- From: Luis Ressel <aranea@xxxxxxxx>
- [PATCH 2/2] dnsmasq: Add support for lxc-net, lxd-bridge, NetworkManager
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/2] dnsmasq: Require log files to have .log suffix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] Allow clamd to use sent file descriptor
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 3/3] Add interfaces to control clamav_unit_t systemd services
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 2/3] Interface to add domain allowed to be read by ClamAV for scanning.
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 1/3] Allow clamd_t to read /proc/sys/crypt/fips_enabled
- From: David Sugar <dsugar@xxxxxxxxxx>
- [PATCH 1/1 v2] Add interface udev_run_domain
- From: David Sugar <dsugar@xxxxxxxxxx>
[Index of Archives]
[AMD Graphics]
[Linux USB]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]