Selinux Reference Policy
[Prev Page][Next Page]
- policy to systemd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH v1] obex: Implement support for message listing format version 1.1 for MCE
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] Doc: Obex Implement support for message listing format version 1.1
- From: Amisha Jain <quic_amisjain@xxxxxxxxxxx>
- [PATCH v1] obexctl: Implement support for message listing format version 1.1 for MCE
- From: Amisha Jain <quic_amisjain@xxxxxxxxxxx>
- [PATCH v1] obex: Implement support for message listing format version 1.1 for MCE
- From: Amisha Jain <quic_amisjain@xxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Takaya Saeki <takayas@xxxxxxxxxxxx>
- Re: [PATCH] selinux: support wildcard match in genfscon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: The curious case of pidfs and pidfds
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- The curious case of pidfs and pidfds
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: pidfs
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- pidfs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: cupsd_t and sys_admin
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [no subject]
- cupsd_t and sys_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: Reference Policy 2.20240916
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v1] Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v1] Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH v1] Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v3] Setting bluetooth helper domain for bluetoothctl
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v3] Setting bluetooth helper domain for bluetoothctl
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH v2] Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
- From: Raghavender Reddy Bujala <quic_rbujala@xxxxxxxxxxx>
- Re: [PATCH v1] Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Setting bluetooth helper domain for bluetoothctl
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v1] Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
- From: Raghavender Reddy Bujala <quic_rbujala@xxxxxxxxxxx>
- Re: [PATCH v1] Setting bluetooth helper domain for bluetoothctl
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH v2] Setting bluetooth helper domain for bluetoothctl
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v1] Setting bluetooth helper domain for bluetoothctl
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v1] Setting bluetooth helper domain for bluetoothctl
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v2] Sepolicy changes for bluez to access uhid
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v4] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] Sepolicy changes for bluez to access uhid
- From: Amisha Jain <quic_amisjain@xxxxxxxxxxx>
- Re: [PATCH v4] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v1] Sepolicy changes for bluez to access uhid
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v4] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v4] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH v1] Sepolicy changes for bluez to access uhid
- From: Amisha Jain <quic_amisjain@xxxxxxxxxxx>
- [PATCH v4] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v3] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v3] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH 2/2] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH 2/2] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Raghavender Reddy Bujala <quic_rbujala@xxxxxxxxxxx>
- Re: [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Raghavender Reddy Bujala <quic_rbujala@xxxxxxxxxxx>
- Re: [PATCH v1] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v1] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- Re: [PATCH v1] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v1] Adding Sepolicy rules to allow bluetoothctl and dbus-daemon to access unix stream sockets.
- From: Naga Bhavani Akella <quic_nakella@xxxxxxxxxxx>
- [PATCH v1] Need bluetooth socket permission for pulseaudio.
- From: Raghavender Reddy Bujala <quic_rbujala@xxxxxxxxxxx>
- ANN: SETools 4.5.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: SETools 4.5.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: Reference Policy 2.20240226
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: SETools 4.4.4
- From: Chris PeBenito <pebenito@xxxxxxxx>
- PSA: this list has moved to new vger infra (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][RFC] selinuxfs: saner handling of policy reloads
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20231002
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: append_lnk_files_pattern
- From: Chris PeBenito <pebenito@xxxxxxxx>
- append_lnk_files_pattern
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: /usr/lib/NetworkManager/nm-dispatcher
- From: Chris PeBenito <pebenito@xxxxxxxx>
- /usr/lib/NetworkManager/nm-dispatcher
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] policy for firmware update daemon fwupd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Add noatsecure for $1_systemd_t executing $1_dbusd_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- syntax errors from sepolgen-ifgen
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: SETools 4.4.3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: SELinux and systemd integration
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- SELinux and systemd integration
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SELinux repository changes
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- ANN: SETools 4.4.2
- From: "Christopher J. PeBenito" <pebenito@xxxxxxxx>
- Re: [refpolicy3 RFC] Drop suffixes?
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [refpolicy3 RFC] Drop suffixes?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [refpolicy3 RFC] Drop suffixes?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [refpolicy3 RFC] Drop suffixes?
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [refpolicy3 RFC] Split broad file contexts
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH testsuite 2/3] policy: allow test_ibpkey_access_t to use RDMA netlink sockets
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite 1/3] policy: make sure test_ibpkey_access_t can lock enough memory
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: SETools 4.4.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [refpolicy3 RFC] Split broad file contexts
- From: Matthew Sheets <masheets@xxxxxxxxxxxxxxxxxxx>
- [refpolicy3 RFC] Split broad file contexts
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- ANN/RFC: SELinux Reference Policy 3 pre-alpha
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20221101
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc strict patches
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Sympa list server
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] misc strict patches
- From: "Sugar, David" <dsugar@xxxxxxxxxxxxxxxxxxx>
- [PATCH] misc strict patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Sympa list server
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: Reference Policy 2.20220520
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Daemons writing into HOME_DIR
- From: Stefan Schulze Frielinghaus <ml@xxxxxxxxxxx>
- Re: Daemons writing into HOME_DIR
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Daemons writing into HOME_DIR
- From: Stefan Schulze Frielinghaus <ml@xxxxxxxxxxx>
- Re: [PATCH] new sddm pam patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] wm domains and sddm fixes
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] machinectl shell and login fixes
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] machinectl shell and login fixes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] wm domains and sddm fixes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] new sddm V2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] new sddm V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] new sddm pam patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] init dbus patch for GetDynamicUsers with systemd_use_nss() V2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] certbot V3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] certbot V3
- From: Russell Coker <russell@xxxxxxxxxxxx>
- restricting desktop applications
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] certbot V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] certbot V2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] mailman3 V3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] certbot V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] certbot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] mailman3 V3
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] mailman3 V2.1
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] mailman3 V2.1
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] certbot
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- [PATCH] mailman3 V2.1
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] mailman3 V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] certbot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] matrixd-synapse policy V3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] puppet V3
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] matrixd-synapse policy V3
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] rasdaemon (replacement for mcelog)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] rasdaemon V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] rasdaemon V2
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] init dbus patch for GetDynamicUsers with systemd_use_nss() V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] rasdaemon V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] puppet V3
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] rasdaemon policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] puppet patch V2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] new sddm pam patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] init dbus patch for GetDynamicUsers with systemd_use_nss()
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] init dbus patch for GetDynamicUsers with systemd_use_nss()
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] new sddm pam patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] sddm role
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] rasdaemon policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] puppet patch V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] dontaudit net_admin without hide_broken_symptoms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] init dbus patch for GetDynamicUsers
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sddm role
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] puppet patch V2
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH] sddm role
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] init dbus patch for GetDynamicUsers
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] puppet patch V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] dontaudit net_admin without hide_broken_symptoms
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] remove aliases from 20210203
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] dontaudit net_admin
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] puppet patch V2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] puppet patch V2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] puppet
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- [PATCH] dontaudit net_admin
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] remove aliases from 20210203
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] puppet
- From: Russell Coker <russell@xxxxxxxxxxxx>
- RE: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kmod and unsigned modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kmod and unsigned modules
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20220106
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 2/2] dbus: Add filetrans for /tmp/dbus-* session socket
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: Add map perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/7] mcs: add additional constraints to databases
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 1/7] mcs: deprecate mcs overrides
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 2/7] mcs: restrict create, relabelto on mcs files
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 0/7] mcs, various: pull in changes from Fedora policy
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 6/7] various: deprecate mcs override interfaces
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 5/7] mcs: combine single-level object creation constraints
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 7/7] corenet: make netlabel_peer_t mcs constrained
- From: Kenton Groombridge <me@xxxxxxxxxx>
- [PATCH 4/7] mcs: constrain misc IPC objects
- From: Kenton Groombridge <me@xxxxxxxxxx>
- Re: [PATCH] strict policy patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] patch for sddm with PAM
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc kernel patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] strict policy patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] strict policy patches
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] another systemd misc patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] strict policy patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc kernel patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] patch for sddm with PAM
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] Add erofs as a SELinux capable file system
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Add erofs as a SELinux capable file system
- From: Gao Xiang <xiang@xxxxxxxxxx>
- ANN: Reference Policy 2.20210908
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] containers module in refpolicy
- From: Kenton Groombridge <me@xxxxxxxxxx>
- Re: [RFC] containers module in refpolicy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [RFC] containers module in refpolicy
- From: Kenton Groombridge <me@xxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] puppet changes
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] puppet changes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] cockpit web admin system
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] cockpit web admin system
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] rasdaemon (replacement for mcelog)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] rasdaemon (replacement for mcelog)
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] rasdaemon (replacement for mcelog)
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] rasdaemon (replacement for mcelog)
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: obsolete policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: obsolete policy
- From: "Sugar, David" <dsugar@xxxxxxxxxxxxxxxxxxx>
- Re: obsolete policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- ANN: SETools 4.4.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: obsolete policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: cgroups
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: cgroups
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: unreserved_port_t
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- cgroups
- From: Russell Coker <russell@xxxxxxxxxxxx>
- unreserved_port_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: obsolete policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] blkmapd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] blkmapd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] another systemd misc patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc services patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] little misc patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] mailman 3
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- ANN: Reference Policy 2.20210203
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] little misc patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc services patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] mailman 3
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] another systemd misc patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] new version of filetrans patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] small misc patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] machined
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] new version of filetrans patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] matrixd
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] matrixd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] machined
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] small misc patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc apps and admin patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] new version of filetrans patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] new version of filetrans patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] new version of filetrans patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] type transition rules for Debian installations
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc kernel and system patches with Dominick's changes
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc network patches with Dominick's changes*2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: sddm issue and patch not for inclusion
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- sddm issue and patch not for inclusion
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] misc network patches with Dominick's changes*2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc network patches with Dominick's changes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] misc network patches with Dominick's changes
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc kernel and system patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc kernel and system patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc network patches with Dominick's changes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc network patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc services patches with changes Dominick and Chris wanted
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc kernel and system patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] misc kernel and system patches with Dominick's changes
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc kernel and system patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick wanted
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] remove deprecated from 20190201
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] more Chrome stuff
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: obsolete policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- obsolete policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches with changes Dominick wanted
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: policy releases
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] latest memlockd patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] remove deprecated from 20190201
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc services patches with changes Dominick wanted
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] strict 2
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] strict 2
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] misc services patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc kernel and system patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc apps and admin patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] misc network patches
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- policy releases
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] misc apps and admin patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] latest memlockd patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc kernel and system patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc services patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] strict 2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] misc network patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] more Chrome stuff
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] yet more strict patches fixed
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] matrixd (synapse) policy 2
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] latest iteration of certbot policy as patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [RFC PATCH 0/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] base chrome/chromium patch fixed
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [RFC PATCH 1/1] selinux-notebook: Add new section for Embedded Systems
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] matrixd (synapse) policy 2
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] matrixd (synapse) policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH] matrixd (synapse) policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] matrixd (synapse) policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] latest iteration of certbot policy as patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] base chrome/chromium patch fixed
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] yet more strict patches fixed
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH V3] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] latest iteration of certbot policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] yet more strict patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] base chrome/chromium patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] udevadm patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] strict patches
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] strict patches
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] latest iteration of certbot policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] strict patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] yet more strict patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] chrome/chromium stranger things
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] base chrome/chromium patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] udevadm patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] Purging dead modules
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [RFC] Purging dead modules
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: machinectl shell policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: machinectl shell policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: machinectl shell policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: machinectl shell policy
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- machinectl shell policy
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH V3] Ensure correct monolithic binary policy is loaded
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH V2] Ensure correct monolithic binary policy is loaded
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] Ensure correct monolithic binary policy is loaded
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Ensure correct monolithic binary policy is loaded
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: lockdown class
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] first udevadm patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- lockdown class
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] first udevadm patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: udevadm etc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: udevadm etc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: udevadm etc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Steve Lawrence <slawrence@xxxxxxxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- udevadm etc
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- How is policy.31 created from modules under /usr/share/selinux
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: Fwd: Failed to start Udev Kernel device manager
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Fwd: Failed to start Udev Kernel device manager
- From: Ashish Mishra <ashishm@xxxxxxxxxx>
- Re: [PATCH 5/8] init: Added fcontext for openrc-shutdown.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 4/8] init: Added fcontext for openrc-init.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/8] getty: allow watching file /run/agetty.reload
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 8/8] systemd: make remaining dbus_* optional
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 7/8] init: upstream fcontexts from gentoo policy
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 6/8] Add transition on gentoo init_t to openrc
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/8] userdomain: Add watch on home dirs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/8] portage: Added /var/cache/distfiles path.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 8/8] systemd: make remaining dbus_* optional
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/8] init: Added fcontext for openrc-shutdown.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/8] init: Added fcontext for openrc-init.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/8] portage: Added /var/cache/distfiles path.
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/8] getty: allow watching file /run/agetty.reload
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/8] init: upstream fcontexts from gentoo policy
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/8] userdomain: Add watch on home dirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/8] Add transition on gentoo init_t to openrc
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v2] xen: Allow xenstored to map /proc/xen/xsd_kva
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] xen: Allow xenstored to map /proc/xen/xsd_kva
- From: Anthony PERARD <anthony.perard@xxxxxxxxxx>
- Re: [PATCH] bind: add a few fc specs for unbound
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] bind: add a few fc specs for unbound
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- ANN: Reference Policy 2.20200818
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] Label /usr/libexec/packagekitd as apt_exec_t on debian
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] Also label polkit-agent-helper-1 when installed directly in /usr/libexec
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] Also label polkit-agent-helper-1 when installed directly in /usr/libexec
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] Also label polkit-agent-helper-1 when installed directly in /usr/libexec
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Are we on the wrong track?
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: virt_use_sysfs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- virt_use_sysfs
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] xen: Allow xenstored to map /proc/xen/xsd_kva
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] xen: Allow xenstored to map /proc/xen/xsd_kva
- From: Anthony PERARD <anthony.perard@xxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Are we on the wrong track?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Are we on the wrong track?
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Are we on the wrong track?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Denis Obrezkov <denisobrezkov@xxxxxxxxx>
- Re: Are we on the wrong track?
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Are we on the wrong track?
- From: Dac Override <dac.override@xxxxxxxxx>
- Re: Are we on the wrong track?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Are we on the wrong track?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: another certbot patch
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] Drop support for /dev/.udev and like
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: another memlockd patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: another chromium patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: another certbot patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: systemd_generator_t vs systemd_generator_type
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: strict patch again with controversial sections removed
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: what is cap_userns?
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: /dev/vhost-vsock
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: /dev/vhost-vsock
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: /dev/vhost-vsock
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- /dev/vhost-vsock
- From: Russell Coker <russell@xxxxxxxxxxxx>
- what is cap_userns?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- systemd_generator_t vs systemd_generator_type
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: another memlockd patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: another memlockd patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: another certbot patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: new certbot patch
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- strict patch again with controversial sections removed
- From: Russell Coker <russell@xxxxxxxxxxxx>
- another chromium patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- another memlockd patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- another certbot patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: new certbot patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: semanage coredump
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: systemd_user_runtime_dir_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: pulseaudio patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: latest ver of trivial mail server patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: latest memlockd patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: new certbot patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- semanage coredump
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: systemd_user_runtime_dir_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: logind shadow access
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: systemd_user_runtime_dir_t
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- logind shadow access
- From: Russell Coker <russell@xxxxxxxxxxxx>
- systemd_user_runtime_dir_t
- From: Russell Coker <russell@xxxxxxxxxxxx>
- latest ver of trivial mail server patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- pulseaudio patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- latest memlockd patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- new certbot patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- ANN: SETools 4.3.0
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: systemd reboot
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH] Label bluetooth daemon as bluetooth_exec_t
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- ANN: Reference Policy 2.20200229
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: /run/systemd/inaccessible
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: /run/systemd/inaccessible
- From: Dominick Grift <dac.override@xxxxxxxxx>
- /run/systemd/inaccessible
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Access to raw memory: remove or make boolean?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Access to raw memory: remove or make boolean?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Access to raw memory: remove or make boolean?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Access to raw memory: remove or make boolean?
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Access to raw memory: remove or make boolean?
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: new certbot patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- new memlockd patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- new certbot patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 07/10] userdomain: Add watch on home dirs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 06/10] policykit devicekit: Add watch perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 08/10] dbus: add watch perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 04/10] cron: watch cron spool
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 05/10] colord: add watch perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 03/10] accountsd: Add watch perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 02/10] udev: Add watch perms
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 01/10] fstools: add zfs-auto-snapshot
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 10/10] gpg: add watch perms for agent
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 09/10] chromium: watch etc dirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 08/10] dbus: add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 07/10] userdomain: Add watch on home dirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 06/10] policykit devicekit: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 05/10] colord: add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 04/10] cron: watch cron spool
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 03/10] accountsd: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 02/10] udev: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 01/10] fstools: add zfs-auto-snapshot
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: Chrome/Chromium patches
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 07/10] userdomain: Add watch on home dirs
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: pulseaudio patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: certbot patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: memlockd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: trivial mail server patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: small net patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: strict patch
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: Chrome/Chromium patches
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 10/10] gpg: add watch perms for agent
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 09/10] chromium: watch etc dirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 08/10] dbus: add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 07/10] userdomain: Add watch on home dirs
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 06/10] policykit devicekit: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 05/10] colord: add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 04/10] cron: watch cron spool
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 03/10] accountsd: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 02/10] udev: Add watch perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 01/10] fstools: add zfs-auto-snapshot
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- memlockd
- From: Russell Coker <russell@xxxxxxxxxxxx>
- trivial mail server patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- small net patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- certbot patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- strict patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- pulseaudio patch
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Chrome/Chromium patches
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] Allow systemd to getattr all files
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] audit daemon can halt system, allow this to happen.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v3] Allow systemd to getattr all files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v3] audit daemon can halt system, allow this to happen.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH v3] Allow systemd to getattr all files
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Henrik Grindal Bakken <hgb@xxxxxxxxxx>
- [PATCH v3] audit daemon can halt system, allow this to happen.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Allow systemd to getattr configfile
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH v2] audit daemon can halt system, allow this to happen.
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH v2] audit daemon can halt system, allow this to happen.
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [PATCH v2] Allow systemd to getattr configfile
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Henrik Grindal Bakken <hgb@xxxxxxxxxx>
- Re: [PATCH v2] Allow systemd to getattr configfile
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow audit daemon to halt system
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Henrik Grindal Bakken <hgb@xxxxxxxxxx>
- [RFC] files: Make files_{relabel,manage}_non_security_types work on all file types
- From: Henrik Grindal Bakken <hgb@xxxxxxxxxx>
- Re: [Non-DoD Source] SELint
- From: jwcart2 <jwcart2@xxxxxxxxxxxxx>
- SELint
- From: "Burgener, Daniel" <dburgener@xxxxxxxxxx>
- [PATCH] Allow audit daemon to halt system
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH v2] Allow systemd to getattr configfile
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- Re: [RFC] refining systemd mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] refining systemd mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [RFC] refining systemd mountpoints
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [RFC] refining systemd mountpoints
- From: Dominick Grift <dac.override@xxxxxxxxx>
- [RFC] refining systemd mountpoints
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: How to contribute to selinux-refpolicy (mcs)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- How to contribute to selinux-refpolicy (mcs)
- From: Denis Obrezkov <denisobrezkov@xxxxxxxxx>
- Re: [PATCH 1/9] systemd: Add elogind support
- From: Dominick Grift <dac.override@xxxxxxxxx>
- Re: [PATCH 1/9] systemd: Add elogind support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH 9/9] virt: allow lvm_control access
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 8/9] virt: Add unix socket for virtlogd/virtlockd
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 7/9] chromium: allow dbus chat to inhibit power
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 5/9] dirmngr: accept unix stream socket
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 4/9] devicekit: udisks needs access to /run/mount/utab.lock
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 3/9] xserver: ICEauthority can be in /run/user
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/9] udev: Allow udevadm access to udev_tbl_t
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 6/9] fstools: add zfs-auto-snapshot
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/9] systemd: Add elogind support
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] Fix indent to match the rest of the file (space -> tab)
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 1/2] Add interface to read efivarfs_t directory
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH 2/2] miscfiles: reading certs allows map permission also
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] Allow systemd to getattr configfile
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH 9/9] virt: allow lvm_control access
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 8/9] virt: Add unix socket for virtlogd/virtlockd
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 7/9] chromium: allow dbus chat to inhibit power
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 6/9] fstools: add zfs-auto-snapshot
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 5/9] dirmngr: accept unix stream socket
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 4/9] devicekit: udisks needs access to /run/mount/utab.lock
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 3/9] xserver: ICEauthority can be in /run/user
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 2/9] udev: Allow udevadm access to udev_tbl_t
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/9] systemd: Add elogind support
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] Add interface to read efivarfs_t directory
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
- [PATCH 2/2] Fix indent to match the rest of the file (space -> tab)
- From: "Sugar, David" <dsugar@xxxxxxxxxx>
[Index of Archives]
[AMD Graphics]
[Linux USB]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]