selinux June 2008 archive
Main Archive Page > Month Archives  > selinux archives
selinux: By Date

selinux By Date

SubjectAuthorDate
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Joshua Brindle
cvs patchDaniel J Walsh
Re: X avcsEamon Walsh
Re: X in enforcing modeEamon Walsh
Re: restorecond should not be started by defaultJoshua Brindle
Re: fixfiles patchJoshua Brindle
Re: This patch adds permissive to semanageJoshua Brindle
This patch adds permissive to semanageDaniel J Walsh
fixfiles patchDaniel J Walsh
Re: mls support for xserverJustin Mattock
restorecond should not be started by defaultDaniel J Walsh
Re: rbacsep: type transition conflicts uncoveredStephen Smalley
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Stephen Smalley
Re: rbacsep: type transition conflicts uncoveredChristopher J. PeBenito
Re: rbacsep: type transition conflicts uncoveredStephen Smalley
Re: rbacsep: type transition conflicts uncoveredChristopher J. PeBenito
Re: rawhide audit2allow problemStephen Smalley
Re: mls support for xserverChristopher J. PeBenito
Re: rbacsep: type transition conflicts uncoveredStephen Smalley
range_transition questionJoe Nall
X in enforcing modeJoe Nall
Patch for libselinux man page submitted by Karel ZackDaniel J Walsh
mls support for xserverJustin Mattock
Re: window manager policyTed X Toth
Re: window manager policyJoe Nall
Re: window manager policyEamon Walsh
Re: SELinux backupsNick Gray
[refpolicy] Patch: Create non_security_file_type attributeJames Carter
Re: releasibility in mcstransdJoshua Brindle
Re: releasibility in mcstransdPaul Moore
refpolicyJustin Mattock
Re: first cut of window manager/metacity policyXavier Toth
Re: releasibility in mcstransdJoshua Brindle
Re: rawhide audit2allow problemDaniel J Walsh
Re: releasibility in mcstransdDaniel J Walsh
Re: SELinux backupsVikram Ambrose
SELinux backupsNick Gray
ANN: netlabel_tools version 0.18Paul Moore
Re: rawhide audit2allow problemTom London
Re: window manager policyXavier Toth
Re: rawhide audit2allow problemKarl MacMillan
Re: rawhide audit2allow problemVikram Ambrose
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Eamon Walsh
rawhide audit2allow problemXavier Toth
[refpolicy] Let dhcp use init fdsMartin Orr
[refpolicy] Let dpkg scripts ptraceMartin Orr
Re: rbacsep: type transition conflicts uncoveredChristopher J. PeBenito
Re: [PATCH] CGI scripts/PostgreSQL stream connectChristopher J. PeBenito
[PATCH] Communication between domains under labeled networksKaiGai Kohei
Re: first cut of window manager/metacity policyXavier Toth
first cut of window manager/metacity policyXavier Toth
Re: [refpolicy] postfix 2.5.2 - data dir /var/lib/postfixChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: rbacsep: type transition conflicts uncoveredChristopher J. PeBenito
Re: [PATCH] Labeled IPsec for PostgreSQL/MySQL/SSHd (Re: [PATCH] IPsec SPD default security context)KaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Reminder: SELiunx Developer SymposiumJames Morris
Re: pam_mountStefan Schulze Frielinghaus
Re: window manager policyEamon Walsh
Re: [patch] sepolgen: fix role-type associations and role allow rulesKarl MacMillan
Re: window manager policyXavier Toth
Re: window manager policyEamon Walsh
Re: rbacsep: type transition conflicts uncoveredStephen Smalley
Re: How to disable/remove MLSStephen Smalley
Re: How to disable/remove MLSIoannis Aslanidis
Re: rbacsep: type transition conflicts uncoveredStephen Smalley
Re: How to disable/remove MLSStephen Smalley
Re: How to disable/remove MLSIoannis Aslanidis
How to disable/remove MLSIoannis Aslanidis
rbacsep: type transition conflicts uncoveredChristopher J. PeBenito
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Christopher J. PeBenito
Re: pam_mountChristopher J. PeBenito
Re: x_extension useChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: x client policy interfacesChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Daniel J Walsh
[PATCH] CGI scripts/PostgreSQL stream connectKaiGai Kohei
Re: su command not foundShintaro Fujiwara
Re: su command not foundStefan Schulze Frielinghaus
su command not foundShintaro Fujiwara
pam_mountStefan Schulze Frielinghaus
Re: x_extension useEamon Walsh
Re: releasibility in mcstransdJoe Nall
Re: releasibility in mcstransdJoe Nall
Re: releasibility in mcstransdJoshua Brindle
Re: releasibility in mcstransdJoe Nall
allow sysadm_t usb_device_t:chr_file ioctl;Justin Mattock
x client policy interfacesXavier Toth
Re: releasibility in mcstransdJoshua Brindle
Re: window manager policyRussell Coker
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: window manager policyJoe Nall
Re: window manager policyJoe Nall
x_extension useXavier Toth
Re: [patch] sepolgen: fix role-type associations and role allow rulesStephen Smalley
[patch] sepolgen: fix role-type associations and role allow rulesJoshua Brindle
Re: window manager policyEamon Walsh
Re: [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if presentJames Morris
window manager policyXavier Toth
[refpolicy] postfix 2.5.2 - data dir /var/lib/postfixVáclav Ovsík
Re: Question about XACE/X-SELinuxT S
Re: [PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if presentStephen Smalley
[PATCH-v3] SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: kernel/kernel.* diffsChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: SELinux Bootstrap - without chrootStephen Smalley
Re: [rfc] refpolicy user based separationJames Carter
Re: SELinux Bootstrap - without chrootVikram Ambrose
[RFC] rbacsep: eliminate untrusted content typesChristopher J. PeBenito
Re: [rfc] refpolicy user based separationStephen Smalley
Re: gnome-screensav AVCsChristopher J. PeBenito
Re: gnome-screensav AVCsTed X Toth
Re: [rfc] refpolicy user based separationJames Carter
Re: [rfc] refpolicy user based separationStephen Smalley
Re: [rfc] refpolicy user based separationJames Carter
Re: [rfc] refpolicy user based separationJames Carter
Re: gnome-screensav AVCsChristopher J. PeBenito
Re: [rfc] refpolicy user based separationJoshua Brindle
Re: [rfc] refpolicy user based separationJames Carter
Re: [rfc] refpolicy user based separationStephen Smalley
Re: SELinux Bootstrap - without chrootStephen Smalley
Re: gnome-screensav AVCsXavier Toth
Re: gnome-screensav AVCsChristopher J. PeBenito
Re: [rfc] refpolicy user based separationJoshua Brindle
Re: [rfc] refpolicy user based separationJames Carter
Re: SELinux Bootstrap - without chrootVikram Ambrose
gnome-screensav AVCsXavier Toth
Re: SELinux Bootstrap - without chrootStephen Smalley
Re: Question about XACE/X-SELinuxXavier Toth
Re: SELinux Bootstrap - without chrootVikram Ambrose
Question about XACE/X-SELinuxT S
Re: SELinux Bootstrap - without chrootStephen Smalley
Re: [PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if presentStephen Smalley
Re: [PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if presentCasey Schaufler
Re: SELinux Bootstrap - without chrootVikram Ambrose
[PATCH-v2] SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris
Re: new domain for libvirtChristopher J. PeBenito
Re: New domain for qemuChristopher J. PeBenito
Re: SELinux Bootstrap - without chrootStephen Smalley
Re: SELinux Bootstrap - without chrootVikram Ambrose
Re: SELinux Bootstrap - without chrootStephen Smalley
SELinux Bootstrap - without chrootVikram Ambrose
Re: [PATCH-v3] libsepol: allow genfscon statements in modulesEric Paris
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Stephen Smalley
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: defining a new class in a policy moduleJoshua Brindle
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: defining a new class in a policy moduleMohamed Hassan
Re: defining a new class in a policy moduleJoshua Brindle
defining a new class in a policy moduleMohamed Hassan
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, labelStephen Smalley
Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, labelEamon Walsh
Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, label - try 2Stephen Smalley
Re: checkpolicy misrepresents the line an error is onStephen Smalley
[PATCH] libselinux: new and updated man pages for AVC, mapping, label - try 2Eamon Walsh
checkpolicy misrepresents the line an error is onEric Paris
Re: [patch] libsepol write.c has shadowed varStephen Smalley
Re: [patch] libsepol write.c has shadowed varJoshua Brindle
Re: [refpolicy] Milter Mail FiltersPaul Howarth
Re: [patch] libsepol write.c has shadowed varStephen Smalley
[patch] libsepol write.c has shadowed varJoshua Brindle
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyJoshua Brindle
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
[rfc] refpolicy user based separationJoshua Brindle
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: libsepol segfault when module requires a user not in baseStephen Smalley
Re: libsepol segfault when module requires a user not in baseJoshua Brindle
Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, labelStephen Smalley
Re: SELinux References/Booksmax
Re: [refpolicy] Milter Mail FiltersChristopher J. PeBenito
Re: libsepol segfault when module requires a user not in baseStephen Smalley
Re: [refpolicy] /usr/lib32 typeChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: [refpolicy] Milter Mail FiltersPaul Howarth
Re: SELinux References/BooksRussell Coker
Re: [PATCH] libselinux: new and updated man pages for AVC, mapping, labelStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
libsepol segfault when module requires a user not in baseEric Paris
[PATCH] libselinux: new and updated man pages for AVC, mapping, labelEamon Walsh
Re: dynamic security class and access vector lookupStephen Smalley
Re: dynamic security class and access vector lookupStephen Smalley
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: dynamic security class and access vector lookupXavier Toth
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: dynamic security class and access vector lookupStephen Smalley
dynamic security class and access vector lookupXavier Toth
Re: X in MLS enforcing problemXavier Toth
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris
Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if presentStephen Smalley
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if presentChristopher J. PeBenito
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: [PATCH] SELinux: allow fstype unknown to policy to use xattrs if presentStephen Smalley
[PATCH] SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris
Re: libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyStephen Smalley
libsemanage.semanage_install_active: error during semodule -n -v -b base.pp -s refpolicyVikram Ambrose
Re: SELinux References/BooksStephen Smalley
Re: how do I use selabel to get an x selection object contextEamon Walsh
Re: SELinux References/Booksmax
Re: X in MLS enforcing problemEamon Walsh
Re: X in MLS enforcing problemEamon Walsh
Re: X in MLS enforcing problemXavier Toth
Re: X in MLS enforcing problemEamon Walsh
how do I use selabel to get an x selection object contextXavier Toth
Re: [PATCH] SELinux: remove unused and shadowed addrlen variablePaul Moore
Re: libselinux patch to add interfaces in avc.h to python bindingsStephen Smalley
ANN: Updated SELinux core userland releaseStephen Smalley
Current Fedora Prelude patchDaniel J Walsh
postgresql fedora differencesDaniel J Walsh
Fedora diffs for vmware policyDaniel J Walsh
RE: MLS constraint interfacesChad Hanson
Re: [RFC] SELinux: allow fstype unknown to policy to use xattrs if presentStephen Smalley
Re: kernel/kernel.* diffsDaniel J Walsh
[RFC] SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris
[PATCH] SELinux: remove unused and shadowed addrlen variableJames Morris
[PATCH] SELinux: use do_each_thread as a proper do/while blockJames Morris
libselinux patch to add interfaces in avc.h to python bindingsDaniel J Walsh
Corecommand.patch based off todays policyDaniel J Walsh
Re: [PATCH] SELinux: use do_each_thread as a proper do/while blockStephen Smalley
Re: [RFC] Context ordering based on MLS dominance.Dave Quigley
Re: [PATCH] SELinux: remove unused and shadowed addrlen variableStephen Smalley
Re: [RFC] Context ordering based on MLS dominance.Casey Schaufler
Re: [RFC] Context ordering based on MLS dominance.Stephen Smalley
Re: [RFC] Context ordering based on MLS dominance.Joshua Brindle
SELINUX: Add interface to compute MLS dominance relationship.Dave Quigley
[RFC] Context ordering based on MLS dominance.Dave Quigley
libselinux: Introduce interfaces to use context_dom selinuxfs entryDave Quigley
Re: To domain transition or not?Daniel J Walsh
Re: releasibility in mcstransdDaniel J Walsh
libxcb xselinuxTed X Toth
Re: X in MLS enforcing problemTed X Toth
MLS constraint interfacesTed X Toth
Re: releasibility in mcstransdJoe Nall
rbacsep: home/tmp polyinstantiationChristopher J. PeBenito
Re: Questions regarding labeled ipsec/MAC networkingJoy Latten
Re: X in MLS enforcing problemTed X Toth
Re: tracking down execstack & execmem violationsStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: tracking down execstack & execmem violationsDaniel J Walsh
Re: tracking down execstack & execmem violationsEric Paris
Re: Questions regarding labeled ipsec/MAC networkingJoy Latten
RE: tracking down execstack & execmem violationsStephen Smalley
RE: tracking down execstack & execmem violationsClarkson, Mike R (US SSA)
Re: tracking down execstack & execmem violationsStephen Smalley
tracking down execstack & execmem violationsClarkson, Mike R (US SSA)
Re: Questions regarding labeled ipsec/MAC networkingJoy Latten
Re: Questions regarding labeled ipsec/MAC networkingPaul Moore
Re: avc_* functions not in libselinux-pythonStephen Smalley
Re: avc_* functions not in libselinux-pythonTed X Toth
Re: X in MLS enforcing problemTed X Toth
Re: avc_* functions not in libselinux-pythonStephen Smalley
Re: Questions regarding labeled ipsec/MAC networkingStephen Smalley
Re: [PATCH] SELinux: more user friendly unknown handling printkStephen Smalley
Re: X in MLS enforcing problemStephen Smalley
Re: Questions regarding labeled ipsec/MAC networkingJames Morris
Re: X in MLS enforcing problemEamon Walsh
Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_avJames Morris
Re: [PATCH] SELinux: more user friendly unknown handling printkJames Morris
Re: [PATCH] SELinux: drop load_mutex in security_load_policyJames Morris
Re: [patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)James Morris
Questions regarding labeled ipsec/MAC networkingJoy Latten
Re: X in MLS enforcing problemXavier Toth
RE: X in MLS enforcing problemChad Hanson
X in MLS enforcing problemXavier Toth
RE: releasibility in mcstransdChad Hanson
Re: releasibility in mcstransdPaul Moore
[PATCH] SELinux: more user friendly unknown handling printkEric Paris
releasibility in mcstransdJoshua Brindle
RE: To domain transition or not?Stephen Smalley
Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_avStephen Smalley
Re: [PATCH] SELinux: drop load_mutex in security_load_policyStephen Smalley
Re: [patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)Eric Paris
[patch] selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux whine)Stephen Smalley
[PATCH] SELinux: drop load_mutex in security_load_policyEric Paris
Re: [PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_avEric Paris
RE: To domain transition or not?Clarkson, Mike R (US SSA)
[PATCH] SELinux: fix off by 1 reference of class_to_string in context_struct_compute_avEric Paris
Re: No AVC messages foundJustin Mattock
To domain transition or not?Clarkson, Mike R (US SSA)
Re: To domain transition or not?Stephen Smalley
Re: [refpolicy] /usr/lib32 typeMartin Orr
Re: No AVC messages foundStephen Smalley
Re: No AVC messages foundJustin Mattock
[refpolicy] Milter Mail FiltersPaul Howarth
Re: kernel/kernel.* diffsChristopher J. PeBenito
Re: No AVC messages foundStephen Smalley
Re: [refpolicy] Let xserver chat to halChristopher J. PeBenito
Re: [refpolicy] /usr/lib32 typeChristopher J. PeBenito
Re: RFC: Per-object manager controls in /selinux/configKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Ted X Toth
No AVC messages foundJustin Mattock
[refpolicy] Let xserver chat to halMartin Orr
[refpolicy] /usr/lib32 typeMartin Orr
Re: Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Eamon Walsh
Re: [PATCH RFC 0/3] Open code kernel locksPaul Moore
RE: modules.conf problemChristopher J. PeBenito
RE: modules.conf problemClarkson, Mike R (US SSA)
Re: [patch] libsepol: fix endianness bug in network node address handlingStephen Smalley
Re: [PATCH 2/3] SELinux: open code load_mutexStephen Smalley
Re: RFC: Per-object manager controls in /selinux/configStephen Smalley
Re: [PATCH 2/3] SELinux: open code load_mutexJames Morris
SE Linux and GPGRussell Coker
Re: modules.conf problemChristopher J. PeBenito
Re: [PATCH 3/3] SELinux: open code sidtab lockStephen Smalley
Re: [PATCH 1/3] SELinux: open code policy_rwlockStephen Smalley
Re: [PATCH 2/3] SELinux: open code load_mutexStephen Smalley
[PATCH RFC 0/3] Open code kernel locksJames Morris
[PATCH 1/3] SELinux: open code policy_rwlockJames Morris
[PATCH 3/3] SELinux: open code sidtab lockJames Morris
[PATCH 2/3] SELinux: open code load_mutexJames Morris
Re: RFC: Per-object manager controls in /selinux/configKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
modules.conf problemClarkson, Mike R (US SSA)
Re: RFC: Per-object manager controls in /selinux/configStephen Smalley
Re: RFC: Per-object manager controls in /selinux/configEamon Walsh
Re: [patch][stable] policycoreutils user_u seuser vs. genhomedirconStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsEamon Walsh
Trying to get XAce policy straightened out but our tool chain is too broken to handle it.Daniel J Walsh
Re: [patch] selinux: fix endianness bug in network node address handlingJames Morris
Re: [patch] selinux: simplify ioctl checkingJames Morris
[patch] selinux: fix endianness bug in network node address handlingStephen Smalley
[patch] libsepol: fix endianness bug in network node address handlingStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChris PeBenito
[patch] selinux: simplify ioctl checkingStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: NetLabelJustin Mattock
Re: NetLabelPaul Moore
Re: NetLabelJustin Mattock
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: NetLabelPaul Moore
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsJoshua Brindle
NetLabelJustin Mattock
Re: RFC: Per-object manager controls in /selinux/configKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: [RFC][PATCH] selinux: simplify ioctl checkingJames Morris
Re: [RFC][PATCH] selinux: simplify ioctl checkingEric Paris
Re: [RFC][PATCH] selinux: simplify ioctl checkingStephen Smalley
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsKaiGai Kohei
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsChristopher J. PeBenito
Re: rbacsep: collapsing xserverChristopher J. PeBenito
Re: [PATCH] libselinux: add support for /contexts/postgresql_contextsEamon Walsh
Re: changing role to user_rJustin Mattock
RE: changing role to user_rClarkson, Mike R (US SSA)
Re: changing role to user_rJustin Mattock
Re: changing role to user_rJustin Mattock
Recent problems recompiling libsemanage with new libustr (1.0.4)Manoj Srivastava
Re: changing role to user_rChristopher J. PeBenito