All of lore.kernel.org
 help / color / mirror / Atom feed
* [patch] libselinux:  do not set compat_net upon policy load
@ 2006-08-23 19:13 Stephen Smalley
  2006-08-23 19:37 ` Joshua Brindle
  0 siblings, 1 reply; 6+ messages in thread
From: Stephen Smalley @ 2006-08-23 19:13 UTC (permalink / raw)
  To: selinux; +Cc: Darrel Goeddel, Joshua Brindle, Karl MacMillan, James Morris

Revert the change to automatically set /selinux/compat_net at policy
load time based on the policy, as this prevents compat_net from being
effectively used with refpolicy-based policies that include the packet
class definition.

Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>

---

 src/load_policy.c |   46 +++++++++++++++-------------------------------
 1 files changed, 15 insertions(+), 31 deletions(-)

Index: libselinux/src/load_policy.c
===================================================================
RCS file: /nfshome/pal/CVS/selinux-usr/libselinux/src/load_policy.c,v
retrieving revision 1.17
diff -u -p -r1.17 load_policy.c
--- libselinux/src/load_policy.c	29 Jun 2006 18:21:04 -0000	1.17
+++ libselinux/src/load_policy.c	23 Aug 2006 18:48:46 -0000
@@ -49,7 +49,7 @@ int selinux_mkload_policy(int preservebo
 	struct stat sb;
 	size_t size;
 	void *map, *data;
-	int fd, rc = -1, *values, len, i, prot, compat_net;
+	int fd, rc = -1, *values, len, i, prot;
 	sepol_policydb_t *policydb;
 	sepol_policy_file_t *pf;
 
@@ -79,23 +79,20 @@ int selinux_mkload_policy(int preservebo
 	if (map == MAP_FAILED)
 		goto close;
 
-	if (sepol_policy_file_create(&pf))
-		goto unmap;
-	if (sepol_policydb_create(&policydb)) {
-		sepol_policy_file_free(pf);
-		goto unmap;
-	}
-	sepol_policy_file_set_mem(pf, data, size);
-	if (sepol_policydb_read(policydb, pf)) {
-		sepol_policy_file_free(pf);
-		sepol_policydb_free(policydb);
-		goto unmap;
-	}
-
-	compat_net = sepol_policydb_compat_net(policydb);
-
 	if (vers > kernvers) {
 		/* Need to downgrade to kernel-supported version. */
+		if (sepol_policy_file_create(&pf))
+			goto unmap;
+		if (sepol_policydb_create(&policydb)) {
+			sepol_policy_file_free(pf);
+			goto unmap;
+		}
+		sepol_policy_file_set_mem(pf, data, size);
+		if (sepol_policydb_read(policydb, pf)) {
+			sepol_policy_file_free(pf);
+			sepol_policydb_free(policydb);
+			goto unmap;
+		}
 		if (sepol_policydb_set_vers(policydb, kernvers) ||
 		    sepol_policydb_to_image(NULL, policydb, &data, &size)) {
 			/* Downgrade failed, keep searching. */
@@ -106,11 +103,10 @@ int selinux_mkload_policy(int preservebo
 			vers--;
 			goto search;
 		}
+		sepol_policy_file_free(pf);
+		sepol_policydb_free(policydb);
 	}
 
-	sepol_policy_file_free(pf);
-	sepol_policydb_free(policydb);
-
 	if (load_setlocaldefs) {
 		void *olddata = data;
 		size_t oldsize = size;
@@ -150,18 +146,6 @@ int selinux_mkload_policy(int preservebo
 
 	rc = security_load_policy(data, size);
 
-	if (!rc && selinux_mnt) {
-		int fd2;
-		char buf[2];
-		snprintf(path, sizeof path, "%s/compat_net", selinux_mnt);
-		fd2 = open(path, O_RDWR);
-		if (fd2 < 0)
-			goto unmap;
-		buf[0] = compat_net ? '1' : '0';
-		buf[1] = '\0';
-		(void)write(fd2, buf, 2);
-		close(fd2);
-	}
       unmap:
 	if (data != map)
 		free(data);

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [patch] libselinux:  do not set compat_net upon policy load
  2006-08-23 19:13 [patch] libselinux: do not set compat_net upon policy load Stephen Smalley
@ 2006-08-23 19:37 ` Joshua Brindle
  2006-08-23 19:48   ` Stephen Smalley
  0 siblings, 1 reply; 6+ messages in thread
From: Joshua Brindle @ 2006-08-23 19:37 UTC (permalink / raw)
  To: Stephen Smalley; +Cc: selinux, Darrel Goeddel, Karl MacMillan, James Morris

On Wed, 2006-08-23 at 15:13 -0400, Stephen Smalley wrote:
> Revert the change to automatically set /selinux/compat_net at policy
> load time based on the policy, as this prevents compat_net from being
> effectively used with refpolicy-based policies that include the packet
> class definition.
> 
> Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
> 

So it has to be set manually now? How does the setting persist?


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [patch] libselinux:  do not set compat_net upon policy load
  2006-08-23 19:37 ` Joshua Brindle
@ 2006-08-23 19:48   ` Stephen Smalley
  2006-08-23 22:42     ` Joshua Brindle
  0 siblings, 1 reply; 6+ messages in thread
From: Stephen Smalley @ 2006-08-23 19:48 UTC (permalink / raw)
  To: Joshua Brindle; +Cc: selinux, Darrel Goeddel, Karl MacMillan, James Morris

On Wed, 2006-08-23 at 15:37 -0400, Joshua Brindle wrote:
> On Wed, 2006-08-23 at 15:13 -0400, Stephen Smalley wrote:
> > Revert the change to automatically set /selinux/compat_net at policy
> > load time based on the policy, as this prevents compat_net from being
> > effectively used with refpolicy-based policies that include the packet
> > class definition.
> > 
> > Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
> > 
> 
> So it has to be set manually now? How does the setting persist?

The original idea was for it to be set manually, either via grub.conf
(if using the boot parameter) or via an rc script (if
using /selinux/compat_net).  I had modified libselinux to automatically
set it based on the policy (packet class definition) a while ago, but
that turns out to be a weak indicator and interferes with the ability of
people to force the system to use compat_net checks when using a modern
policy.  In particular, this is posing a problem for the LSPP effort,
see the redhat-lspp list.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [patch] libselinux:  do not set compat_net upon policy load
  2006-08-23 19:48   ` Stephen Smalley
@ 2006-08-23 22:42     ` Joshua Brindle
  2006-08-24 13:21       ` Karl MacMillan
  0 siblings, 1 reply; 6+ messages in thread
From: Joshua Brindle @ 2006-08-23 22:42 UTC (permalink / raw)
  To: Stephen Smalley; +Cc: selinux, Darrel Goeddel, Karl MacMillan, James Morris

On Wed, 2006-08-23 at 15:48 -0400, Stephen Smalley wrote:
> On Wed, 2006-08-23 at 15:37 -0400, Joshua Brindle wrote:
> > On Wed, 2006-08-23 at 15:13 -0400, Stephen Smalley wrote:
> > > Revert the change to automatically set /selinux/compat_net at policy
> > > load time based on the policy, as this prevents compat_net from being
> > > effectively used with refpolicy-based policies that include the packet
> > > class definition.
> > > 
> > > Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
> > > 
> > 
> > So it has to be set manually now? How does the setting persist?
> 
> The original idea was for it to be set manually, either via grub.conf
> (if using the boot parameter) or via an rc script (if
> using /selinux/compat_net).  I had modified libselinux to automatically
> set it based on the policy (packet class definition) a while ago, but
> that turns out to be a weak indicator and interferes with the ability of
> people to force the system to use compat_net checks when using a modern
> policy.  In particular, this is posing a problem for the LSPP effort,
> see the redhat-lspp list.
> 

sounds good,

Acked-by: Joshua Brindle <jbrindle@tresys.com>

---
> 
>  src/load_policy.c |   46 +++++++++++++++-------------------------------
>  1 files changed, 15 insertions(+), 31 deletions(-)
> 
> Index: libselinux/src/load_policy.c
> ===================================================================
> RCS file: /nfshome/pal/CVS/selinux-usr/libselinux/src/load_policy.c,v
> retrieving revision 1.17
> diff -u -p -r1.17 load_policy.c
> --- libselinux/src/load_policy.c	29 Jun 2006 18:21:04 -0000	1.17
> +++ libselinux/src/load_policy.c	23 Aug 2006 18:48:46 -0000
> @@ -49,7 +49,7 @@ int selinux_mkload_policy(int preservebo
>  	struct stat sb;
>  	size_t size;
>  	void *map, *data;
> -	int fd, rc = -1, *values, len, i, prot, compat_net;
> +	int fd, rc = -1, *values, len, i, prot;
>  	sepol_policydb_t *policydb;
>  	sepol_policy_file_t *pf;
>  
> @@ -79,23 +79,20 @@ int selinux_mkload_policy(int preservebo
>  	if (map == MAP_FAILED)
>  		goto close;
>  
> -	if (sepol_policy_file_create(&pf))
> -		goto unmap;
> -	if (sepol_policydb_create(&policydb)) {
> -		sepol_policy_file_free(pf);
> -		goto unmap;
> -	}
> -	sepol_policy_file_set_mem(pf, data, size);
> -	if (sepol_policydb_read(policydb, pf)) {
> -		sepol_policy_file_free(pf);
> -		sepol_policydb_free(policydb);
> -		goto unmap;
> -	}
> -
> -	compat_net = sepol_policydb_compat_net(policydb);
> -
>  	if (vers > kernvers) {
>  		/* Need to downgrade to kernel-supported version. */
> +		if (sepol_policy_file_create(&pf))
> +			goto unmap;
> +		if (sepol_policydb_create(&policydb)) {
> +			sepol_policy_file_free(pf);
> +			goto unmap;
> +		}
> +		sepol_policy_file_set_mem(pf, data, size);
> +		if (sepol_policydb_read(policydb, pf)) {
> +			sepol_policy_file_free(pf);
> +			sepol_policydb_free(policydb);
> +			goto unmap;
> +		}
>  		if (sepol_policydb_set_vers(policydb, kernvers) ||
>  		    sepol_policydb_to_image(NULL, policydb, &data, &size)) {
>  			/* Downgrade failed, keep searching. */
> @@ -106,11 +103,10 @@ int selinux_mkload_policy(int preservebo
>  			vers--;
>  			goto search;
>  		}
> +		sepol_policy_file_free(pf);
> +		sepol_policydb_free(policydb);
>  	}
>  
> -	sepol_policy_file_free(pf);
> -	sepol_policydb_free(policydb);
> -
>  	if (load_setlocaldefs) {
>  		void *olddata = data;
>  		size_t oldsize = size;
> @@ -150,18 +146,6 @@ int selinux_mkload_policy(int preservebo
>  
>  	rc = security_load_policy(data, size);
>  
> -	if (!rc && selinux_mnt) {
> -		int fd2;
> -		char buf[2];
> -		snprintf(path, sizeof path, "%s/compat_net", selinux_mnt);
> -		fd2 = open(path, O_RDWR);
> -		if (fd2 < 0)
> -			goto unmap;
> -		buf[0] = compat_net ? '1' : '0';
> -		buf[1] = '\0';
> -		(void)write(fd2, buf, 2);
> -		close(fd2);
> -	}
>        unmap:
>  	if (data != map)
>  		free(data);
> 


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [patch] libselinux:  do not set compat_net upon policy load
  2006-08-23 22:42     ` Joshua Brindle
@ 2006-08-24 13:21       ` Karl MacMillan
  2006-08-24 14:07         ` Darrel Goeddel
  0 siblings, 1 reply; 6+ messages in thread
From: Karl MacMillan @ 2006-08-24 13:21 UTC (permalink / raw)
  To: Joshua Brindle; +Cc: Stephen Smalley, selinux, Darrel Goeddel, James Morris

On Wed, 2006-08-23 at 18:42 -0400, Joshua Brindle wrote:
> On Wed, 2006-08-23 at 15:48 -0400, Stephen Smalley wrote:
> > On Wed, 2006-08-23 at 15:37 -0400, Joshua Brindle wrote:
> > > On Wed, 2006-08-23 at 15:13 -0400, Stephen Smalley wrote:
> > > > Revert the change to automatically set /selinux/compat_net at policy
> > > > load time based on the policy, as this prevents compat_net from being
> > > > effectively used with refpolicy-based policies that include the packet
> > > > class definition.
> > > > 
> > > > Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
> > > > 
> > > 
> > > So it has to be set manually now? How does the setting persist?
> > 
> > The original idea was for it to be set manually, either via grub.conf
> > (if using the boot parameter) or via an rc script (if
> > using /selinux/compat_net).  I had modified libselinux to automatically
> > set it based on the policy (packet class definition) a while ago, but
> > that turns out to be a weak indicator and interferes with the ability of
> > people to force the system to use compat_net checks when using a modern
> > policy.  In particular, this is posing a problem for the LSPP effort,
> > see the redhat-lspp list.
> > 
> 
> sounds good,
> 
> Acked-by: Joshua Brindle <jbrindle@tresys.com>
> 

Acked-by: Karl MacMillan <kmacmillan@mentalrootkit.com>


> ---
> > 
> >  src/load_policy.c |   46 +++++++++++++++-------------------------------
> >  1 files changed, 15 insertions(+), 31 deletions(-)
> > 
> > Index: libselinux/src/load_policy.c
> > ===================================================================
> > RCS file: /nfshome/pal/CVS/selinux-usr/libselinux/src/load_policy.c,v
> > retrieving revision 1.17
> > diff -u -p -r1.17 load_policy.c
> > --- libselinux/src/load_policy.c	29 Jun 2006 18:21:04 -0000	1.17
> > +++ libselinux/src/load_policy.c	23 Aug 2006 18:48:46 -0000
> > @@ -49,7 +49,7 @@ int selinux_mkload_policy(int preservebo
> >  	struct stat sb;
> >  	size_t size;
> >  	void *map, *data;
> > -	int fd, rc = -1, *values, len, i, prot, compat_net;
> > +	int fd, rc = -1, *values, len, i, prot;
> >  	sepol_policydb_t *policydb;
> >  	sepol_policy_file_t *pf;
> >  
> > @@ -79,23 +79,20 @@ int selinux_mkload_policy(int preservebo
> >  	if (map == MAP_FAILED)
> >  		goto close;
> >  
> > -	if (sepol_policy_file_create(&pf))
> > -		goto unmap;
> > -	if (sepol_policydb_create(&policydb)) {
> > -		sepol_policy_file_free(pf);
> > -		goto unmap;
> > -	}
> > -	sepol_policy_file_set_mem(pf, data, size);
> > -	if (sepol_policydb_read(policydb, pf)) {
> > -		sepol_policy_file_free(pf);
> > -		sepol_policydb_free(policydb);
> > -		goto unmap;
> > -	}
> > -
> > -	compat_net = sepol_policydb_compat_net(policydb);
> > -
> >  	if (vers > kernvers) {
> >  		/* Need to downgrade to kernel-supported version. */
> > +		if (sepol_policy_file_create(&pf))
> > +			goto unmap;
> > +		if (sepol_policydb_create(&policydb)) {
> > +			sepol_policy_file_free(pf);
> > +			goto unmap;
> > +		}
> > +		sepol_policy_file_set_mem(pf, data, size);
> > +		if (sepol_policydb_read(policydb, pf)) {
> > +			sepol_policy_file_free(pf);
> > +			sepol_policydb_free(policydb);
> > +			goto unmap;
> > +		}
> >  		if (sepol_policydb_set_vers(policydb, kernvers) ||
> >  		    sepol_policydb_to_image(NULL, policydb, &data, &size)) {
> >  			/* Downgrade failed, keep searching. */
> > @@ -106,11 +103,10 @@ int selinux_mkload_policy(int preservebo
> >  			vers--;
> >  			goto search;
> >  		}
> > +		sepol_policy_file_free(pf);
> > +		sepol_policydb_free(policydb);
> >  	}
> >  
> > -	sepol_policy_file_free(pf);
> > -	sepol_policydb_free(policydb);
> > -
> >  	if (load_setlocaldefs) {
> >  		void *olddata = data;
> >  		size_t oldsize = size;
> > @@ -150,18 +146,6 @@ int selinux_mkload_policy(int preservebo
> >  
> >  	rc = security_load_policy(data, size);
> >  
> > -	if (!rc && selinux_mnt) {
> > -		int fd2;
> > -		char buf[2];
> > -		snprintf(path, sizeof path, "%s/compat_net", selinux_mnt);
> > -		fd2 = open(path, O_RDWR);
> > -		if (fd2 < 0)
> > -			goto unmap;
> > -		buf[0] = compat_net ? '1' : '0';
> > -		buf[1] = '\0';
> > -		(void)write(fd2, buf, 2);
> > -		close(fd2);
> > -	}
> >        unmap:
> >  	if (data != map)
> >  		free(data);
> > 
> 

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [patch] libselinux:  do not set compat_net upon policy load
  2006-08-24 13:21       ` Karl MacMillan
@ 2006-08-24 14:07         ` Darrel Goeddel
  0 siblings, 0 replies; 6+ messages in thread
From: Darrel Goeddel @ 2006-08-24 14:07 UTC (permalink / raw)
  To: Stephen Smalley; +Cc: Karl MacMillan, Joshua Brindle, selinux, James Morris

Karl MacMillan wrote:
> On Wed, 2006-08-23 at 18:42 -0400, Joshua Brindle wrote:
> 
>>On Wed, 2006-08-23 at 15:48 -0400, Stephen Smalley wrote:
>>
>>>On Wed, 2006-08-23 at 15:37 -0400, Joshua Brindle wrote:
>>>
>>>>On Wed, 2006-08-23 at 15:13 -0400, Stephen Smalley wrote:
>>>>
>>>>>Revert the change to automatically set /selinux/compat_net at policy
>>>>>load time based on the policy, as this prevents compat_net from being
>>>>>effectively used with refpolicy-based policies that include the packet
>>>>>class definition.
>>>>>
>>>>>Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
>>>>>
>>>>So it has to be set manually now? How does the setting persist?
>>>
>>>The original idea was for it to be set manually, either via grub.conf
>>>(if using the boot parameter) or via an rc script (if
>>>using /selinux/compat_net).  I had modified libselinux to automatically
>>>set it based on the policy (packet class definition) a while ago, but
>>>that turns out to be a weak indicator and interferes with the ability of
>>>people to force the system to use compat_net checks when using a modern
>>>policy.  In particular, this is posing a problem for the LSPP effort,
>>>see the redhat-lspp list.
>>>
>>
>>sounds good,
>>
>>Acked-by: Joshua Brindle <jbrindle@tresys.com>
>>
> 
> Acked-by: Karl MacMillan <kmacmillan@mentalrootkit.com>
> 

Acked-by: Darrel Goeddel <dgoeddel@trustedcs.com>

>>---
>>
>>> src/load_policy.c |   46 +++++++++++++++-------------------------------
>>> 1 files changed, 15 insertions(+), 31 deletions(-)
>>>
>>>Index: libselinux/src/load_policy.c
>>>===================================================================
>>>RCS file: /nfshome/pal/CVS/selinux-usr/libselinux/src/load_policy.c,v
>>>retrieving revision 1.17
>>>diff -u -p -r1.17 load_policy.c
>>>--- libselinux/src/load_policy.c	29 Jun 2006 18:21:04 -0000	1.17
>>>+++ libselinux/src/load_policy.c	23 Aug 2006 18:48:46 -0000
>>>@@ -49,7 +49,7 @@ int selinux_mkload_policy(int preservebo
>>> 	struct stat sb;
>>> 	size_t size;
>>> 	void *map, *data;
>>>-	int fd, rc = -1, *values, len, i, prot, compat_net;
>>>+	int fd, rc = -1, *values, len, i, prot;
>>> 	sepol_policydb_t *policydb;
>>> 	sepol_policy_file_t *pf;
>>> 
>>>@@ -79,23 +79,20 @@ int selinux_mkload_policy(int preservebo
>>> 	if (map == MAP_FAILED)
>>> 		goto close;
>>> 
>>>-	if (sepol_policy_file_create(&pf))
>>>-		goto unmap;
>>>-	if (sepol_policydb_create(&policydb)) {
>>>-		sepol_policy_file_free(pf);
>>>-		goto unmap;
>>>-	}
>>>-	sepol_policy_file_set_mem(pf, data, size);
>>>-	if (sepol_policydb_read(policydb, pf)) {
>>>-		sepol_policy_file_free(pf);
>>>-		sepol_policydb_free(policydb);
>>>-		goto unmap;
>>>-	}
>>>-
>>>-	compat_net = sepol_policydb_compat_net(policydb);
>>>-
>>> 	if (vers > kernvers) {
>>> 		/* Need to downgrade to kernel-supported version. */
>>>+		if (sepol_policy_file_create(&pf))
>>>+			goto unmap;
>>>+		if (sepol_policydb_create(&policydb)) {
>>>+			sepol_policy_file_free(pf);
>>>+			goto unmap;
>>>+		}
>>>+		sepol_policy_file_set_mem(pf, data, size);
>>>+		if (sepol_policydb_read(policydb, pf)) {
>>>+			sepol_policy_file_free(pf);
>>>+			sepol_policydb_free(policydb);
>>>+			goto unmap;
>>>+		}
>>> 		if (sepol_policydb_set_vers(policydb, kernvers) ||
>>> 		    sepol_policydb_to_image(NULL, policydb, &data, &size)) {
>>> 			/* Downgrade failed, keep searching. */
>>>@@ -106,11 +103,10 @@ int selinux_mkload_policy(int preservebo
>>> 			vers--;
>>> 			goto search;
>>> 		}
>>>+		sepol_policy_file_free(pf);
>>>+		sepol_policydb_free(policydb);
>>> 	}
>>> 
>>>-	sepol_policy_file_free(pf);
>>>-	sepol_policydb_free(policydb);
>>>-
>>> 	if (load_setlocaldefs) {
>>> 		void *olddata = data;
>>> 		size_t oldsize = size;
>>>@@ -150,18 +146,6 @@ int selinux_mkload_policy(int preservebo
>>> 
>>> 	rc = security_load_policy(data, size);
>>> 
>>>-	if (!rc && selinux_mnt) {
>>>-		int fd2;
>>>-		char buf[2];
>>>-		snprintf(path, sizeof path, "%s/compat_net", selinux_mnt);
>>>-		fd2 = open(path, O_RDWR);
>>>-		if (fd2 < 0)
>>>-			goto unmap;
>>>-		buf[0] = compat_net ? '1' : '0';
>>>-		buf[1] = '\0';
>>>-		(void)write(fd2, buf, 2);
>>>-		close(fd2);
>>>-	}
>>>       unmap:
>>> 	if (data != map)
>>> 		free(data);
>>>
>>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2006-08-24 14:07 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-08-23 19:13 [patch] libselinux: do not set compat_net upon policy load Stephen Smalley
2006-08-23 19:37 ` Joshua Brindle
2006-08-23 19:48   ` Stephen Smalley
2006-08-23 22:42     ` Joshua Brindle
2006-08-24 13:21       ` Karl MacMillan
2006-08-24 14:07         ` Darrel Goeddel

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.