LinuxLists
Users
About
dominick.grift (
[email protected]
)
Number of posts: 591 (591 per day)
First post: 2011-09-21 20:25:11
Last post: 2011-09-21 20:25:11
Previous Page
/
Next Page
Date
List
Subject
2013-11-09 09:45:20
refpolicy
[refpolicy] [PATCH 39/39] unconfined: Do not domain transition to xserver_t (unconfined_t is xserver_unconfined)
2013-11-09 09:45:19
refpolicy
[refpolicy] [PATCH 38/39] xserver: review this
2013-11-09 09:45:18
refpolicy
[refpolicy] [PATCH 37/39] xserver: already allowed by auth_login_pgm_domain(xdm_t)
2013-11-09 09:45:17
refpolicy
[refpolicy] [PATCH 36/39] init: creates /run/utmp
2013-11-09 09:45:16
refpolicy
[refpolicy] [PATCH 35/39] users: calls pulseaudio_role() for restricted xwindows users and staff_t/user_t
2013-11-09 09:45:15
refpolicy
[refpolicy] [PATCH 34/39] kernel: Edited the dev_(create|setattr)_all_(chr|blk)_files() interfaces:
2013-11-09 09:45:14
refpolicy
[refpolicy] [PATCH 33/39] kernel: cryptomgr_test (kernel_t) requests kernel to load cryptd(__driver-ecb-aes-aesni
2013-11-09 09:45:13
refpolicy
[refpolicy] [PATCH 32/39] sshd/setrans: make respective init scripts create pid dirs with proper contexts
2013-11-09 09:45:12
refpolicy
[refpolicy] [PATCH 31/39] udev: in debian udevadm is located in /bin/udevadm
2013-11-09 09:45:11
refpolicy
[refpolicy] [PATCH 30/39] init: the gdomap and minissdpd init scripts read the respective environ files in /etc/default. We need to give them a private type so that we can give the gdomap_admin() and minissdpd_admin() access to it, but it seems overengineering to create private environ types for these files
2013-11-09 09:45:10
refpolicy
[refpolicy] [PATCH 29/39] init: exim init script runs various helper apps that create and manage /var/lib/exim4/config.autogenerated.tmp file
2013-11-09 09:45:09
refpolicy
[refpolicy] [PATCH 28/39] init: startpar (initrc_t) gets attributes of /dev/dm-0 (device_t) early on boot, soon later the node context is properly reset (debian only) init: startpar (initrc_t) gets attributes of /proc/kcore file
2013-11-09 09:45:08
refpolicy
[refpolicy] [PATCH 27/39] libraries: for now i can only confirm mmap, might need to be changed to bin_t later if it turns out to need execute_no_trans
2013-11-09 09:45:07
refpolicy
[refpolicy] [PATCH 26/39] init: this is a bug in debian where tmpfs is mounted on /run, and so early on in the boot process init creates /run/utmp and /run/initctl in a tmpfs directory (/) tmpfs
2013-11-09 09:45:06
refpolicy
[refpolicy] [PATCH 25/39] users: move the unconfined_u user statement to the unconfined module (if possible) so that it will be removed if the unconfined module is disabled, or removed
2013-11-09 09:45:05
refpolicy
[refpolicy] [PATCH 24/39] This should probably eventually end up with xdm_home_t type like Fedora, but the file is currently created with xauth_home_t type so i just added a file context spec for that for failover
2013-11-09 09:45:04
refpolicy
[refpolicy] [PATCH 23/39] Initial local_home_t implementation
2013-11-09 09:45:03
refpolicy
[refpolicy] [PATCH 22/39] sysbnetwork: dhclient searches /var/lib/ntp
2013-11-09 09:45:02
refpolicy
[refpolicy] [PATCH 21/39] init: init_script_domain() allow system_r role the init script domain type
2013-11-09 09:45:01
refpolicy
[refpolicy] [PATCH 20/39] init: for a specified automatic role transition to work. the source role must be allowed to change manually to the target role
2013-11-09 09:45:00
refpolicy
[refpolicy] [PATCH 19/39] users: associate the system_r role to unconfined_u identity conditionally ( direct_sysadm_daemon )
2013-11-09 09:44:59
refpolicy
[refpolicy] [PATCH 18/39] unconfined: make direct_sysadm_daemon apply to unconfined_r:unconfined_t as well
2013-11-09 09:44:58
refpolicy
[refpolicy] [PATCH 17/39] init: This should make transitions to init_script_domains() work for direct_sysadm_daemon
2013-11-09 09:44:57
refpolicy
[refpolicy] [PATCH 16/39] iptables: calls to firewalld interfaces from Fedora. The firewalld_dontaudit_rw_tmp_files(iptables_t) was confirmed on Debian.
2013-11-09 09:44:56
refpolicy
[refpolicy] [PATCH 15/39] sysnetwork: dhcpc: networkmanager interface calls from Fedora. In Debian i was able to confirm the need for networkmanager_manage_lib_files(dhcpc_t) since dhclient reads /var/lib/NetworkManager/dhclient-eth0.conf
2013-11-09 09:44:55
refpolicy
[refpolicy] [PATCH 14/39] fstools: hdparm append (what seems inherited from devicekit ) /var/log/pm-powersave.log fstools: hdparm reads /run/pm-utils/locks/pm-powersave.lock
2013-11-09 09:44:54
refpolicy
[refpolicy] [PATCH 13/39] usermanage: Run /etc/cron\.daily/cracklib-runtime in the crack_t domain in Debian
2013-11-09 09:44:53
refpolicy
[refpolicy] [PATCH 12/39] lvm: lvm writes read_ahead_kb
2013-11-09 09:44:52
refpolicy
[refpolicy] [PATCH 11/39] udev: reads modules config: /etc/modprobe.d/alsa-base-blacklist.conf
2013-11-09 09:44:51
refpolicy
[refpolicy] [PATCH 10/39] udev: udevd executable location changed
2013-11-09 09:44:50
refpolicy
[refpolicy] [PATCH 09/39] These are some of the device nodes created by kernel, and udev with the generic device_t type in debian.
2013-11-09 09:44:49
refpolicy
[refpolicy] [PATCH 08/39] These { read write } tty_device_t chr files on boot up in Debian
2013-11-09 09:44:48
refpolicy
[refpolicy] [PATCH 07/39] setrans: needs to be able to get attributes of selinuxfs, else fails to start in Debian
2013-11-09 09:44:47
refpolicy
[refpolicy] [PATCH 06/39] setrans: mcstransd reads filesystems file in /proc
2013-11-09 09:44:46
refpolicy
[refpolicy] [PATCH 05/39] authlogin: unix_chkpwd traverses / on sysfs device on Debian
2013-11-09 09:44:45
refpolicy
[refpolicy] [PATCH 04/39] udev: the avahi dns check script run by udev in Debian chmods /run/avahi-daemon
2013-11-09 09:44:44
refpolicy
[refpolicy] [PATCH 03/39] userdomain: add userdom_delete_user_tmpfs_files() for pulseaudio clients
2013-11-09 09:44:43
refpolicy
[refpolicy] [PATCH 02/39] udev: this fc spec does not make sense, as there is no corresponding file type transition for it
2013-11-09 09:44:42
refpolicy
[refpolicy] [PATCH 01/39] mount: fs_list_auto_mountpoint() is now redundant because autofs_t is covered by files_list_all_mountpoints()
2013-11-09 09:40:35
refpolicy
[refpolicy] [RFC] userdomain: manage and relabel xdg home content
2013-11-09 09:39:58
refpolicy
[refpolicy] [RFC] Changes with regard to XDG base dir spec:
2013-11-09 08:47:05
refpolicy
[refpolicy] [RFC] Initial XDG base dir spec policy module
2013-11-03 16:08:22
refpolicy
[refpolicy] [PATCH] Allow initrc_t to create /var/run/opendkim
2013-11-03 15:58:58
refpolicy
[refpolicy] [PATCH 1/1] Allow rngd to write a pid file
2013-11-01 16:43:32
refpolicy
[refpolicy] use_ecryptfs_home_dirs boolean
2013-10-29 21:53:21
refpolicy
[refpolicy] SELinux Configuration
2013-10-25 17:09:27
refpolicy
[refpolicy] SELinux Reference Policy
2013-10-23 20:22:25
refpolicy
[refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:38:23
refpolicy
[refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:30:17
refpolicy
[refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:29:39
refpolicy
[refpolicy] I think we made a large mistake when we designed apache_content_template.