dominick.grift ([email protected])

Number of posts: 591 (591 per day)
First post: 2011-09-21 20:25:11
Last post: 2011-09-21 20:25:11

Date List Subject
2013-11-09 09:45:20 refpolicy [refpolicy] [PATCH 39/39] unconfined: Do not domain transition to xserver_t (unconfined_t is xserver_unconfined)
2013-11-09 09:45:19 refpolicy [refpolicy] [PATCH 38/39] xserver: review this
2013-11-09 09:45:18 refpolicy [refpolicy] [PATCH 37/39] xserver: already allowed by auth_login_pgm_domain(xdm_t)
2013-11-09 09:45:17 refpolicy [refpolicy] [PATCH 36/39] init: creates /run/utmp
2013-11-09 09:45:16 refpolicy [refpolicy] [PATCH 35/39] users: calls pulseaudio_role() for restricted xwindows users and staff_t/user_t
2013-11-09 09:45:15 refpolicy [refpolicy] [PATCH 34/39] kernel: Edited the dev_(create|setattr)_all_(chr|blk)_files() interfaces:
2013-11-09 09:45:14 refpolicy [refpolicy] [PATCH 33/39] kernel: cryptomgr_test (kernel_t) requests kernel to load cryptd(__driver-ecb-aes-aesni
2013-11-09 09:45:13 refpolicy [refpolicy] [PATCH 32/39] sshd/setrans: make respective init scripts create pid dirs with proper contexts
2013-11-09 09:45:12 refpolicy [refpolicy] [PATCH 31/39] udev: in debian udevadm is located in /bin/udevadm
2013-11-09 09:45:11 refpolicy [refpolicy] [PATCH 30/39] init: the gdomap and minissdpd init scripts read the respective environ files in /etc/default. We need to give them a private type so that we can give the gdomap_admin() and minissdpd_admin() access to it, but it seems overengineering to create private environ types for these files
2013-11-09 09:45:10 refpolicy [refpolicy] [PATCH 29/39] init: exim init script runs various helper apps that create and manage /var/lib/exim4/config.autogenerated.tmp file
2013-11-09 09:45:09 refpolicy [refpolicy] [PATCH 28/39] init: startpar (initrc_t) gets attributes of /dev/dm-0 (device_t) early on boot, soon later the node context is properly reset (debian only) init: startpar (initrc_t) gets attributes of /proc/kcore file
2013-11-09 09:45:08 refpolicy [refpolicy] [PATCH 27/39] libraries: for now i can only confirm mmap, might need to be changed to bin_t later if it turns out to need execute_no_trans
2013-11-09 09:45:07 refpolicy [refpolicy] [PATCH 26/39] init: this is a bug in debian where tmpfs is mounted on /run, and so early on in the boot process init creates /run/utmp and /run/initctl in a tmpfs directory (/) tmpfs
2013-11-09 09:45:06 refpolicy [refpolicy] [PATCH 25/39] users: move the unconfined_u user statement to the unconfined module (if possible) so that it will be removed if the unconfined module is disabled, or removed
2013-11-09 09:45:05 refpolicy [refpolicy] [PATCH 24/39] This should probably eventually end up with xdm_home_t type like Fedora, but the file is currently created with xauth_home_t type so i just added a file context spec for that for failover
2013-11-09 09:45:04 refpolicy [refpolicy] [PATCH 23/39] Initial local_home_t implementation
2013-11-09 09:45:03 refpolicy [refpolicy] [PATCH 22/39] sysbnetwork: dhclient searches /var/lib/ntp
2013-11-09 09:45:02 refpolicy [refpolicy] [PATCH 21/39] init: init_script_domain() allow system_r role the init script domain type
2013-11-09 09:45:01 refpolicy [refpolicy] [PATCH 20/39] init: for a specified automatic role transition to work. the source role must be allowed to change manually to the target role
2013-11-09 09:45:00 refpolicy [refpolicy] [PATCH 19/39] users: associate the system_r role to unconfined_u identity conditionally ( direct_sysadm_daemon )
2013-11-09 09:44:59 refpolicy [refpolicy] [PATCH 18/39] unconfined: make direct_sysadm_daemon apply to unconfined_r:unconfined_t as well
2013-11-09 09:44:58 refpolicy [refpolicy] [PATCH 17/39] init: This should make transitions to init_script_domains() work for direct_sysadm_daemon
2013-11-09 09:44:57 refpolicy [refpolicy] [PATCH 16/39] iptables: calls to firewalld interfaces from Fedora. The firewalld_dontaudit_rw_tmp_files(iptables_t) was confirmed on Debian.
2013-11-09 09:44:56 refpolicy [refpolicy] [PATCH 15/39] sysnetwork: dhcpc: networkmanager interface calls from Fedora. In Debian i was able to confirm the need for networkmanager_manage_lib_files(dhcpc_t) since dhclient reads /var/lib/NetworkManager/dhclient-eth0.conf
2013-11-09 09:44:55 refpolicy [refpolicy] [PATCH 14/39] fstools: hdparm append (what seems inherited from devicekit ) /var/log/pm-powersave.log fstools: hdparm reads /run/pm-utils/locks/pm-powersave.lock
2013-11-09 09:44:54 refpolicy [refpolicy] [PATCH 13/39] usermanage: Run /etc/cron\.daily/cracklib-runtime in the crack_t domain in Debian
2013-11-09 09:44:53 refpolicy [refpolicy] [PATCH 12/39] lvm: lvm writes read_ahead_kb
2013-11-09 09:44:52 refpolicy [refpolicy] [PATCH 11/39] udev: reads modules config: /etc/modprobe.d/alsa-base-blacklist.conf
2013-11-09 09:44:51 refpolicy [refpolicy] [PATCH 10/39] udev: udevd executable location changed
2013-11-09 09:44:50 refpolicy [refpolicy] [PATCH 09/39] These are some of the device nodes created by kernel, and udev with the generic device_t type in debian.
2013-11-09 09:44:49 refpolicy [refpolicy] [PATCH 08/39] These { read write } tty_device_t chr files on boot up in Debian
2013-11-09 09:44:48 refpolicy [refpolicy] [PATCH 07/39] setrans: needs to be able to get attributes of selinuxfs, else fails to start in Debian
2013-11-09 09:44:47 refpolicy [refpolicy] [PATCH 06/39] setrans: mcstransd reads filesystems file in /proc
2013-11-09 09:44:46 refpolicy [refpolicy] [PATCH 05/39] authlogin: unix_chkpwd traverses / on sysfs device on Debian
2013-11-09 09:44:45 refpolicy [refpolicy] [PATCH 04/39] udev: the avahi dns check script run by udev in Debian chmods /run/avahi-daemon
2013-11-09 09:44:44 refpolicy [refpolicy] [PATCH 03/39] userdomain: add userdom_delete_user_tmpfs_files() for pulseaudio clients
2013-11-09 09:44:43 refpolicy [refpolicy] [PATCH 02/39] udev: this fc spec does not make sense, as there is no corresponding file type transition for it
2013-11-09 09:44:42 refpolicy [refpolicy] [PATCH 01/39] mount: fs_list_auto_mountpoint() is now redundant because autofs_t is covered by files_list_all_mountpoints()
2013-11-09 09:40:35 refpolicy [refpolicy] [RFC] userdomain: manage and relabel xdg home content
2013-11-09 09:39:58 refpolicy [refpolicy] [RFC] Changes with regard to XDG base dir spec:
2013-11-09 08:47:05 refpolicy [refpolicy] [RFC] Initial XDG base dir spec policy module
2013-11-03 16:08:22 refpolicy [refpolicy] [PATCH] Allow initrc_t to create /var/run/opendkim
2013-11-03 15:58:58 refpolicy [refpolicy] [PATCH 1/1] Allow rngd to write a pid file
2013-11-01 16:43:32 refpolicy [refpolicy] use_ecryptfs_home_dirs boolean
2013-10-29 21:53:21 refpolicy [refpolicy] SELinux Configuration
2013-10-25 17:09:27 refpolicy [refpolicy] SELinux Reference Policy
2013-10-23 20:22:25 refpolicy [refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:38:23 refpolicy [refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:30:17 refpolicy [refpolicy] I think we made a large mistake when we designed apache_content_template.
2013-10-23 19:29:39 refpolicy [refpolicy] I think we made a large mistake when we designed apache_content_template.