]> git.ipfire.org Git - people/stevee/selinux-policy.git/commit
UPdate for f14 policy
authorDan Walsh <dwalsh@redhat.com>
Thu, 26 Aug 2010 13:41:21 +0000 (09:41 -0400)
committerDan Walsh <dwalsh@redhat.com>
Thu, 26 Aug 2010 13:41:21 +0000 (09:41 -0400)
commit3eaa99394500c2267bfd85722ebde18ae44636bd
treed397faf1b28422d7fa23db1c45dd01d307f73bbd
parentc62f1bef77c839295b49bdddc7bfd13df780bf4e
UPdate for f14 policy
458 files changed:
Makefile
man/man8/ftpd_selinux.8
man/man8/git_selinux.8 [new file with mode: 0644]
policy/constraints
policy/global_tunables
policy/mcs
policy/modules/admin/accountsd.fc [new file with mode: 0644]
policy/modules/admin/accountsd.if [new file with mode: 0644]
policy/modules/admin/accountsd.te [new file with mode: 0644]
policy/modules/admin/alsa.fc
policy/modules/admin/alsa.if
policy/modules/admin/alsa.te
policy/modules/admin/amanda.if
policy/modules/admin/anaconda.te
policy/modules/admin/brctl.if
policy/modules/admin/certwatch.te
policy/modules/admin/consoletype.te
policy/modules/admin/dmesg.te
policy/modules/admin/firstboot.te
policy/modules/admin/logrotate.te
policy/modules/admin/logwatch.fc
policy/modules/admin/logwatch.te
policy/modules/admin/mrtg.te
policy/modules/admin/ncftool.fc [new file with mode: 0644]
policy/modules/admin/ncftool.if [new file with mode: 0644]
policy/modules/admin/ncftool.te [new file with mode: 0644]
policy/modules/admin/netutils.te
policy/modules/admin/prelink.te
policy/modules/admin/readahead.te
policy/modules/admin/rpm.fc
policy/modules/admin/rpm.if
policy/modules/admin/rpm.te
policy/modules/admin/sectoolm.te
policy/modules/admin/shorewall.if
policy/modules/admin/shorewall.te
policy/modules/admin/shutdown.fc
policy/modules/admin/shutdown.if
policy/modules/admin/shutdown.te
policy/modules/admin/smoltclient.te
policy/modules/admin/su.if
policy/modules/admin/sudo.if
policy/modules/admin/tmpreaper.te
policy/modules/admin/usermanage.if
policy/modules/admin/usermanage.te
policy/modules/admin/vbetool.te
policy/modules/admin/vpn.te
policy/modules/apps/awstats.te
policy/modules/apps/chrome.fc [new file with mode: 0644]
policy/modules/apps/chrome.if [new file with mode: 0644]
policy/modules/apps/chrome.te [new file with mode: 0644]
policy/modules/apps/cpufreqselector.te
policy/modules/apps/execmem.fc [new file with mode: 0644]
policy/modules/apps/execmem.if [new file with mode: 0644]
policy/modules/apps/execmem.te [new file with mode: 0644]
policy/modules/apps/firewallgui.fc [new file with mode: 0644]
policy/modules/apps/firewallgui.if [new file with mode: 0644]
policy/modules/apps/firewallgui.te [new file with mode: 0644]
policy/modules/apps/gnome.fc
policy/modules/apps/gnome.if
policy/modules/apps/gnome.te
policy/modules/apps/gpg.fc
policy/modules/apps/gpg.if
policy/modules/apps/gpg.te
policy/modules/apps/irc.fc
policy/modules/apps/irc.if
policy/modules/apps/irc.te
policy/modules/apps/java.fc
policy/modules/apps/java.if
policy/modules/apps/java.te
policy/modules/apps/kdumpgui.if
policy/modules/apps/kdumpgui.te
policy/modules/apps/livecd.if
policy/modules/apps/livecd.te
policy/modules/apps/mono.if
policy/modules/apps/mozilla.fc
policy/modules/apps/mozilla.if
policy/modules/apps/mozilla.te
policy/modules/apps/mplayer.if
policy/modules/apps/mplayer.te
policy/modules/apps/nsplugin.fc [new file with mode: 0644]
policy/modules/apps/nsplugin.if [new file with mode: 0644]
policy/modules/apps/nsplugin.te [new file with mode: 0644]
policy/modules/apps/openoffice.fc [new file with mode: 0644]
policy/modules/apps/openoffice.if [new file with mode: 0644]
policy/modules/apps/openoffice.te [new file with mode: 0644]
policy/modules/apps/podsleuth.te
policy/modules/apps/pulseaudio.if
policy/modules/apps/pulseaudio.te
policy/modules/apps/qemu.if
policy/modules/apps/qemu.te
policy/modules/apps/sambagui.if
policy/modules/apps/sambagui.te
policy/modules/apps/sandbox.fc [new file with mode: 0644]
policy/modules/apps/sandbox.if [new file with mode: 0644]
policy/modules/apps/sandbox.te [new file with mode: 0644]
policy/modules/apps/seunshare.if
policy/modules/apps/seunshare.te
policy/modules/apps/telepathy.fc [new file with mode: 0644]
policy/modules/apps/telepathy.if [new file with mode: 0644]
policy/modules/apps/telepathy.te [new file with mode: 0644]
policy/modules/apps/userhelper.fc
policy/modules/apps/userhelper.if
policy/modules/apps/userhelper.te
policy/modules/apps/vmware.fc
policy/modules/apps/vmware.te
policy/modules/apps/wine.fc
policy/modules/apps/wine.if
policy/modules/apps/wine.te
policy/modules/apps/wireshark.te
policy/modules/apps/wm.if
policy/modules/kernel/corecommands.fc
policy/modules/kernel/corecommands.if
policy/modules/kernel/corenetwork.fc
policy/modules/kernel/corenetwork.te.in
policy/modules/kernel/devices.fc
policy/modules/kernel/devices.if
policy/modules/kernel/devices.te
policy/modules/kernel/domain.if
policy/modules/kernel/domain.te
policy/modules/kernel/files.fc
policy/modules/kernel/files.if
policy/modules/kernel/files.te
policy/modules/kernel/filesystem.fc
policy/modules/kernel/filesystem.if
policy/modules/kernel/filesystem.te
policy/modules/kernel/kernel.if
policy/modules/kernel/kernel.te
policy/modules/kernel/selinux.if
policy/modules/kernel/storage.fc
policy/modules/kernel/storage.if
policy/modules/kernel/terminal.if
policy/modules/roles/auditadm.te
policy/modules/roles/guest.te
policy/modules/roles/secadm.te
policy/modules/roles/staff.te
policy/modules/roles/sysadm.te
policy/modules/roles/unconfineduser.fc [new file with mode: 0644]
policy/modules/roles/unconfineduser.if [new file with mode: 0644]
policy/modules/roles/unconfineduser.te [new file with mode: 0644]
policy/modules/roles/unprivuser.te
policy/modules/roles/xguest.te
policy/modules/services/abrt.fc
policy/modules/services/abrt.if
policy/modules/services/abrt.te
policy/modules/services/afs.te
policy/modules/services/aiccu.fc [new file with mode: 0644]
policy/modules/services/aiccu.if [new file with mode: 0644]
policy/modules/services/aiccu.te [new file with mode: 0644]
policy/modules/services/aisexec.te
policy/modules/services/amavis.if
policy/modules/services/amavis.te
policy/modules/services/apache.fc
policy/modules/services/apache.if
policy/modules/services/apache.te
policy/modules/services/apcupsd.te
policy/modules/services/apm.te
policy/modules/services/arpwatch.te
policy/modules/services/asterisk.te
policy/modules/services/automount.te
policy/modules/services/avahi.if
policy/modules/services/avahi.te
policy/modules/services/bind.if
policy/modules/services/bind.te
policy/modules/services/bitlbee.te
policy/modules/services/bluetooth.if
policy/modules/services/boinc.fc [new file with mode: 0644]
policy/modules/services/boinc.if [new file with mode: 0644]
policy/modules/services/boinc.te [new file with mode: 0644]
policy/modules/services/bugzilla.fc [new file with mode: 0644]
policy/modules/services/bugzilla.if [new file with mode: 0644]
policy/modules/services/bugzilla.te [new file with mode: 0644]
policy/modules/services/cachefilesd.fc [new file with mode: 0644]
policy/modules/services/cachefilesd.if [new file with mode: 0644]
policy/modules/services/cachefilesd.te [new file with mode: 0644]
policy/modules/services/canna.te
policy/modules/services/ccs.te
policy/modules/services/certmaster.if
policy/modules/services/certmonger.if
policy/modules/services/certmonger.te
policy/modules/services/cgroup.te
policy/modules/services/chronyd.if
policy/modules/services/chronyd.te
policy/modules/services/clamav.te
policy/modules/services/cmirrord.fc [new file with mode: 0644]
policy/modules/services/cmirrord.if [new file with mode: 0644]
policy/modules/services/cmirrord.te [new file with mode: 0644]
policy/modules/services/cobbler.fc
policy/modules/services/cobbler.if
policy/modules/services/cobbler.te
policy/modules/services/consolekit.if
policy/modules/services/consolekit.te
policy/modules/services/corosync.fc
policy/modules/services/corosync.te
policy/modules/services/courier.if
policy/modules/services/courier.te
policy/modules/services/cron.fc
policy/modules/services/cron.if
policy/modules/services/cron.te
policy/modules/services/cups.fc
policy/modules/services/cups.if
policy/modules/services/cups.te
policy/modules/services/cvs.te
policy/modules/services/cyphesis.te
policy/modules/services/cyrus.te
policy/modules/services/dbus.if
policy/modules/services/dbus.te
policy/modules/services/dcc.te
policy/modules/services/denyhosts.te
policy/modules/services/devicekit.te
policy/modules/services/dhcp.te
policy/modules/services/djbdns.te
policy/modules/services/dnsmasq.te
policy/modules/services/dovecot.fc
policy/modules/services/dovecot.if
policy/modules/services/dovecot.te
policy/modules/services/exim.fc
policy/modules/services/exim.if
policy/modules/services/exim.te
policy/modules/services/fail2ban.if
policy/modules/services/fail2ban.te
policy/modules/services/fetchmail.te
policy/modules/services/fprintd.te
policy/modules/services/ftp.fc
policy/modules/services/ftp.te
policy/modules/services/git.fc
policy/modules/services/git.if
policy/modules/services/git.te
policy/modules/services/gnomeclock.if
policy/modules/services/gpsd.te
policy/modules/services/hal.if
policy/modules/services/hal.te
policy/modules/services/hddtemp.fc
policy/modules/services/icecast.te
policy/modules/services/inn.te
policy/modules/services/kerberos.fc
policy/modules/services/kerberos.te
policy/modules/services/ksmtuned.fc
policy/modules/services/ksmtuned.if
policy/modules/services/ksmtuned.te
policy/modules/services/ldap.fc
policy/modules/services/ldap.if
policy/modules/services/ldap.te
policy/modules/services/lircd.te
policy/modules/services/lpd.te
policy/modules/services/mailman.if
policy/modules/services/memcached.if
policy/modules/services/milter.if
policy/modules/services/mock.fc [new file with mode: 0644]
policy/modules/services/mock.if [new file with mode: 0644]
policy/modules/services/mock.te [new file with mode: 0644]
policy/modules/services/modemmanager.te
policy/modules/services/mojomojo.te
policy/modules/services/mpd.fc [new file with mode: 0644]
policy/modules/services/mpd.if [new file with mode: 0644]
policy/modules/services/mpd.te [new file with mode: 0644]
policy/modules/services/mta.fc
policy/modules/services/mta.if
policy/modules/services/mta.te
policy/modules/services/munin.fc
policy/modules/services/munin.if
policy/modules/services/munin.te
policy/modules/services/mysql.te
policy/modules/services/nagios.if
policy/modules/services/nagios.te
policy/modules/services/networkmanager.fc
policy/modules/services/networkmanager.if
policy/modules/services/networkmanager.te
policy/modules/services/nis.fc
policy/modules/services/nis.if
policy/modules/services/nscd.if
policy/modules/services/nscd.te
policy/modules/services/nslcd.te
policy/modules/services/ntp.te
policy/modules/services/nut.te
policy/modules/services/nx.if
policy/modules/services/nx.te
policy/modules/services/oddjob.fc
policy/modules/services/oddjob.if
policy/modules/services/oddjob.te
policy/modules/services/oident.te
policy/modules/services/openct.te
policy/modules/services/openvpn.te
policy/modules/services/pcscd.te
policy/modules/services/pegasus.te
policy/modules/services/piranha.fc [new file with mode: 0644]
policy/modules/services/piranha.if [new file with mode: 0644]
policy/modules/services/piranha.te [new file with mode: 0644]
policy/modules/services/plymouthd.te
policy/modules/services/policykit.fc
policy/modules/services/policykit.if
policy/modules/services/policykit.te
policy/modules/services/portreserve.fc
policy/modules/services/portreserve.if
policy/modules/services/portreserve.te
policy/modules/services/postfix.fc
policy/modules/services/postfix.if
policy/modules/services/postfix.te
policy/modules/services/postgresql.te
policy/modules/services/postgrey.te
policy/modules/services/ppp.te
policy/modules/services/prelude.te
policy/modules/services/privoxy.te
policy/modules/services/procmail.fc
policy/modules/services/procmail.if
policy/modules/services/procmail.te
policy/modules/services/psad.if
policy/modules/services/psad.te
policy/modules/services/puppet.te
policy/modules/services/pyzor.fc
policy/modules/services/pyzor.if
policy/modules/services/pyzor.te
policy/modules/services/qpidd.fc [new file with mode: 0644]
policy/modules/services/qpidd.if [new file with mode: 0644]
policy/modules/services/qpidd.te [new file with mode: 0644]
policy/modules/services/radius.te
policy/modules/services/radvd.te
policy/modules/services/razor.fc
policy/modules/services/razor.if
policy/modules/services/razor.te
policy/modules/services/remotelogin.te
policy/modules/services/rgmanager.fc
policy/modules/services/rgmanager.if
policy/modules/services/rgmanager.te
policy/modules/services/rhcs.fc
policy/modules/services/rhcs.if
policy/modules/services/rhcs.te
policy/modules/services/ricci.fc
policy/modules/services/ricci.if
policy/modules/services/ricci.te
policy/modules/services/rlogin.fc
policy/modules/services/rlogin.te
policy/modules/services/rpc.if
policy/modules/services/rpc.te
policy/modules/services/rpcbind.fc
policy/modules/services/rpcbind.if
policy/modules/services/rpcbind.te
policy/modules/services/rshd.te
policy/modules/services/rsync.if
policy/modules/services/rsync.te
policy/modules/services/rtkit.if
policy/modules/services/rtkit.te
policy/modules/services/samba.fc
policy/modules/services/samba.if
policy/modules/services/samba.te
policy/modules/services/sasl.te
policy/modules/services/sendmail.fc
policy/modules/services/sendmail.if
policy/modules/services/sendmail.te
policy/modules/services/setroubleshoot.if
policy/modules/services/setroubleshoot.te
policy/modules/services/smartmon.te
policy/modules/services/smokeping.te
policy/modules/services/snmp.fc
policy/modules/services/snmp.te
policy/modules/services/snort.te
policy/modules/services/spamassassin.fc
policy/modules/services/spamassassin.if
policy/modules/services/spamassassin.te
policy/modules/services/ssh.fc
policy/modules/services/ssh.if
policy/modules/services/ssh.te
policy/modules/services/sssd.te
policy/modules/services/stunnel.te
policy/modules/services/sysstat.te
policy/modules/services/telnet.te
policy/modules/services/tftp.if
policy/modules/services/tftp.te
policy/modules/services/tgtd.te
policy/modules/services/tor.te
policy/modules/services/tuned.te
policy/modules/services/ucspitcp.te
policy/modules/services/ulogd.te
policy/modules/services/usbmuxd.fc
policy/modules/services/uucp.te
policy/modules/services/varnishd.if
policy/modules/services/varnishd.te
policy/modules/services/vhostmd.if
policy/modules/services/vhostmd.te
policy/modules/services/virt.fc
policy/modules/services/virt.if
policy/modules/services/virt.te
policy/modules/services/w3c.te
policy/modules/services/xserver.fc
policy/modules/services/xserver.if
policy/modules/services/xserver.te
policy/modules/services/zabbix.te
policy/modules/services/zarafa.fc [new file with mode: 0644]
policy/modules/services/zarafa.if [new file with mode: 0644]
policy/modules/services/zarafa.te [new file with mode: 0644]
policy/modules/services/zebra.te
policy/modules/system/application.if
policy/modules/system/application.te
policy/modules/system/authlogin.fc
policy/modules/system/authlogin.if
policy/modules/system/authlogin.te
policy/modules/system/daemontools.if
policy/modules/system/daemontools.te
policy/modules/system/fstools.fc
policy/modules/system/fstools.te
policy/modules/system/getty.te
policy/modules/system/hostname.te
policy/modules/system/hotplug.te
policy/modules/system/init.fc
policy/modules/system/init.if
policy/modules/system/init.te
policy/modules/system/ipsec.fc
policy/modules/system/ipsec.if
policy/modules/system/ipsec.te
policy/modules/system/iptables.fc
policy/modules/system/iptables.if
policy/modules/system/iptables.te
policy/modules/system/iscsi.if
policy/modules/system/iscsi.te
policy/modules/system/kdump.te
policy/modules/system/libraries.fc
policy/modules/system/libraries.te
policy/modules/system/locallogin.fc
policy/modules/system/locallogin.te
policy/modules/system/logging.fc
policy/modules/system/logging.if
policy/modules/system/logging.te
policy/modules/system/lvm.fc
policy/modules/system/lvm.te
policy/modules/system/miscfiles.fc
policy/modules/system/miscfiles.if
policy/modules/system/miscfiles.te
policy/modules/system/modutils.if
policy/modules/system/modutils.te
policy/modules/system/mount.fc
policy/modules/system/mount.if
policy/modules/system/mount.te
policy/modules/system/raid.te
policy/modules/system/selinuxutil.fc
policy/modules/system/selinuxutil.if
policy/modules/system/selinuxutil.te
policy/modules/system/setrans.te
policy/modules/system/sosreport.fc [new file with mode: 0644]
policy/modules/system/sosreport.if [new file with mode: 0644]
policy/modules/system/sosreport.te [new file with mode: 0644]
policy/modules/system/sysnetwork.fc
policy/modules/system/sysnetwork.if
policy/modules/system/sysnetwork.te
policy/modules/system/udev.fc
policy/modules/system/udev.if
policy/modules/system/udev.te
policy/modules/system/unconfined.fc
policy/modules/system/unconfined.if
policy/modules/system/unconfined.te
policy/modules/system/userdomain.fc
policy/modules/system/userdomain.if
policy/modules/system/userdomain.te
policy/modules/system/xen.fc
policy/modules/system/xen.if
policy/modules/system/xen.te
policy/support/misc_patterns.spt
policy/support/obj_perm_sets.spt
policy/users
support/Makefile.devel