* Thu Feb 21 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-15
- Man pages are now generated in the build process - Allow cgred to list inotifyfs filesystem
This commit is contained in:
parent
a7c9a93681
commit
2aca9b6e0b
203061
policy-rawhide-base.patch
203061
policy-rawhide-base.patch
File diff suppressed because one or more lines are too long
@ -9847,7 +9847,7 @@ index 85ca63f..1d1c99c 100644
|
||||
admin_pattern($1, { cgconfig_etc_t cgrules_etc_t })
|
||||
files_list_etc($1)
|
||||
diff --git a/cgroup.te b/cgroup.te
|
||||
index fdee107..68d9b5f 100644
|
||||
index fdee107..eb7a3ac 100644
|
||||
--- a/cgroup.te
|
||||
+++ b/cgroup.te
|
||||
@@ -25,8 +25,8 @@ files_pid_file(cgred_var_run_t)
|
||||
@ -9900,13 +9900,14 @@ index fdee107..68d9b5f 100644
|
||||
allow cgred_t self:netlink_socket { write bind create read };
|
||||
allow cgred_t self:unix_dgram_socket { write create connect };
|
||||
|
||||
@@ -99,10 +102,9 @@ domain_setpriority_all_domains(cgred_t)
|
||||
@@ -99,10 +102,10 @@ domain_setpriority_all_domains(cgred_t)
|
||||
files_getattr_all_files(cgred_t)
|
||||
files_getattr_all_sockets(cgred_t)
|
||||
files_read_all_symlinks(cgred_t)
|
||||
-files_read_etc_files(cgred_t)
|
||||
|
||||
fs_write_cgroup_files(cgred_t)
|
||||
+fs_list_inotifyfs(cgred_t)
|
||||
|
||||
-logging_send_syslog_msg(cgred_t)
|
||||
+auth_use_nsswitch(cgred_t)
|
||||
|
@ -19,7 +19,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 3.12.1
|
||||
Release: 14%{?dist}
|
||||
Release: 15%{?dist}
|
||||
License: GPLv2+
|
||||
Group: System Environment/Base
|
||||
Source: serefpolicy-%{version}.tgz
|
||||
@ -528,6 +528,10 @@ SELinux Reference policy mls base module.
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Feb 21 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-15
|
||||
- Man pages are now generated in the build process
|
||||
- Allow cgred to list inotifyfs filesystem
|
||||
|
||||
* Wed Feb 20 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-14
|
||||
- Allow gluster to get attrs on all fs
|
||||
- New access required for virt-sandbox
|
||||
|
Loading…
Reference in New Issue
Block a user