Passwd in single user mode needs to talk to console_device_t
Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio
locate tried to read a symbolic link, will dontaudit
New labels for telepathy-sunshine content in homedir
Google is storing other binaries under /opt/google/talkplugin
bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug
Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15
modemmanger and bluetooth send dbus messages to devicekit_power
Samba needs to getquota on filesystems labeld samba_share_t
Allow nsplugin_t to read lnk files in nsplugin_rw_t
New labeling for packagekit scripts to bin_t
Allow mount_t to delete etc_t
Allow fsdaemon_t to read usr_t files
- Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets
- Allow confined users to read xdm_etc_t files
- Allow xdm_t to transition to xauth_t for lxdm program
Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets
Allow confined users to read xdm_etc_t files
Allow xdm_t to transition to xauth_t for lxdm program
Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba.
Add label for /var/log/slim.log
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Use permission sets where possible.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
Tunable, optional and if(n)def blocks go below.
The process and capability IPC goes on top of local policy.
The process and capability IPC goes on top of local policy.
The process and capability IPC goes on top of local policy.
Redundant: Included userdom_user_home_content already has this.
Redundant: Included userdom_user_home_content already has this.
Redundant: Included userdom_search_user_home_dirs already has this.
Redundant: Included userdom_user_home_content already has this.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Reduntant: Included init_daemon_domain already has this.
Reduntant: Included init_daemon_domain already has this.
Reduntant: Included init_daemon_domain already has this.
Reduntant: Included init_daemon_domain already has this.
Reduntant: Included init_daemon_domain already has this.
Redundant: Included inetd_tcp_service_domain has this.
Redundant: Included inetd_tcp_service_domain has this. Conditional init_daemon_domain has it also.
Redundant: Included inetd_tcp_service_domain has this.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes.