public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/system/, policy/modules/kernel/, ...
@ 2012-10-10 19:52 Sven Vermeulen
  0 siblings, 0 replies; 4+ messages in thread
From: Sven Vermeulen @ 2012-10-10 19:52 UTC (permalink / raw
  To: gentoo-commits

commit:     cf0bfadb82973fe57377cba7d6f23e74e54f3cae
Author:     Chris PeBenito <cpebenito <AT> tresys <DOT> com>
AuthorDate: Tue Oct  9 15:01:42 2012 +0000
Commit:     Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
CommitDate: Wed Oct 10 19:50:12 2012 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=cf0bfadb

Module version bump for changes from Dominick Grift and Sven Vermeulen.

---
 policy/modules/admin/bootloader.te      |    2 +-
 policy/modules/kernel/corenetwork.te.in |    2 +-
 policy/modules/services/postgresql.te   |    2 +-
 policy/modules/system/sysnetwork.te     |    2 +-
 policy/modules/system/userdomain.te     |    2 +-
 5 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
index ab0439a..eeb8e69 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -1,4 +1,4 @@
-policy_module(bootloader, 1.13.0)
+policy_module(bootloader, 1.13.1)
 
 ########################################
 #

diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
index 76f4a50..2221f56 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -1,4 +1,4 @@
-policy_module(corenetwork, 1.18.2)
+policy_module(corenetwork, 1.18.3)
 
 ########################################
 #

diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
index 0617c72..0210aef 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -1,4 +1,4 @@
-policy_module(postgresql, 1.15.2)
+policy_module(postgresql, 1.15.3)
 
 gen_require(`
 	class db_database all_db_database_perms;

diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index f365bd0..ad95921 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -1,4 +1,4 @@
-policy_module(sysnetwork, 1.14.0)
+policy_module(sysnetwork, 1.14.2)
 
 ########################################
 #

diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
index 6a4bd85..a264a5b 100644
--- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te
@@ -1,4 +1,4 @@
-policy_module(userdomain, 4.8.0)
+policy_module(userdomain, 4.8.1)
 
 ########################################
 #


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/system/, policy/modules/kernel/, ...
@ 2013-05-01 18:23 Sven Vermeulen
  0 siblings, 0 replies; 4+ messages in thread
From: Sven Vermeulen @ 2013-05-01 18:23 UTC (permalink / raw
  To: gentoo-commits

commit:     bdd37f7b80383ed453fa24f10106d0e1ca33cf35
Author:     Chris PeBenito <cpebenito <AT> tresys <DOT> com>
AuthorDate: Wed Apr 24 20:14:52 2013 +0000
Commit:     Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
CommitDate: Wed May  1 18:20:10 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=bdd37f7b

Bump module versions for release.

---
 policy/modules/admin/bootloader.te      |    2 +-
 policy/modules/admin/netutils.te        |    2 +-
 policy/modules/admin/usermanage.te      |    2 +-
 policy/modules/kernel/corecommands.te   |    2 +-
 policy/modules/kernel/corenetwork.te.in |    2 +-
 policy/modules/kernel/devices.te        |    2 +-
 policy/modules/kernel/files.te          |    2 +-
 policy/modules/kernel/filesystem.te     |    2 +-
 policy/modules/kernel/kernel.te         |    2 +-
 policy/modules/kernel/mcs.te            |    2 +-
 policy/modules/kernel/terminal.te       |    2 +-
 policy/modules/roles/staff.te           |    2 +-
 policy/modules/roles/sysadm.te          |    2 +-
 policy/modules/roles/unprivuser.te      |    2 +-
 policy/modules/services/postgresql.te   |    2 +-
 policy/modules/services/ssh.te          |    2 +-
 policy/modules/services/xserver.te      |    2 +-
 policy/modules/system/authlogin.te      |    2 +-
 policy/modules/system/clock.te          |    2 +-
 policy/modules/system/fstools.te        |    2 +-
 policy/modules/system/getty.te          |    2 +-
 policy/modules/system/hotplug.te        |    2 +-
 policy/modules/system/init.te           |    2 +-
 policy/modules/system/ipsec.te          |    2 +-
 policy/modules/system/iptables.te       |    2 +-
 policy/modules/system/libraries.te      |    2 +-
 policy/modules/system/locallogin.te     |    2 +-
 policy/modules/system/logging.te        |    2 +-
 policy/modules/system/lvm.te            |    2 +-
 policy/modules/system/miscfiles.te      |    2 +-
 policy/modules/system/modutils.te       |    2 +-
 policy/modules/system/mount.te          |    2 +-
 policy/modules/system/sysnetwork.te     |    2 +-
 policy/modules/system/udev.te           |    2 +-
 policy/modules/system/userdomain.te     |    2 +-
 35 files changed, 35 insertions(+), 35 deletions(-)

diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
index e3dbbb8..0fd5c5f 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -1,4 +1,4 @@
-policy_module(bootloader, 1.13.2)
+policy_module(bootloader, 1.14.0)
 
 ########################################
 #

diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te
index 93be1a4..6fb14ea 100644
--- a/policy/modules/admin/netutils.te
+++ b/policy/modules/admin/netutils.te
@@ -1,4 +1,4 @@
-policy_module(netutils, 1.11.2)
+policy_module(netutils, 1.12.0)
 
 ########################################
 #

diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
index 626a6d6..2bd4f3d 100644
--- a/policy/modules/admin/usermanage.te
+++ b/policy/modules/admin/usermanage.te
@@ -1,4 +1,4 @@
-policy_module(usermanage, 1.18.2)
+policy_module(usermanage, 1.19.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/corecommands.te b/policy/modules/kernel/corecommands.te
index 6877f2c..8796c81 100644
--- a/policy/modules/kernel/corecommands.te
+++ b/policy/modules/kernel/corecommands.te
@@ -1,4 +1,4 @@
-policy_module(corecommands, 1.17.4)
+policy_module(corecommands, 1.18.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
index db913e9..886aafb 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -1,4 +1,4 @@
-policy_module(corenetwork, 1.18.4)
+policy_module(corenetwork, 1.19.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te
index 47c108b..6ef9c8a 100644
--- a/policy/modules/kernel/devices.te
+++ b/policy/modules/kernel/devices.te
@@ -1,4 +1,4 @@
-policy_module(devices, 1.14.5)
+policy_module(devices, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
index 5977857..9854fe3 100644
--- a/policy/modules/kernel/files.te
+++ b/policy/modules/kernel/files.te
@@ -1,4 +1,4 @@
-policy_module(files, 1.17.6)
+policy_module(files, 1.18.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
index a1b7495..1c66416 100644
--- a/policy/modules/kernel/filesystem.te
+++ b/policy/modules/kernel/filesystem.te
@@ -1,4 +1,4 @@
-policy_module(filesystem, 1.16.3)
+policy_module(filesystem, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
index 3f93458..397a25e 100644
--- a/policy/modules/kernel/kernel.te
+++ b/policy/modules/kernel/kernel.te
@@ -1,4 +1,4 @@
-policy_module(kernel, 1.16.1)
+policy_module(kernel, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/mcs.te b/policy/modules/kernel/mcs.te
index 5cbeb54..2da98c2 100644
--- a/policy/modules/kernel/mcs.te
+++ b/policy/modules/kernel/mcs.te
@@ -1,4 +1,4 @@
-policy_module(mcs, 1.2.1)
+policy_module(mcs, 1.3.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/terminal.te b/policy/modules/kernel/terminal.te
index c0b88bf..224e500 100644
--- a/policy/modules/kernel/terminal.te
+++ b/policy/modules/kernel/terminal.te
@@ -1,4 +1,4 @@
-policy_module(terminal, 1.10.1)
+policy_module(terminal, 1.11.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
index 236097d..29720e4 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
@@ -1,4 +1,4 @@
-policy_module(staff, 2.3.1)
+policy_module(staff, 2.4.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
index de82808..07ece08 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -1,4 +1,4 @@
-policy_module(sysadm, 2.5.1)
+policy_module(sysadm, 2.6.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
index c64f441..484faf4 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
@@ -1,4 +1,4 @@
-policy_module(unprivuser, 2.3.1)
+policy_module(unprivuser, 2.4.0)
 
 # this module should be named user, but that is
 # a compile error since user is a keyword.

diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
index 346d011..0306134 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -1,4 +1,4 @@
-policy_module(postgresql, 1.15.4)
+policy_module(postgresql, 1.16.0)
 
 gen_require(`
 	class db_database all_db_database_perms;

diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
index 5fc0391..eada65c 100644
--- a/policy/modules/services/ssh.te
+++ b/policy/modules/services/ssh.te
@@ -1,4 +1,4 @@
-policy_module(ssh, 2.3.3)
+policy_module(ssh, 2.4.0)
 
 ########################################
 #

diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 595e61f..00fc505 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -1,4 +1,4 @@
-policy_module(xserver, 3.8.4)
+policy_module(xserver, 3.9.0)
 
 gen_require(`
 	class x_drawable all_x_drawable_perms;

diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
index 3dd9196..ec0af2c 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -1,4 +1,4 @@
-policy_module(authlogin, 2.4.2)
+policy_module(authlogin, 2.5.0)
 
 ########################################
 #

diff --git a/policy/modules/system/clock.te b/policy/modules/system/clock.te
index 3694bfe..edece47 100644
--- a/policy/modules/system/clock.te
+++ b/policy/modules/system/clock.te
@@ -1,4 +1,4 @@
-policy_module(clock, 1.6.2)
+policy_module(clock, 1.7.0)
 
 ########################################
 #

diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
index d66d59c..3452b85 100644
--- a/policy/modules/system/fstools.te
+++ b/policy/modules/system/fstools.te
@@ -1,4 +1,4 @@
-policy_module(fstools, 1.15.1)
+policy_module(fstools, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te
index fc38c9c..f6743ea 100644
--- a/policy/modules/system/getty.te
+++ b/policy/modules/system/getty.te
@@ -1,4 +1,4 @@
-policy_module(getty, 1.9.1)
+policy_module(getty, 1.10.0)
 
 ########################################
 #

diff --git a/policy/modules/system/hotplug.te b/policy/modules/system/hotplug.te
index bb5c4a6..b2097e7 100644
--- a/policy/modules/system/hotplug.te
+++ b/policy/modules/system/hotplug.te
@@ -1,4 +1,4 @@
-policy_module(hotplug, 1.15.1)
+policy_module(hotplug, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 1b48f45..0257c17 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -1,4 +1,4 @@
-policy_module(init, 1.19.7)
+policy_module(init, 1.20.0)
 
 gen_require(`
 	class passwd rootok;

diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
index 9e54bf9..312cd04 100644
--- a/policy/modules/system/ipsec.te
+++ b/policy/modules/system/ipsec.te
@@ -1,4 +1,4 @@
-policy_module(ipsec, 1.13.3)
+policy_module(ipsec, 1.14.0)
 
 ########################################
 #

diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
index ab5623f..be8ed1e 100644
--- a/policy/modules/system/iptables.te
+++ b/policy/modules/system/iptables.te
@@ -1,4 +1,4 @@
-policy_module(iptables, 1.13.2)
+policy_module(iptables, 1.14.0)
 
 ########################################
 #

diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te
index 23a645e..54f8fa5 100644
--- a/policy/modules/system/libraries.te
+++ b/policy/modules/system/libraries.te
@@ -1,4 +1,4 @@
-policy_module(libraries, 2.9.2)
+policy_module(libraries, 2.10.0)
 
 ########################################
 #

diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
index c04ac46..446fa99 100644
--- a/policy/modules/system/locallogin.te
+++ b/policy/modules/system/locallogin.te
@@ -1,4 +1,4 @@
-policy_module(locallogin, 1.11.1)
+policy_module(locallogin, 1.12.0)
 
 ########################################
 #

diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
index 08b70ae..5ff27c0 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -1,4 +1,4 @@
-policy_module(logging, 1.19.7)
+policy_module(logging, 1.20.0)
 
 ########################################
 #

diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
index 86ad358..febfb77 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -1,4 +1,4 @@
-policy_module(lvm, 1.14.1)
+policy_module(lvm, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/system/miscfiles.te b/policy/modules/system/miscfiles.te
index 4aa3478..e60f80d 100644
--- a/policy/modules/system/miscfiles.te
+++ b/policy/modules/system/miscfiles.te
@@ -1,4 +1,4 @@
-policy_module(miscfiles, 1.10.2)
+policy_module(miscfiles, 1.11.0)
 
 ########################################
 #

diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
index cab8bdc..7649321 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -1,4 +1,4 @@
-policy_module(modutils, 1.13.3)
+policy_module(modutils, 1.14.0)
 
 ########################################
 #

diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index 8697900..6752255 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -1,4 +1,4 @@
-policy_module(mount, 1.15.2)
+policy_module(mount, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index 6d1bc2f..327beca 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -1,4 +1,4 @@
-policy_module(sysnetwork, 1.14.6)
+policy_module(sysnetwork, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index 00a47d9..f2344a1 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -1,4 +1,4 @@
-policy_module(udev, 1.15.5)
+policy_module(udev, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
index 9da3e54..6a0f24b 100644
--- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te
@@ -1,4 +1,4 @@
-policy_module(userdomain, 4.8.6)
+policy_module(userdomain, 4.9.0)
 
 ########################################
 #


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/system/, policy/modules/kernel/, ...
@ 2014-03-17  8:24 Sven Vermeulen
  0 siblings, 0 replies; 4+ messages in thread
From: Sven Vermeulen @ 2014-03-17  8:24 UTC (permalink / raw
  To: gentoo-commits

commit:     13f83f0575fad09b7904fa68baad76389d8f6d16
Author:     Chris PeBenito <cpebenito <AT> tresys <DOT> com>
AuthorDate: Tue Mar 11 12:16:57 2014 +0000
Commit:     Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Mon Mar 17 08:19:06 2014 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=13f83f05

Bump module versions for release.

---
 policy/modules/admin/bootloader.te      | 2 +-
 policy/modules/admin/dmesg.te           | 2 +-
 policy/modules/admin/netutils.te        | 2 +-
 policy/modules/admin/usermanage.te      | 2 +-
 policy/modules/kernel/corecommands.te   | 2 +-
 policy/modules/kernel/corenetwork.te.in | 2 +-
 policy/modules/kernel/devices.te        | 2 +-
 policy/modules/kernel/files.te          | 2 +-
 policy/modules/kernel/filesystem.te     | 2 +-
 policy/modules/kernel/kernel.te         | 2 +-
 policy/modules/kernel/selinux.te        | 2 +-
 policy/modules/kernel/storage.te        | 2 +-
 policy/modules/kernel/terminal.te       | 2 +-
 policy/modules/roles/staff.te           | 2 +-
 policy/modules/roles/sysadm.te          | 2 +-
 policy/modules/roles/unprivuser.te      | 2 +-
 policy/modules/services/ssh.te          | 2 +-
 policy/modules/services/xserver.te      | 2 +-
 policy/modules/system/authlogin.te      | 2 +-
 policy/modules/system/clock.te          | 2 +-
 policy/modules/system/fstools.te        | 2 +-
 policy/modules/system/hostname.te       | 2 +-
 policy/modules/system/hotplug.te        | 2 +-
 policy/modules/system/init.te           | 2 +-
 policy/modules/system/iptables.te       | 2 +-
 policy/modules/system/libraries.te      | 2 +-
 policy/modules/system/locallogin.te     | 2 +-
 policy/modules/system/logging.te        | 2 +-
 policy/modules/system/lvm.te            | 2 +-
 policy/modules/system/modutils.te       | 2 +-
 policy/modules/system/mount.te          | 2 +-
 policy/modules/system/selinuxutil.te    | 2 +-
 policy/modules/system/setrans.te        | 2 +-
 policy/modules/system/sysnetwork.te     | 2 +-
 policy/modules/system/udev.te           | 2 +-
 policy/modules/system/unconfined.te     | 2 +-
 policy/modules/system/userdomain.te     | 2 +-
 37 files changed, 37 insertions(+), 37 deletions(-)

diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
index 5b21248..4b837a8 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -1,4 +1,4 @@
-policy_module(bootloader, 1.14.2)
+policy_module(bootloader, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/admin/dmesg.te b/policy/modules/admin/dmesg.te
index 914a836..ee07743 100644
--- a/policy/modules/admin/dmesg.te
+++ b/policy/modules/admin/dmesg.te
@@ -1,4 +1,4 @@
-policy_module(dmesg, 1.3.1)
+policy_module(dmesg, 1.4.0)
 
 ########################################
 #

diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te
index c44c359..7aa7384 100644
--- a/policy/modules/admin/netutils.te
+++ b/policy/modules/admin/netutils.te
@@ -1,4 +1,4 @@
-policy_module(netutils, 1.12.1)
+policy_module(netutils, 1.13.0)
 
 ########################################
 #

diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
index 7bfba16..4855693 100644
--- a/policy/modules/admin/usermanage.te
+++ b/policy/modules/admin/usermanage.te
@@ -1,4 +1,4 @@
-policy_module(usermanage, 1.19.1)
+policy_module(usermanage, 1.20.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/corecommands.te b/policy/modules/kernel/corecommands.te
index eabf979..3c243cb 100644
--- a/policy/modules/kernel/corecommands.te
+++ b/policy/modules/kernel/corecommands.te
@@ -1,4 +1,4 @@
-policy_module(corecommands, 1.18.3)
+policy_module(corecommands, 1.19.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
index 06ae4dc..fc18a14 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -1,4 +1,4 @@
-policy_module(corenetwork, 1.19.2)
+policy_module(corenetwork, 1.20.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te
index f87ea59..14c178e 100644
--- a/policy/modules/kernel/devices.te
+++ b/policy/modules/kernel/devices.te
@@ -1,4 +1,4 @@
-policy_module(devices, 1.15.1)
+policy_module(devices, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
index faaaf51..cdc1801 100644
--- a/policy/modules/kernel/files.te
+++ b/policy/modules/kernel/files.te
@@ -1,4 +1,4 @@
-policy_module(files, 1.18.3)
+policy_module(files, 1.19.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
index e3b00ef..0e09942 100644
--- a/policy/modules/kernel/filesystem.te
+++ b/policy/modules/kernel/filesystem.te
@@ -1,4 +1,4 @@
-policy_module(filesystem, 1.17.3)
+policy_module(filesystem, 1.18.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
index f6b1062..196c2c2 100644
--- a/policy/modules/kernel/kernel.te
+++ b/policy/modules/kernel/kernel.te
@@ -1,4 +1,4 @@
-policy_module(kernel, 1.17.5)
+policy_module(kernel, 1.18.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/selinux.te b/policy/modules/kernel/selinux.te
index e0a973b..d289ba3 100644
--- a/policy/modules/kernel/selinux.te
+++ b/policy/modules/kernel/selinux.te
@@ -1,4 +1,4 @@
-policy_module(selinux, 1.12.1)
+policy_module(selinux, 1.13.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/storage.te b/policy/modules/kernel/storage.te
index c86d8da..45a8856 100644
--- a/policy/modules/kernel/storage.te
+++ b/policy/modules/kernel/storage.te
@@ -1,4 +1,4 @@
-policy_module(storage, 1.11.1)
+policy_module(storage, 1.12.0)
 
 ########################################
 #

diff --git a/policy/modules/kernel/terminal.te b/policy/modules/kernel/terminal.te
index 66e116a..e05079a 100644
--- a/policy/modules/kernel/terminal.te
+++ b/policy/modules/kernel/terminal.te
@@ -1,4 +1,4 @@
-policy_module(terminal, 1.11.1)
+policy_module(terminal, 1.12.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
index 0053832..abc38c0 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
@@ -1,4 +1,4 @@
-policy_module(staff, 2.4.1)
+policy_module(staff, 2.5.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
index 427dc14..bdaf706 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -1,4 +1,4 @@
-policy_module(sysadm, 2.6.1)
+policy_module(sysadm, 2.7.0)
 
 ########################################
 #

diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
index 914c394..e9319d0 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
@@ -1,4 +1,4 @@
-policy_module(unprivuser, 2.4.1)
+policy_module(unprivuser, 2.5.0)
 
 # this module should be named user, but that is
 # a compile error since user is a keyword.

diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
index 141d76c..536a2d9 100644
--- a/policy/modules/services/ssh.te
+++ b/policy/modules/services/ssh.te
@@ -1,4 +1,4 @@
-policy_module(ssh, 2.4.5)
+policy_module(ssh, 2.5.0)
 
 ########################################
 #

diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index c4739fc..6366abf 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -1,4 +1,4 @@
-policy_module(xserver, 3.9.6)
+policy_module(xserver, 3.10.0)
 
 gen_require(`
 	class x_drawable all_x_drawable_perms;

diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
index b9ac3b0..06db47e 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -1,4 +1,4 @@
-policy_module(authlogin, 2.5.3)
+policy_module(authlogin, 2.6.0)
 
 ########################################
 #

diff --git a/policy/modules/system/clock.te b/policy/modules/system/clock.te
index a3cc2ef..fc9448d 100644
--- a/policy/modules/system/clock.te
+++ b/policy/modules/system/clock.te
@@ -1,4 +1,4 @@
-policy_module(clock, 1.7.1)
+policy_module(clock, 1.8.0)
 
 ########################################
 #

diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
index 653d0b9..b876224 100644
--- a/policy/modules/system/fstools.te
+++ b/policy/modules/system/fstools.te
@@ -1,4 +1,4 @@
-policy_module(fstools, 1.16.6)
+policy_module(fstools, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/system/hostname.te b/policy/modules/system/hostname.te
index 07f83b5..e4aa486 100644
--- a/policy/modules/system/hostname.te
+++ b/policy/modules/system/hostname.te
@@ -1,4 +1,4 @@
-policy_module(hostname, 1.8.3)
+policy_module(hostname, 1.9.0)
 
 ########################################
 #

diff --git a/policy/modules/system/hotplug.te b/policy/modules/system/hotplug.te
index fb17059..856ddff 100644
--- a/policy/modules/system/hotplug.te
+++ b/policy/modules/system/hotplug.te
@@ -1,4 +1,4 @@
-policy_module(hotplug, 1.16.1)
+policy_module(hotplug, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 8811584..20d17da 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -1,4 +1,4 @@
-policy_module(init, 1.20.6)
+policy_module(init, 1.21.0)
 
 gen_require(`
 	class passwd rootok;

diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
index 6f5426b..2c52a41 100644
--- a/policy/modules/system/iptables.te
+++ b/policy/modules/system/iptables.te
@@ -1,4 +1,4 @@
-policy_module(iptables, 1.14.1)
+policy_module(iptables, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te
index 9990801..6e56c05 100644
--- a/policy/modules/system/libraries.te
+++ b/policy/modules/system/libraries.te
@@ -1,4 +1,4 @@
-policy_module(libraries, 2.10.1)
+policy_module(libraries, 2.11.0)
 
 ########################################
 #

diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
index c083ccd..03c26f0 100644
--- a/policy/modules/system/locallogin.te
+++ b/policy/modules/system/locallogin.te
@@ -1,4 +1,4 @@
-policy_module(locallogin, 1.12.1)
+policy_module(locallogin, 1.13.0)
 
 ########################################
 #

diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
index c7c7176..37a3368 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -1,4 +1,4 @@
-policy_module(logging, 1.20.4)
+policy_module(logging, 1.21.0)
 
 ########################################
 #

diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
index d338dc0..c9fba08 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -1,4 +1,4 @@
-policy_module(lvm, 1.15.4)
+policy_module(lvm, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
index d51a148..f52e72a 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -1,4 +1,4 @@
-policy_module(modutils, 1.14.1)
+policy_module(modutils, 1.15.0)
 
 ########################################
 #

diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index 8ae8b7c..5cd97be 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -1,4 +1,4 @@
-policy_module(mount, 1.16.7)
+policy_module(mount, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
index 4d912bf..305ef69 100644
--- a/policy/modules/system/selinuxutil.te
+++ b/policy/modules/system/selinuxutil.te
@@ -1,4 +1,4 @@
-policy_module(selinuxutil, 1.17.4)
+policy_module(selinuxutil, 1.18.0)
 
 gen_require(`
 	bool secure_mode;

diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te
index c89a531..d98b5b2 100644
--- a/policy/modules/system/setrans.te
+++ b/policy/modules/system/setrans.te
@@ -1,4 +1,4 @@
-policy_module(setrans, 1.8.2)
+policy_module(setrans, 1.9.0)
 
 gen_require(`
 	class context contains;

diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index bfd9435..1523924 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -1,4 +1,4 @@
-policy_module(sysnetwork, 1.15.6)
+policy_module(sysnetwork, 1.16.0)
 
 ########################################
 #

diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index 5f7a894..4cda050 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -1,4 +1,4 @@
-policy_module(udev, 1.16.6)
+policy_module(udev, 1.17.0)
 
 ########################################
 #

diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
index db881b1..9742a34 100644
--- a/policy/modules/system/unconfined.te
+++ b/policy/modules/system/unconfined.te
@@ -1,4 +1,4 @@
-policy_module(unconfined, 3.5.4)
+policy_module(unconfined, 3.6.0)
 
 ########################################
 #

diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
index 4c06557..c85e4d6 100644
--- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te
@@ -1,4 +1,4 @@
-policy_module(userdomain, 4.9.3)
+policy_module(userdomain, 4.10.0)
 
 ########################################
 #


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/system/, policy/modules/kernel/, ...
@ 2014-10-12  8:27 Sven Vermeulen
  0 siblings, 0 replies; 4+ messages in thread
From: Sven Vermeulen @ 2014-10-12  8:27 UTC (permalink / raw
  To: gentoo-commits

commit:     465454fc28242165142d26bacbca592ca0565849
Author:     Chris PeBenito <cpebenito <AT> tresys <DOT> com>
AuthorDate: Wed Sep 24 17:10:37 2014 +0000
Commit:     Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Sun Oct 12 08:24:27 2014 +0000
URL:        http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=465454fc

Drop RHEL4 and RHEL5 support.

---
 Makefile                           |  5 ----
 README                             |  7 +++--
 Rules.monolithic                   |  7 -----
 policy/modules/admin/su.if         | 54 --------------------------------------
 policy/modules/kernel/kernel.if    | 16 -----------
 policy/modules/kernel/selinux.if   | 20 --------------
 policy/modules/kernel/selinux.te   | 10 -------
 policy/modules/services/xserver.te |  8 ------
 policy/modules/system/init.if      | 24 -----------------
 9 files changed, 3 insertions(+), 148 deletions(-)

diff --git a/Makefile b/Makefile
index 70b213a..09fae9d 100644
--- a/Makefile
+++ b/Makefile
@@ -188,11 +188,6 @@ ifneq ($(DISTRO),)
 	M4PARAM += -D distro_$(DISTRO)
 endif
 
-# rhel4 also implies redhat
-ifeq "$(DISTRO)" "rhel4"
-	M4PARAM += -D distro_redhat
-endif
-
 ifeq "$(DISTRO)" "ubuntu"
 	M4PARAM += -D distro_debian
 endif

diff --git a/README b/README
index a3e8082..9a97ecf 100644
--- a/README
+++ b/README
@@ -95,10 +95,9 @@ NAME			String (optional).  Sets the name of the policy; the
 			set, the policy type (TYPE) is used.
 
 DISTRO			String (optional).  Enable distribution-specific policy.
-			Available options are redhat, rhel4, gentoo, debian,
-			and suse.  This option controls distro_redhat,
-			distro_rhel4, distro_gentoo, distro_debian, and
-			distro_suse policy blocks.
+			Available options are redhat, gentoo, and debian.
+			This option controls distro_redhat, distro_gentoo, and
+			distro_debian build option policy blocks.
 
 MONOLITHIC		Boolean.  If set, a monolithic policy is built,
 			otherwise a modular policy is built.

diff --git a/Rules.monolithic b/Rules.monolithic
index 6505550..d2de916 100644
--- a/Rules.monolithic
+++ b/Rules.monolithic
@@ -195,13 +195,6 @@ $(fcpath): $(fc) $(loadpath) $(userpath)/system.users
 	$(verbose) $(INSTALL) -m 0644 $(fc) $(fcpath)
 	$(verbose) $(INSTALL) -m 0644 $(homedir_template) $(homedirpath)
 	$(verbose) $(UMASK) 022 ; $(genhomedircon) -d $(topdir) -t $(NAME) $(USEPWD)
-ifeq "$(DISTRO)" "rhel4"
-# Setfiles in RHEL4 does not look at file_contexts.homedirs.
-	$(verbose) cat $@.homedirs >> $@
-# Delete the file_contexts.homedirs in case the toolchain has
-# been updated, to prevent duplicate match errors.
-	$(verbose) rm -f $@.homedirs
-endif
 
 ########################################
 #

diff --git a/policy/modules/admin/su.if b/policy/modules/admin/su.if
index 5437f9c..aea8a4f 100644
--- a/policy/modules/admin/su.if
+++ b/policy/modules/admin/su.if
@@ -100,25 +100,6 @@ template(`su_restricted_domain_template', `
 		')
 	')
 
-	ifdef(`distro_rhel4',`
-		domain_role_change_exemption($1_su_t)
-		domain_subj_id_change_exemption($1_su_t)
-		domain_obj_id_change_exemption($1_su_t)
-
-		selinux_get_fs_mount($1_su_t)
-		selinux_validate_context($1_su_t)
-		selinux_compute_access_vector($1_su_t)
-		selinux_compute_create_context($1_su_t)
-		selinux_compute_relabel_context($1_su_t)
-		selinux_compute_user_contexts($1_su_t)
-
-		seutil_read_config($1_su_t)
-		seutil_read_default_contexts($1_su_t)
-
-		# Only allow transitions to unprivileged user domains.
-		userdom_spec_domtrans_unpriv_users($1_su_t)
-	')
-
 	ifdef(`hide_broken_symptoms',`
 		# dontaudit leaked sockets from parent
 		dontaudit $1_su_t $2:socket_class_set { read write };
@@ -246,41 +227,6 @@ template(`su_role_template',`
 		')
 	')
 
-	ifdef(`distro_rhel4',`
-		domain_role_change_exemption($1_su_t)
-		domain_subj_id_change_exemption($1_su_t)
-		domain_obj_id_change_exemption($1_su_t)
-
-		selinux_get_fs_mount($1_su_t)
-		selinux_validate_context($1_su_t)
-		selinux_compute_create_context($1_su_t)
-		selinux_compute_relabel_context($1_su_t)
-		selinux_compute_user_contexts($1_su_t)
-
-		# Relabel ttys and ptys.
-		term_relabel_all_ttys($1_su_t)
-		term_relabel_all_ptys($1_su_t)
-		# Close and re-open ttys and ptys to get the fd into the correct domain.
-		term_use_all_ttys($1_su_t)
-		term_use_all_ptys($1_su_t)
-
-		seutil_read_config($1_su_t)
-		seutil_read_default_contexts($1_su_t)
-
-		if(secure_mode) {
-			# Only allow transitions to unprivileged user domains.
-			userdom_spec_domtrans_unpriv_users($1_su_t)
-		} else {
-			# Allow transitions to all user domains
-			userdom_spec_domtrans_all_users($1_su_t)
-		}
-
-		optional_policy(`
-			unconfined_domtrans($1_su_t)
-			unconfined_signal($1_su_t)
-		')
-	')
-
 	ifdef(`hide_broken_symptoms',`
 		# dontaudit leaked sockets from parent
 		dontaudit $1_su_t $3:socket_class_set { read write };

diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index c100068..faa19d7 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -495,14 +495,6 @@ interface(`kernel_change_ring_buffer_level',`
 
 	allow $1 self:capability2 syslog;
 	allow $1 kernel_t:system syslog_console;
-
-	ifdef(`distro_rhel4',`
-		allow $1 self:capability sys_admin;
-	')
-
-	ifdef(`distro_rhel5',`
-		allow $1 self:capability sys_admin;
-	')
 ')
 
 ########################################
@@ -523,14 +515,6 @@ interface(`kernel_clear_ring_buffer',`
 
 	allow $1 self:capability2 syslog;
 	allow $1 kernel_t:system syslog_mod;
-
-	ifdef(`distro_rhel4',`
-		allow $1 self:capability sys_admin;
-	')
-
-	ifdef(`distro_rhel5',`
-		allow $1 self:capability sys_admin;
-	')
 ')
 
 ########################################

diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
index 9192d23..8d5feca 100644
--- a/policy/modules/kernel/selinux.if
+++ b/policy/modules/kernel/selinux.if
@@ -334,11 +334,6 @@ interface(`selinux_set_enforce_mode',`
 
 	if(!secure_mode_policyload) {
 		allow $1 security_t:security setenforce;
-
-		ifdef(`distro_rhel4',`
-			# needed for systems without audit support
-			auditallow $1 security_t:security setenforce;
-		')
 	}
 ')
 
@@ -366,11 +361,6 @@ interface(`selinux_load_policy',`
 
 	if(!secure_mode_policyload) {
 		allow $1 security_t:security load_policy;
-
-		ifdef(`distro_rhel4',`
-			# needed for systems without audit support
-			auditallow $1 security_t:security load_policy;
-		')
 	}
 ')
 
@@ -460,11 +450,6 @@ interface(`selinux_set_generic_booleans',`
 	allow $1 security_t:file rw_file_perms;
 
 	allow $1 security_t:security setbool;
-
-	ifdef(`distro_rhel4',`
-		# needed for systems without audit support
-		auditallow $1 security_t:security setbool;
-	')
 ')
 
 ########################################
@@ -504,11 +489,6 @@ interface(`selinux_set_all_booleans',`
 
 	allow $1 security_t:security setbool;
 
-	ifdef(`distro_rhel4',`
-		# needed for systems without audit support
-		auditallow $1 security_t:security setbool;
-	')
-
 	if(!secure_mode_policyload) {
 		allow $1 secure_mode_policyload_t:file write_file_perms;
 	}

diff --git a/policy/modules/kernel/selinux.te b/policy/modules/kernel/selinux.te
index 4f94796..1908c34 100644
--- a/policy/modules/kernel/selinux.te
+++ b/policy/modules/kernel/selinux.te
@@ -54,17 +54,7 @@ allow selinux_unconfined_type { boolean_type -secure_mode_policyload_t }:file wr
 # Access the security API.
 allow selinux_unconfined_type security_t:security ~{ load_policy setenforce };
 
-ifdef(`distro_rhel4',`
-	# needed for systems without audit support
-	auditallow selinux_unconfined_type security_t:security setbool;
-')
-
 if(!secure_mode_policyload) {
 	allow selinux_unconfined_type security_t:security { load_policy setenforce };
 	allow selinux_unconfined_type secure_mode_policyload_t:file write_file_perms;
-
-	ifdef(`distro_rhel4',`
-		# needed for systems without audit support
-		auditallow selinux_unconfined_type security_t:security { load_policy setenforce };
-	')
 }

diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 3eb114f..ee3773d 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -573,10 +573,6 @@ optional_policy(`
 	ifndef(`distro_redhat',`
 		allow xdm_t self:process { execheap execmem };
 	')
-
-	ifdef(`distro_rhel4',`
-		allow xdm_t self:process { execheap execmem };
-	')
 ')
 
 optional_policy(`
@@ -749,10 +745,6 @@ userdom_rw_user_tmpfs_files(xserver_t)
 
 xserver_use_user_fonts(xserver_t)
 
-ifdef(`distro_rhel4',`
-	allow xserver_t self:process { execmem execheap execstack };
-')
-
 ifdef(`enable_mls',`
 	range_transition xserver_t xserver_tmp_t:sock_file s0 - mls_systemhigh;
 	range_transition xserver_t xserver_t:x_drawable s0 - mls_systemhigh;

diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
index 76ef0dc..36eb078 100644
--- a/policy/modules/system/init.if
+++ b/policy/modules/system/init.if
@@ -108,14 +108,6 @@ interface(`init_domain',`
 	role system_r types $1;
 
 	domtrans_pattern(init_t, $2, $1)
-
-	ifdef(`hide_broken_symptoms',`
-		# RHEL4 systems seem to have a stray
-		# fds open from the initrd
-		ifdef(`distro_rhel4',`
-			kernel_dontaudit_use_fds($1)
-		')
-	')
 ')
 
 ########################################
@@ -253,14 +245,6 @@ interface(`init_daemon_domain',`
 		userdom_dontaudit_use_user_terminals($1)
 	')
 
-	ifdef(`hide_broken_symptoms',`
-		# RHEL4 systems seem to have a stray
-		# fds open from the initrd
-		ifdef(`distro_rhel4',`
-			kernel_dontaudit_use_fds($1)
-		')
-	')
-
 	optional_policy(`
 		nscd_use($1)
 	')
@@ -373,14 +357,6 @@ interface(`init_system_domain',`
 	role system_r types $1;
 
 	domtrans_pattern(initrc_t, $2, $1)
-
-	ifdef(`hide_broken_symptoms',`
-		# RHEL4 systems seem to have a stray
-		# fds open from the initrd
-		ifdef(`distro_rhel4',`
-			kernel_dontaudit_use_fds($1)
-		')
-	')
 ')
 
 ########################################


^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2014-10-12  8:27 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-03-17  8:24 [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/system/, policy/modules/kernel/, Sven Vermeulen
  -- strict thread matches above, loose matches on Subject: below --
2014-10-12  8:27 Sven Vermeulen
2013-05-01 18:23 Sven Vermeulen
2012-10-10 19:52 Sven Vermeulen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox