From: "Jason Zaman" <perfinion@gentoo.org> To: gentoo-commits@lists.gentoo.org Subject: [gentoo-commits] proj/hardened-refpolicy:next commit in: policy/modules/system/ Date: Wed, 14 Oct 2015 18:36:24 +0000 (UTC) [thread overview] Message-ID: <1444746101.5522373aa919d8f9ee0e1937e9f031ad35c07c4a.perfinion@gentoo> (raw) commit: 5522373aa919d8f9ee0e1937e9f031ad35c07c4a Author: Jason Zaman <jason <AT> perfinion <DOT> com> AuthorDate: Sun Oct 11 10:37:56 2015 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Tue Oct 13 14:21:41 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=5522373a system/ipsec: Add policy for StrongSwan Adds an ipsec_supervisor_t domain for StrongSwan's starter. Thanks to Matthias Dahl for most of the work on this. policy/modules/system/ipsec.fc | 17 ++++++++++++ policy/modules/system/ipsec.te | 61 +++++++++++++++++++++++++++++++++++++++--- 2 files changed, 75 insertions(+), 3 deletions(-) diff --git a/policy/modules/system/ipsec.fc b/policy/modules/system/ipsec.fc index 0f1e351..d42b08e 100644 --- a/policy/modules/system/ipsec.fc +++ b/policy/modules/system/ipsec.fc @@ -10,6 +10,14 @@ /etc/ipsec\.d(/.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) +/etc/strongswan\.conf -- gen_context(system_u:object_r:ipsec_conf_file_t,s0) + +/etc/strongswan\.d(/.*)? gen_context(system_u:object_r:ipsec_conf_file_t,s0) + +/etc/swanctl/(.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) +/etc/swanctl -d gen_context(system_u:object_r:ipsec_conf_file_t,s0) +/etc/swanctl/swanctl.conf -- gen_context(system_u:object_r:ipsec_conf_file_t,s0) + /sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) /usr/lib/ipsec/_plutoload -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) @@ -19,17 +27,25 @@ /usr/lib/ipsec/pluto -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/lib/ipsec/spi -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/_copyright -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/_plutoload -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/libexec/ipsec/_plutorun -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) +/usr/libexec/ipsec/_updown -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/charon -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/eroute -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/klipsdebug -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/lookip -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/pluto -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/scepclient -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/spi -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/starter -- gen_context(system_u:object_r:ipsec_supervisor_exec_t,s0) +/usr/libexec/ipsec/stroke -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/nm-openswan-service -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/sbin/ipsec -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/sbin/racoon -- gen_context(system_u:object_r:racoon_exec_t,s0) /usr/sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) +/usr/sbin/swanctl -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /var/lib/racoon(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) @@ -39,5 +55,6 @@ /var/racoon(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) +/var/run/charon\.(.*)? -- gen_context(system_u:object_r:ipsec_var_run_t,s0) /var/run/pluto(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) /var/run/racoon\.pid -- gen_context(system_u:object_r:ipsec_var_run_t,s0) diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 3734bd4..2d8b686 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -67,19 +67,25 @@ type setkey_exec_t; init_system_domain(setkey_t, setkey_exec_t) role system_r types setkey_t; +type ipsec_supervisor_t; +type ipsec_supervisor_exec_t; +init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t); +role system_r types ipsec_supervisor_t; + ######################################## # # ipsec Local policy # -allow ipsec_t self:capability { net_admin dac_override dac_read_search setpcap sys_nice }; +allow ipsec_t self:capability { chown dac_override dac_read_search setgid setuid setpcap net_admin sys_nice }; dontaudit ipsec_t self:capability { sys_ptrace sys_tty_config }; allow ipsec_t self:process { getcap setcap getsched signal setsched }; allow ipsec_t self:tcp_socket create_stream_socket_perms; allow ipsec_t self:udp_socket create_socket_perms; allow ipsec_t self:key_socket create_socket_perms; -allow ipsec_t self:fifo_file read_fifo_file_perms; +allow ipsec_t self:fifo_file rw_fifo_file_perms; allow ipsec_t self:netlink_xfrm_socket create_netlink_socket_perms; +allow ipsec_t self:netlink_route_socket rw_netlink_socket_perms; allow ipsec_t ipsec_initrc_exec_t:file read_file_perms; @@ -113,7 +119,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write }; allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld }; kernel_read_kernel_sysctls(ipsec_t) -kernel_read_net_sysctls(ipsec_t) +kernel_rw_net_sysctls(ipsec_t); kernel_list_proc(ipsec_t) kernel_read_proc_symlinks(ipsec_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -196,6 +202,8 @@ allow ipsec_mgmt_t self:udp_socket create_socket_perms; allow ipsec_mgmt_t self:key_socket create_socket_perms; allow ipsec_mgmt_t self:fifo_file rw_fifo_file_perms; +allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull }; + allow ipsec_mgmt_t ipsec_mgmt_lock_t:file manage_file_perms; files_lock_filetrans(ipsec_mgmt_t, ipsec_mgmt_lock_t, file) @@ -236,6 +244,7 @@ can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t) allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read; domtrans_pattern(ipsec_mgmt_t, ipsec_exec_t, ipsec_t) +domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t); kernel_rw_net_sysctls(ipsec_mgmt_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -444,6 +453,52 @@ seutil_read_config(setkey_t) userdom_use_user_terminals(setkey_t) +######################################## +# +# ipsec_supervisor policy +# + +allow ipsec_supervisor_t self:capability { dac_read_search dac_override kill net_admin }; +allow ipsec_supervisor_t self:process { signal }; +allow ipsec_supervisor_t self:fifo_file rw_fifo_file_perms; +allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms; +allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms; + +allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms; +read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t); + +manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) + +allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto }; +allow ipsec_supervisor_t ipsec_t:process { signal }; + +allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink }; +manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) +manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) +files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file }) + +domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t); + +kernel_read_network_state(ipsec_supervisor_t) +kernel_read_system_state(ipsec_supervisor_t) +kernel_rw_net_sysctls(ipsec_supervisor_t); + +corecmd_exec_bin(ipsec_supervisor_t); +corecmd_exec_shell(ipsec_supervisor_t) + +dev_read_rand(ipsec_supervisor_t); +dev_read_urand(ipsec_supervisor_t); + +files_read_etc_files(ipsec_supervisor_t); + +logging_send_syslog_msg(ipsec_supervisor_t); + +miscfiles_read_localization(ipsec_supervisor_t); + +optional_policy(` + modutils_domtrans_insmod(ipsec_supervisor_t) +') + ifdef(`distro_gentoo',` ################################################ #
WARNING: multiple messages have this Message-ID (diff)
From: "Jason Zaman" <perfinion@gentoo.org> To: gentoo-commits@lists.gentoo.org Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ Date: Tue, 13 Oct 2015 14:50:55 +0000 (UTC) [thread overview] Message-ID: <1444746101.5522373aa919d8f9ee0e1937e9f031ad35c07c4a.perfinion@gentoo> (raw) Message-ID: <20151013145055.-6eM-aZGJOm-TdaJkumGbDAhxfiIOsRW41S0Ln8A6BE@z> (raw) commit: 5522373aa919d8f9ee0e1937e9f031ad35c07c4a Author: Jason Zaman <jason <AT> perfinion <DOT> com> AuthorDate: Sun Oct 11 10:37:56 2015 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Tue Oct 13 14:21:41 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=5522373a system/ipsec: Add policy for StrongSwan Adds an ipsec_supervisor_t domain for StrongSwan's starter. Thanks to Matthias Dahl for most of the work on this. policy/modules/system/ipsec.fc | 17 ++++++++++++ policy/modules/system/ipsec.te | 61 +++++++++++++++++++++++++++++++++++++++--- 2 files changed, 75 insertions(+), 3 deletions(-) diff --git a/policy/modules/system/ipsec.fc b/policy/modules/system/ipsec.fc index 0f1e351..d42b08e 100644 --- a/policy/modules/system/ipsec.fc +++ b/policy/modules/system/ipsec.fc @@ -10,6 +10,14 @@ /etc/ipsec\.d(/.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) +/etc/strongswan\.conf -- gen_context(system_u:object_r:ipsec_conf_file_t,s0) + +/etc/strongswan\.d(/.*)? gen_context(system_u:object_r:ipsec_conf_file_t,s0) + +/etc/swanctl/(.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) +/etc/swanctl -d gen_context(system_u:object_r:ipsec_conf_file_t,s0) +/etc/swanctl/swanctl.conf -- gen_context(system_u:object_r:ipsec_conf_file_t,s0) + /sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) /usr/lib/ipsec/_plutoload -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) @@ -19,17 +27,25 @@ /usr/lib/ipsec/pluto -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/lib/ipsec/spi -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/_copyright -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/_plutoload -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/libexec/ipsec/_plutorun -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) +/usr/libexec/ipsec/_updown -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/charon -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/eroute -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/klipsdebug -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/lookip -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/pluto -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/scepclient -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/ipsec/spi -- gen_context(system_u:object_r:ipsec_exec_t,s0) +/usr/libexec/ipsec/starter -- gen_context(system_u:object_r:ipsec_supervisor_exec_t,s0) +/usr/libexec/ipsec/stroke -- gen_context(system_u:object_r:ipsec_exec_t,s0) /usr/libexec/nm-openswan-service -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/sbin/ipsec -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /usr/sbin/racoon -- gen_context(system_u:object_r:racoon_exec_t,s0) /usr/sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) +/usr/sbin/swanctl -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) /var/lib/racoon(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) @@ -39,5 +55,6 @@ /var/racoon(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) +/var/run/charon\.(.*)? -- gen_context(system_u:object_r:ipsec_var_run_t,s0) /var/run/pluto(/.*)? gen_context(system_u:object_r:ipsec_var_run_t,s0) /var/run/racoon\.pid -- gen_context(system_u:object_r:ipsec_var_run_t,s0) diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 3734bd4..2d8b686 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -67,19 +67,25 @@ type setkey_exec_t; init_system_domain(setkey_t, setkey_exec_t) role system_r types setkey_t; +type ipsec_supervisor_t; +type ipsec_supervisor_exec_t; +init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t); +role system_r types ipsec_supervisor_t; + ######################################## # # ipsec Local policy # -allow ipsec_t self:capability { net_admin dac_override dac_read_search setpcap sys_nice }; +allow ipsec_t self:capability { chown dac_override dac_read_search setgid setuid setpcap net_admin sys_nice }; dontaudit ipsec_t self:capability { sys_ptrace sys_tty_config }; allow ipsec_t self:process { getcap setcap getsched signal setsched }; allow ipsec_t self:tcp_socket create_stream_socket_perms; allow ipsec_t self:udp_socket create_socket_perms; allow ipsec_t self:key_socket create_socket_perms; -allow ipsec_t self:fifo_file read_fifo_file_perms; +allow ipsec_t self:fifo_file rw_fifo_file_perms; allow ipsec_t self:netlink_xfrm_socket create_netlink_socket_perms; +allow ipsec_t self:netlink_route_socket rw_netlink_socket_perms; allow ipsec_t ipsec_initrc_exec_t:file read_file_perms; @@ -113,7 +119,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write }; allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld }; kernel_read_kernel_sysctls(ipsec_t) -kernel_read_net_sysctls(ipsec_t) +kernel_rw_net_sysctls(ipsec_t); kernel_list_proc(ipsec_t) kernel_read_proc_symlinks(ipsec_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -196,6 +202,8 @@ allow ipsec_mgmt_t self:udp_socket create_socket_perms; allow ipsec_mgmt_t self:key_socket create_socket_perms; allow ipsec_mgmt_t self:fifo_file rw_fifo_file_perms; +allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull }; + allow ipsec_mgmt_t ipsec_mgmt_lock_t:file manage_file_perms; files_lock_filetrans(ipsec_mgmt_t, ipsec_mgmt_lock_t, file) @@ -236,6 +244,7 @@ can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t) allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read; domtrans_pattern(ipsec_mgmt_t, ipsec_exec_t, ipsec_t) +domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t); kernel_rw_net_sysctls(ipsec_mgmt_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -444,6 +453,52 @@ seutil_read_config(setkey_t) userdom_use_user_terminals(setkey_t) +######################################## +# +# ipsec_supervisor policy +# + +allow ipsec_supervisor_t self:capability { dac_read_search dac_override kill net_admin }; +allow ipsec_supervisor_t self:process { signal }; +allow ipsec_supervisor_t self:fifo_file rw_fifo_file_perms; +allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms; +allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms; + +allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms; +read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t); + +manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) + +allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto }; +allow ipsec_supervisor_t ipsec_t:process { signal }; + +allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink }; +manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) +manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) +files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file }) + +domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t); + +kernel_read_network_state(ipsec_supervisor_t) +kernel_read_system_state(ipsec_supervisor_t) +kernel_rw_net_sysctls(ipsec_supervisor_t); + +corecmd_exec_bin(ipsec_supervisor_t); +corecmd_exec_shell(ipsec_supervisor_t) + +dev_read_rand(ipsec_supervisor_t); +dev_read_urand(ipsec_supervisor_t); + +files_read_etc_files(ipsec_supervisor_t); + +logging_send_syslog_msg(ipsec_supervisor_t); + +miscfiles_read_localization(ipsec_supervisor_t); + +optional_policy(` + modutils_domtrans_insmod(ipsec_supervisor_t) +') + ifdef(`distro_gentoo',` ################################################ #
next reply other threads:[~2015-10-14 18:36 UTC|newest] Thread overview: 99+ messages / expand[flat|nested] mbox.gz Atom feed top 2015-10-14 18:36 Jason Zaman [this message] 2015-10-13 14:50 ` [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ Jason Zaman -- strict thread matches above, loose matches on Subject: below -- 2017-09-10 14:03 [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-09-10 14:03 Jason Zaman 2017-05-07 17:41 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-05-07 17:47 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-03-30 17:06 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-03-30 17:09 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-27 11:40 Jason Zaman 2017-02-27 11:24 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-02-27 11:40 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-27 10:50 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-02-27 11:40 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-27 10:50 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-02-27 11:40 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-25 16:58 Jason Zaman 2017-02-25 16:58 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-02-25 16:58 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-25 16:58 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-02-25 16:58 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2017-02-25 14:59 Jason Zaman 2017-02-25 14:59 Jason Zaman 2017-02-25 14:59 Jason Zaman 2017-02-25 14:59 Jason Zaman 2017-01-01 16:37 Jason Zaman 2017-01-01 16:37 Jason Zaman 2017-01-01 16:36 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2017-01-01 16:37 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-12-08 5:03 Jason Zaman 2016-12-08 4:47 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-12-08 5:03 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-12-08 4:47 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-12-08 5:03 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-12-06 14:24 Jason Zaman 2016-12-06 13:39 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-12-06 14:24 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-12-06 13:39 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-12-06 14:24 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-10-24 17:14 Sven Vermeulen 2016-10-24 17:00 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 17:14 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 17:13 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 17:13 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 17:13 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 17:13 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:47 [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 17:13 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 16:03 Sven Vermeulen 2016-10-24 15:45 [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 16:03 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2016-10-24 15:44 Jason Zaman 2016-10-03 6:26 Jason Zaman 2016-10-03 6:26 Jason Zaman 2016-10-03 6:26 Jason Zaman 2016-08-17 16:59 Jason Zaman 2016-08-17 16:59 Jason Zaman 2016-08-17 16:59 Jason Zaman 2016-08-17 16:59 Jason Zaman 2016-08-17 16:59 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-08-17 16:59 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-08-13 18:35 Jason Zaman 2016-08-13 18:32 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-08-13 18:35 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-08-13 18:32 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2016-08-13 18:35 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2016-05-26 19:28 Jason Zaman 2016-05-26 17:39 Jason Zaman 2016-05-26 15:54 Jason Zaman 2016-05-26 15:54 Jason Zaman 2016-05-26 15:54 Jason Zaman 2015-12-18 4:14 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2015-12-18 4:14 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-12-17 18:52 Jason Zaman 2015-12-17 18:49 Jason Zaman 2015-12-17 18:49 Jason Zaman 2015-12-17 16:10 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2015-12-17 18:49 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-10-26 5:48 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2015-10-26 5:36 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-10-26 5:36 Jason Zaman 2015-10-26 5:36 Jason Zaman 2015-10-14 18:36 Jason Zaman 2015-10-14 18:36 Jason Zaman 2015-10-11 10:48 Jason Zaman 2015-08-02 19:05 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2015-08-02 19:06 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-07-11 19:57 Jason Zaman 2015-03-29 10:01 Jason Zaman 2015-03-25 16:01 Jason Zaman 2015-03-24 13:25 Jason Zaman 2015-03-04 17:03 Sven Vermeulen 2015-02-09 9:58 [gentoo-commits] proj/hardened-refpolicy:adminroles " Jason Zaman 2015-02-09 9:55 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-02-09 9:55 Jason Zaman 2015-01-29 9:12 [gentoo-commits] proj/hardened-refpolicy:master " Jason Zaman 2015-01-29 8:38 ` [gentoo-commits] proj/hardened-refpolicy:next " Jason Zaman 2015-01-29 8:38 Jason Zaman 2015-01-29 6:51 Jason Zaman 2015-01-29 6:51 Jason Zaman 2015-01-29 6:51 Jason Zaman 2015-01-25 13:46 Sven Vermeulen 2015-01-25 13:46 Sven Vermeulen 2015-01-20 15:08 Jason Zaman 2015-01-20 15:08 Jason Zaman 2014-11-28 11:16 Sven Vermeulen 2014-11-28 10:17 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-28 10:04 Sven Vermeulen 2014-11-23 14:06 [gentoo-commits] proj/hardened-refpolicy:bitcoin " Sven Vermeulen 2014-11-28 10:04 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2014-11-22 19:02 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2014-11-28 10:04 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2014-10-12 9:13 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2014-10-12 8:44 ` [gentoo-commits] proj/hardened-refpolicy:next " Sven Vermeulen 2014-08-20 17:10 Jason Zaman
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1444746101.5522373aa919d8f9ee0e1937e9f031ad35c07c4a.perfinion@gentoo \ --to=perfinion@gentoo.org \ --cc=gentoo-commits@lists.gentoo.org \ --cc=gentoo-dev@lists.gentoo.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox