selinux-refpolicy/policy
Guido Trentalancia ff8675f1c8 userdomain: allow netlink_kobject_uvent_socket creation
Not auditing this turns out to be the wrong choice for
several reasons.

For normal application functioning the user domain
should be able to create netlink_kobject_uvent_socket
sockets.

Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
2017-08-06 11:14:37 -04:00
..
flask Add nnp_nosuid_transition policycap and related class/perm definitions. 2017-08-05 12:13:21 -04:00
modules userdomain: allow netlink_kobject_uvent_socket creation 2017-08-06 11:14:37 -04:00
support refpolicy: Define and allow map permission 2017-05-24 19:53:14 -04:00
constraints remove trailing whitespaces 2016-12-06 13:45:13 +01:00
context_defaults
global_booleans
global_tunables user_udp_server tunable 2016-08-02 19:44:16 -04:00
mcs remove trailing whitespaces 2016-12-06 13:45:13 +01:00
mls remove trailing whitespaces 2016-12-06 13:45:13 +01:00
policy_capabilities Add cgroup_seclabel policycap. 2017-08-05 12:15:02 -04:00
users