Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
E external_sepolicy
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • halo
  • external_sepolicy
  • Repository

Switch branch/tag
  • external_sepolicy
  • adbd.te
Find file BlameHistoryPermalink
  • Stephen Smalley's avatar
    Allow all domains to read the log devices. · 2b732237
    Stephen Smalley authored Apr 04, 2013
    
    
    Read access to /dev/log/* is no longer restricted.
    Filtering on reads is performed per-uid by the kernel logger driver.
    
    Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    2b732237
adbd.te 1.45 KB
EditWeb IDE

Replace adbd.te

Attach a file by drag & drop or click to upload


Cancel
A new branch will be created in your fork and a new merge request will be started.