All of lore.kernel.org
 help / color / mirror / Atom feed
* more info
@ 2018-09-05 21:21 info
  0 siblings, 0 replies; 5+ messages in thread
From: info @ 2018-09-05 21:21 UTC (permalink / raw)
  To: linux-kernel

Good day,

I have an interesting business offer for you which will be of immense benefit to you. Although this may be hard to believe and thought of as one of the numerous online scam but
Please grant me the benefit of doubt and write me to know what this entails, am sure you wont regret it. You stand to gain 50% of $27,500,000.00 million USD from this.
All conformable documents to back up the claims will be made available to you prior to your acceptance. 

Thanks,
Diana Cesar.


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: more info
  2002-04-25  0:05 ` more info Guilhem Tardy
@ 2002-04-25  0:34   ` Paul Davis
  0 siblings, 0 replies; 5+ messages in thread
From: Paul Davis @ 2002-04-25  0:34 UTC (permalink / raw)
  To: Guilhem Tardy; +Cc: alsa-devel

>Could anyone point to me a reference for the following (or explain to me
>directly what is the purpose of each of those functions) in the PCM module:
>
>	prepare:	snd_xxxx_capture_prepare,
>	trigger:	snd_xxxx_trigger,
>	pointer:	snd_xxxx_pointer,
>	copy:		snd_xxxx_capture_copy,
>	silence:	snd_xxxx_capture_silence,

search for "prepare" and "trigger" in the archives, and you should find
takashi's basic explanation of what the functions do. then come back
and ask more specific questions. 

>Plus, what is the fifo size (e.g. on the card)?

i'm not sure its relevant for cards with DMA. can't tell you more.

--p

^ permalink raw reply	[flat|nested] 5+ messages in thread

* more info
  2002-04-24 16:58 documentation Takashi Iwai
@ 2002-04-25  0:05 ` Guilhem Tardy
  2002-04-25  0:34   ` Paul Davis
  0 siblings, 1 reply; 5+ messages in thread
From: Guilhem Tardy @ 2002-04-25  0:05 UTC (permalink / raw)
  To: alsa-devel

Hi all,

Could anyone point to me a reference for the following (or explain to me
directly what is the purpose of each of those functions) in the PCM module:

	prepare:	snd_xxxx_capture_prepare,
	trigger:	snd_xxxx_trigger,
	pointer:	snd_xxxx_pointer,
	copy:		snd_xxxx_capture_copy,
	silence:	snd_xxxx_capture_silence,

Plus, what is the fifo size (e.g. on the card)?

Thanks,
Guilhem.


__________________________________________________
Do You Yahoo!?
Yahoo! Games - play chess, backgammon, pool and more
http://games.yahoo.com/

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: more info
  2002-01-16 19:40 Shaun Savage
@ 2002-01-16 20:09 ` Stephen Smalley
  0 siblings, 0 replies; 5+ messages in thread
From: Stephen Smalley @ 2002-01-16 20:09 UTC (permalink / raw)
  To: Shaun Savage; +Cc: SELinux


On Wed, 16 Jan 2002, Shaun Savage wrote:

> During the load process I get
>
> ss: loading .....
> security: 5 users, 6roles, 391 types
> security: 29 classes, 74171 rules
> security: context root:sysadm_r:ipchains_t is invalid

This error is because you didn't authorize the ipchains_t domain for the
sysadm_r role, due to your typo (sysadm_t instead of sysadm_r).  From the
perspective of the security server, you just defined a new role named
sysadm_t that is authorized for ipchains_t.  Roles and types exist in
separate namespaces, so this doesn't show up as a policy compiler error.

--
Stephen D. Smalley, NAI Labs
ssmalley@nai.com




--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* more info
@ 2002-01-16 19:40 Shaun Savage
  2002-01-16 20:09 ` Stephen Smalley
  0 siblings, 1 reply; 5+ messages in thread
From: Shaun Savage @ 2002-01-16 19:40 UTC (permalink / raw)
  To: SELinux

[-- Attachment #1: Type: text/plain, Size: 239 bytes --]

During the load process I get

ss: loading .....
security: 5 users, 6roles, 391 types
security: 29 classes, 74171 rules
security: context root:sysadm_r:ipchains_t is invalid

Why/How is it invalid?

attached is the new ipchains.te

Shaun 

[-- Attachment #2: ipchains.te --]
[-- Type: text/plain, Size: 1194 bytes --]

#
# Authors:  Justin Smith <jsmith@mcs.drexel.edu>
#

role sysadm_t types { ipchains_t };
domain_auto_trans(sysadm_t, ipchains_exec_t, ipchains_t)

allow tripwire_t sysadm_tty_device_t:chr_file rw_file_perms;
allow tripwire_t sysadm_devpts_t:chr_file rw_file_perms;
allow tripwire_t sysadm_gph_t:fd inherit_fd_perms;
 
auditallow sysadm_t ipchains_t:process transition;
auditallow sysadm_t ipchains_exec_t:process transition;
auditallow sysadm_t ipchains_exec_t:file execute;

#
# Rules for the ipchains_t domain.
#
type ipchains_t, domain, privlog;
type ipchains_exec_t, file_type, sysadmfile, exec_type;
type ipchains_var_run_t, file_type, sysadmfile, pidfile;

domain_auto_trans(ipchains_t, insmod_exec_t, insmod_t)

domain_auto_trans(ipchains_t, ifconfig_exec_t, ifconfig_t)
file_type_auto_trans(ipchains_t, var_run_t, ipchains_var_run_t)
uses_shlib(ipchains_t)

# Inherit and use descriptors from init.
allow ipchains_t init_t:fd inherit_fd_perms;

allow ipchains_t bin_t:file { execute execute_no_trans };
allow ipchains_t ipchains_exec_t:file { execute_no_trans };
allow ipchains_t ipchains_t:capability { net_admin net_raw };
allow ipchains_t ipchains_t:rawip_socket { create setopt };

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2018-09-05 21:28 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-05 21:21 more info info
  -- strict thread matches above, loose matches on Subject: below --
2002-04-24 16:58 documentation Takashi Iwai
2002-04-25  0:05 ` more info Guilhem Tardy
2002-04-25  0:34   ` Paul Davis
2002-01-16 19:40 Shaun Savage
2002-01-16 20:09 ` Stephen Smalley

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.