sven.vermeulen ([email protected])

Number of posts: 973 (973 per day)
First post: 2010-12-29 18:56:11
Last post: 2010-12-29 18:56:11

Date List Subject
2014-12-31 16:09:58 refpolicy [refpolicy] [PATCH v2 6/6] Courier IMAP needs to manage the users' maildir
2014-12-31 16:09:57 refpolicy [refpolicy] [PATCH v2 5/6] Execute courier helper script after authentication
2014-12-31 16:09:56 refpolicy [refpolicy] [PATCH v2 4/6] Grant setuid/setgid to courier_pop_t
2014-12-31 16:09:55 refpolicy [refpolicy] [PATCH v2 3/6] Allow authdaemon to access selinux fs to check SELinux state
2014-12-31 16:09:54 refpolicy [refpolicy] [PATCH v2 2/6] Locate authdaemon socket and communicate with authdaemon
2014-12-31 16:09:53 refpolicy [refpolicy] [PATCH v2 1/6] Courier TCPd startup creates imapd.pid.lock and imapd.lock
2014-12-31 16:09:52 refpolicy [refpolicy] [PATCH v2 0/6] Courier IMAPd related policy changes
2014-12-31 16:09:25 refpolicy [refpolicy] [PATCH 6/6] Courier IMAP needs to manage the users' maildir
2014-12-31 16:04:44 refpolicy [refpolicy] [PATCH 2/6] Locate authdaemon socket and communicate with authdaemon
2014-12-30 20:21:39 refpolicy [refpolicy] [PATCH 6/6] Courier IMAP needs to manage the users' maildir
2014-12-30 20:21:38 refpolicy [refpolicy] [PATCH 5/6] Execute courier helper script after authentication
2014-12-30 20:21:37 refpolicy [refpolicy] [PATCH 4/6] Grant setuid/setgid to courier_pop_t
2014-12-30 20:21:36 refpolicy [refpolicy] [PATCH 3/6] Allow authdaemon to access selinux fs to check SELinux state
2014-12-30 20:21:35 refpolicy [refpolicy] [PATCH 2/6] Locate authdaemon socket and communicate with authdaemon
2014-12-30 20:21:34 refpolicy [refpolicy] [PATCH 1/6] Courier TCPd startup creates imapd.pid.lock and imapd.lock
2014-12-30 20:21:33 refpolicy [refpolicy] [PATCH 0/6] Courier IMAPd related policy changes
2014-12-23 17:14:48 refpolicy [refpolicy] What is security_file_type and auth_file_type?
2014-12-21 12:15:26 refpolicy [refpolicy] How to handle glibc-triggered behavior?
2014-12-21 10:11:28 refpolicy [refpolicy] What is security_file_type and auth_file_type?
2014-11-23 14:09:44 refpolicy [refpolicy] [PATCH 2/7] New sudo manages timestamp directory in /var/run/sudo
2014-11-22 21:19:47 refpolicy [refpolicy] [PATCH 2/7] New sudo manages timestamp directory in /var/run/sudo
2014-11-22 21:16:41 refpolicy [refpolicy] [PATCH v2 8/8] Add /var/lib/racoon as runtime directory for ipsec
2014-11-22 21:16:40 refpolicy [refpolicy] [PATCH v2 7/8] Add gfisk and efibootmgr as fsadm_exec_t
2014-11-22 21:16:39 refpolicy [refpolicy] [PATCH v2 6/8] Add in LightDM contexts
2014-11-22 21:16:38 refpolicy [refpolicy] [PATCH v2 5/8] Mark f2fs as a SELinux capable file system
2014-11-22 21:16:37 refpolicy [refpolicy] [PATCH v2 4/8] xfce4-notifyd is an executable
2014-11-22 21:16:36 refpolicy [refpolicy] [PATCH v2 3/8] New sudo manages timestamp directory in /var/run/sudo
2014-11-22 21:16:35 refpolicy [refpolicy] [PATCH v2 2/8] Add auth_pid_filetrans_pam_var_run
2014-11-22 21:16:34 refpolicy [refpolicy] [PATCH v2 1/8] Run grub(2)-mkconfig in bootloader domain
2014-11-22 21:16:33 refpolicy [refpolicy] [PATCH v2 0/8] Some simple core policy updates
2014-11-22 18:54:40 refpolicy [refpolicy] [PATCH 7/7] Add /var/lib/racoon as runtime directory for ipsec
2014-11-22 18:54:39 refpolicy [refpolicy] [PATCH 6/7] Add gfisk and efibootmgr as fsadm_exec_t
2014-11-22 18:54:38 refpolicy [refpolicy] [PATCH 5/7] Add in LightDM contexts
2014-11-22 18:54:37 refpolicy [refpolicy] [PATCH 4/7] Mark f2fs as a SELinux capable file system
2014-11-22 18:54:36 refpolicy [refpolicy] [PATCH 3/7] xfce4-notifyd is an executable
2014-11-22 18:54:35 refpolicy [refpolicy] [PATCH 2/7] New sudo manages timestamp directory in /var/run/sudo
2014-11-22 18:54:34 refpolicy [refpolicy] [PATCH 1/7] Run grub(2)-mkconfig in bootloader domain
2014-11-22 18:54:33 refpolicy [refpolicy] [PATCH 0/7] Some simple core policy updates
2014-08-15 09:39:31 refpolicy [refpolicy] [PATCH 4/5] Introduce the tmpfiles_t domain
2014-08-15 09:35:23 refpolicy [refpolicy] [PATCH 4/5] Introduce the tmpfiles_t domain
2014-08-15 09:31:46 refpolicy [refpolicy] [PATCH 1/5] Introduce interface allowing relabeling from/to non-security file types
2014-08-08 12:33:22 refpolicy [refpolicy] [PATCH 5/5] Introduce kernel_delete_unlabeled_chr_files
2014-08-08 12:33:21 refpolicy [refpolicy] [PATCH 4/5] Introduce kernel_delete_unlabeled_blk_files
2014-08-08 12:33:20 refpolicy [refpolicy] [PATCH 3/5] Introduce kernel_delete_unlabeled_sockets
2014-08-08 12:33:19 refpolicy [refpolicy] [PATCH 2/5] Introduce kernel_delete_unlabeled_pipes
2014-08-08 12:33:18 refpolicy [refpolicy] [PATCH 1/5] Introduce kernel_delete_unlabeled_symlinks
2014-08-08 12:33:17 refpolicy [refpolicy] [PATCH 0/5] Missing interface declarations
2014-08-08 12:16:36 refpolicy [refpolicy] [PATCH 8/8] Use domain_auto_trans, not auto_trans
2014-08-08 12:16:35 refpolicy [refpolicy] [PATCH 7/8] Use fs_search_tmpfs, not files_search_tmpfs
2014-08-08 12:16:34 refpolicy [refpolicy] [PATCH 6/8] Use corecmd_search_bin, not corecmd_searh_bin
2014-08-08 12:16:33 refpolicy [refpolicy] [PATCH 5/8] Use files_search_etc, not files_search_config