guido ([email protected])

Number of posts: 522 (522 per day)
First post: 2016-08-07 21:07:52
Last post: 2016-08-07 21:07:52

Date List Subject
2017-04-19 11:23:38 refpolicy [refpolicy] [PATCH] Gnome and Evolution dbus chat permissions
2017-04-18 18:04:22 refpolicy [refpolicy] [PATCH] Gnome and Evolution dbus chat permissions
2017-04-17 20:28:47 refpolicy [refpolicy] [PATCH] corecommands: new file contexts for Gnome applications
2017-04-17 16:46:43 refpolicy [refpolicy] [PATCH] some userdomain patches
2017-04-17 16:39:46 refpolicy [refpolicy] [PATCH] misc daemons
2017-04-17 13:54:18 refpolicy [refpolicy] [PATCH] login related stuff
2017-04-17 13:39:12 refpolicy [refpolicy] [PATCH] login related stuff
2017-04-17 13:06:55 refpolicy [refpolicy] [PATCH] login related stuff
2017-04-17 11:16:33 refpolicy [refpolicy] [PATCH 0/10] patchset description
2017-04-14 14:59:21 refpolicy [refpolicy] [PATCH v2 2/10] wm: interactive start
2017-04-14 14:21:38 refpolicy [refpolicy] [PATCH 2/10] wm: interactive start
2017-04-14 10:04:54 refpolicy [refpolicy] [PATCH v2 1/10] java: enable interactive use
2017-04-13 23:26:10 refpolicy [refpolicy] [PATCH 10/10] wm: load the NetworkManager applet
2017-04-13 23:25:59 refpolicy [refpolicy] [PATCH 9/10] userdomain: do not audit netlink socket creation attempts
2017-04-13 23:25:46 refpolicy [refpolicy] [PATCH 8/10] mozilla: add a permission
2017-04-13 23:25:37 refpolicy [refpolicy] [PATCH 7/10] mozilla: read hardware state information
2017-04-13 23:25:25 refpolicy [refpolicy] [PATCH 6/10] evolution: add some critical permissions
2017-04-13 23:25:11 refpolicy [refpolicy] [PATCH 5/10] evolution: do not audit kernel read state
2017-04-13 23:24:58 refpolicy [refpolicy] [PATCH 4/10] dbus: add process getcap permission
2017-04-13 23:24:47 refpolicy [refpolicy] [PATCH 3/10] evolution: add dbus acquire service permission
2017-04-13 23:24:37 refpolicy [refpolicy] [PATCH 2/10] wm: interactive start
2017-04-13 23:24:23 refpolicy [refpolicy] [PATCH 1/10] java: enable interactive use
2017-04-13 23:24:12 refpolicy [refpolicy] [PATCH 0/10] patchset description
2017-02-14 13:36:56 refpolicy [refpolicy] [PATCH 2/2 v2] cups/lpd: read permission for cupsd_var_run_t socket files
2017-02-14 00:31:59 refpolicy [refpolicy] [PATCH] mozilla: allow stream connections to cups so that it can print
2017-02-14 00:27:16 refpolicy [refpolicy] [PATCH] thunderbird: allow stream connections to cups so that it can print
2017-02-13 19:31:58 refpolicy [refpolicy] [PATCH] thunderbird: allow stream connections to cups so that it can print
2017-02-11 21:03:53 refpolicy [refpolicy] [PATCH 2/2] cups: read permission for cupsd_var_run_t socket files in cups_read_pid_files()
2017-02-11 20:51:08 refpolicy [refpolicy] [PATCH] bootloader: add permissions to read boot files in order to generate a configuration file
2017-02-11 20:18:05 refpolicy [refpolicy] [PATCH] bootloader: add permissions to read boot files in order to generate a configuration file
2017-02-11 20:13:40 refpolicy [refpolicy] [PATCH 2/2 v2] cups/lpd: read permission for cupsd_var_run_t socket files
2017-02-11 20:00:44 refpolicy [refpolicy] [PATCH 2/2] cups: read permission for cupsd_var_run_t socket files in cups_read_pid_files()
2017-02-09 16:26:23 refpolicy [refpolicy] [PATCH 2/2] cups: read permission for cupsd_var_run_t socket files in cups_read_pid_files()
2017-02-09 16:25:15 refpolicy [refpolicy] [PATCH 1/2] cups: read permission for cupsd_var_run_t socket files in cups_stream_connect()
2017-02-09 16:20:53 refpolicy [refpolicy] [PATCH] mozilla: allow stream connections to cups so that it can print
2017-02-08 05:45:33 refpolicy [refpolicy] [PATCH] bootloader: stricter permissions and more tailored file contexts
2017-02-07 23:39:48 refpolicy [refpolicy] [PATCH] bootloader: stricter permissions and more tailored file contexts
2017-02-07 23:32:32 refpolicy [refpolicy] [PATCH] bootloader: add permissions to read boot files in order to generate a configuration file
2017-02-07 23:12:27 refpolicy [refpolicy] [PATCH] bootloader: stricter permissions and more tailored file contexts
2017-02-07 22:52:10 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-31 14:19:51 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-30 20:55:25 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-29 22:43:33 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-29 20:59:55 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-29 20:29:07 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-20 01:06:09 refpolicy [refpolicy] [PATCH 2/2] cups: new interface to execute HPLIP applications in their own domain
2017-01-20 01:05:30 refpolicy [refpolicy] [PATCH 1/2] udev: execute HPLIP applications in their own domain
2017-01-17 23:11:25 refpolicy [refpolicy] Install Directory for Reference Policy?
2017-01-02 21:11:32 refpolicy [refpolicy] [PATCH v5] init: support sysvinit
2017-01-02 18:26:21 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2017-01-02 18:19:31 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")