guido ([email protected])

Number of posts: 522 (522 per day)
First post: 2016-08-07 21:07:52
Last post: 2016-08-07 21:07:52

Date List Subject
2017-01-02 18:05:17 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2017-01-02 00:15:41 refpolicy [refpolicy] [PATCH] mozilla: execute evolution to send emails
2017-01-02 00:04:39 refpolicy [refpolicy] [PATCH v4] init: support sysvinit
2016-12-31 19:52:09 refpolicy [refpolicy] [PATCH v3] init: support sysvinit
2016-12-31 17:42:32 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-31 16:43:46 refpolicy [refpolicy] [PATCH v6] xserver: restrict executable memory permissions
2016-12-31 16:38:52 refpolicy [refpolicy] [PATCH v5] xserver: restrict executable memory permissions
2016-12-31 16:28:41 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-31 16:05:12 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-31 16:02:58 refpolicy [refpolicy] [PATCH v5] xserver: restrict executable memory permissions
2016-12-31 16:00:44 refpolicy [refpolicy] [PATCH v4] xserver: restrict executable memory permissions
2016-12-31 15:58:53 refpolicy [refpolicy] [PATCH v3] plymouth: use the correct running domain for the client
2016-12-30 22:28:37 refpolicy [refpolicy] [PATCH v2] init: update the initrc_t domain policy
2016-12-30 22:16:05 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 22:07:27 refpolicy [refpolicy] [PATCH v4] xserver: restrict executable memory permissions
2016-12-30 22:06:26 refpolicy [refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 21:23:19 refpolicy [refpolicy] [PATCH v2] plymouth: use the correct running domain for the client
2016-12-30 21:10:24 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-30 21:08:04 refpolicy [refpolicy] [PATCH] plymouth: use the correct running domain for the client
2016-12-30 21:06:14 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:53:03 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:50:07 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:19:29 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:15:57 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:09:16 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 18:59:47 refpolicy [refpolicy] [PATCH 2/2] networkmanager: add new wake_alarm permission (capability2)
2016-12-30 18:59:02 refpolicy [refpolicy] [PATCH 1/2] devicekit: add new wake_alarm permission (capability2)
2016-12-30 17:04:53 refpolicy [refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 01:42:47 refpolicy [refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 01:19:39 refpolicy [refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 00:36:59 refpolicy [refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 00:07:21 refpolicy [refpolicy] [PATCH] xserver: add xkb var library file context
2016-12-29 22:49:42 refpolicy [refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-29 22:26:34 refpolicy [refpolicy] [PATCH] cups: add cups-browsed executable fc
2016-12-29 22:13:04 refpolicy [refpolicy] [PATCH] kernel: add missing plymouth interface
2016-12-29 22:07:46 refpolicy [refpolicy] [PATCH] networkmanager: dbus chat with cups
2016-12-29 22:07:36 refpolicy [refpolicy] [PATCH] sysadm: add the shutdown role
2016-12-29 21:55:13 refpolicy [refpolicy] [PATCH v2] shutdown: minor update
2016-12-28 20:45:27 refpolicy [refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-28 19:56:16 refpolicy [refpolicy] [PATCH v2] xserver: restrict executable memory permissions (was "only run in confined mode and restrict execmem permissions")
2016-12-28 19:44:08 refpolicy [refpolicy] [PATCH v4 2/2] contrib: support the new interface to manage X session logs
2016-12-28 19:43:23 refpolicy [refpolicy] [PATCH v6 1/2] xserver: introduce new fc and interface to manage X session logs
2016-12-28 19:15:19 refpolicy [refpolicy] [PATCH v2] kernel: missing permissions for confined execution
2016-12-28 19:05:59 refpolicy [refpolicy] [PATCH v3 2/2] contrib: support the new interface to manage X session logs
2016-12-28 19:02:20 refpolicy [refpolicy] [PATCH v5 1/2] xserver: introduce new fc and interface to manage X session logs
2016-12-28 18:27:18 refpolicy [refpolicy] kmod_t CAP_SYS_ADMIN follow-up
2016-12-28 17:21:08 refpolicy [refpolicy] [PATCH] wm: read XKB lib files
2016-12-28 17:20:27 refpolicy [refpolicy] [PATCH] xserver: only run in confined mode and restrict execmem permissions
2016-12-28 15:45:11 refpolicy [refpolicy] [PATCH] kernel: never run in unconfined mode
2016-12-27 23:26:26 refpolicy [refpolicy] [PATCH] shutdown: minor update
2016-12-27 22:56:33 refpolicy [refpolicy] [PATCH v2] init: run sysvinit without the dangerous unconfined_domain() call