LinuxLists
Users
About
guido (
[email protected]
)
Number of posts: 522 (522 per day)
First post: 2016-08-07 21:07:52
Last post: 2016-08-07 21:07:52
Previous Page
/
Next Page
Date
List
Subject
2017-01-02 18:05:17
refpolicy
[refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2017-01-02 00:15:41
refpolicy
[refpolicy] [PATCH] mozilla: execute evolution to send emails
2017-01-02 00:04:39
refpolicy
[refpolicy] [PATCH v4] init: support sysvinit
2016-12-31 19:52:09
refpolicy
[refpolicy] [PATCH v3] init: support sysvinit
2016-12-31 17:42:32
refpolicy
[refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-31 16:43:46
refpolicy
[refpolicy] [PATCH v6] xserver: restrict executable memory permissions
2016-12-31 16:38:52
refpolicy
[refpolicy] [PATCH v5] xserver: restrict executable memory permissions
2016-12-31 16:28:41
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-31 16:05:12
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-31 16:02:58
refpolicy
[refpolicy] [PATCH v5] xserver: restrict executable memory permissions
2016-12-31 16:00:44
refpolicy
[refpolicy] [PATCH v4] xserver: restrict executable memory permissions
2016-12-31 15:58:53
refpolicy
[refpolicy] [PATCH v3] plymouth: use the correct running domain for the client
2016-12-30 22:28:37
refpolicy
[refpolicy] [PATCH v2] init: update the initrc_t domain policy
2016-12-30 22:16:05
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 22:07:27
refpolicy
[refpolicy] [PATCH v4] xserver: restrict executable memory permissions
2016-12-30 22:06:26
refpolicy
[refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 21:23:19
refpolicy
[refpolicy] [PATCH v2] plymouth: use the correct running domain for the client
2016-12-30 21:10:24
refpolicy
[refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-30 21:08:04
refpolicy
[refpolicy] [PATCH] plymouth: use the correct running domain for the client
2016-12-30 21:06:14
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:53:03
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:50:07
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:19:29
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:15:57
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 20:09:16
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-30 18:59:47
refpolicy
[refpolicy] [PATCH 2/2] networkmanager: add new wake_alarm permission (capability2)
2016-12-30 18:59:02
refpolicy
[refpolicy] [PATCH 1/2] devicekit: add new wake_alarm permission (capability2)
2016-12-30 17:04:53
refpolicy
[refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 01:42:47
refpolicy
[refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 01:19:39
refpolicy
[refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 00:36:59
refpolicy
[refpolicy] [PATCH v3] xserver: restrict executable memory permissions
2016-12-30 00:07:21
refpolicy
[refpolicy] [PATCH] xserver: add xkb var library file context
2016-12-29 22:49:42
refpolicy
[refpolicy] [PATCH] init: update the initrc_t domain policy
2016-12-29 22:26:34
refpolicy
[refpolicy] [PATCH] cups: add cups-browsed executable fc
2016-12-29 22:13:04
refpolicy
[refpolicy] [PATCH] kernel: add missing plymouth interface
2016-12-29 22:07:46
refpolicy
[refpolicy] [PATCH] networkmanager: dbus chat with cups
2016-12-29 22:07:36
refpolicy
[refpolicy] [PATCH] sysadm: add the shutdown role
2016-12-29 21:55:13
refpolicy
[refpolicy] [PATCH v2] shutdown: minor update
2016-12-28 20:45:27
refpolicy
[refpolicy] [PATCH v2] init: support sysvinit (was "run sysvinit without the dangerous unconfined_domain() call")
2016-12-28 19:56:16
refpolicy
[refpolicy] [PATCH v2] xserver: restrict executable memory permissions (was "only run in confined mode and restrict execmem permissions")
2016-12-28 19:44:08
refpolicy
[refpolicy] [PATCH v4 2/2] contrib: support the new interface to manage X session logs
2016-12-28 19:43:23
refpolicy
[refpolicy] [PATCH v6 1/2] xserver: introduce new fc and interface to manage X session logs
2016-12-28 19:15:19
refpolicy
[refpolicy] [PATCH v2] kernel: missing permissions for confined execution
2016-12-28 19:05:59
refpolicy
[refpolicy] [PATCH v3 2/2] contrib: support the new interface to manage X session logs
2016-12-28 19:02:20
refpolicy
[refpolicy] [PATCH v5 1/2] xserver: introduce new fc and interface to manage X session logs
2016-12-28 18:27:18
refpolicy
[refpolicy] kmod_t CAP_SYS_ADMIN follow-up
2016-12-28 17:21:08
refpolicy
[refpolicy] [PATCH] wm: read XKB lib files
2016-12-28 17:20:27
refpolicy
[refpolicy] [PATCH] xserver: only run in confined mode and restrict execmem permissions
2016-12-28 15:45:11
refpolicy
[refpolicy] [PATCH] kernel: never run in unconfined mode
2016-12-27 23:26:26
refpolicy
[refpolicy] [PATCH] shutdown: minor update
2016-12-27 22:56:33
refpolicy
[refpolicy] [PATCH v2] init: run sysvinit without the dangerous unconfined_domain() call