messages from 2021-01-08 21:00:14 to 2021-01-20 12:35:24 UTC [more...]
[PATCH testsuite] Makefile: unload policy when testsuite fails
2021-01-20 10:26 UTC (6+ messages)
[RFC PATCH 0/1] selinux-notebook: Add new section for Embedded Systems
2021-01-20 11:55 UTC (4+ messages)
` [RFC PATCH 1/1] "
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-01-20 5:01 UTC (12+ messages)
[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
2021-01-20 4:57 UTC (2+ messages)
[PATCH] python/sepolgen: allow any policy statement in ifndef
2021-01-19 13:55 UTC (2+ messages)
[PATCH 1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine
2021-01-19 14:32 UTC (5+ messages)
[PATCH v5 00/42] idmapped mounts
2021-01-19 15:05 UTC (79+ messages)
` [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
` [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
` [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
` [PATCH v5 04/42] fs: split out functions to hold writers
` [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
` [PATCH v5 06/42] fs: add mount_setattr()
` [PATCH v5 07/42] tests: add mount_setattr() selftests
` [PATCH v5 08/42] fs: add id translation helpers
` [PATCH v5 09/42] mount: attach mappings to mounts
` [PATCH v5 10/42] capability: handle idmapped mounts
` [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
` [PATCH v5 12/42] inode: make init and "
` [PATCH v5 13/42] attr: handle idmapped mounts
` [PATCH v5 14/42] acl: "
` [PATCH v5 15/42] fs: add file_user_ns() helper
` [PATCH v5 16/42] xattr: handle idmapped mounts
` [PATCH v5 17/42] commoncap: "
` [PATCH v5 18/42] stat: "
` [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
` [PATCH v5 20/42] namei: introduce struct renamedata
` [PATCH v5 21/42] namei: prepare for idmapped mounts
` [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
` [PATCH v5 23/42] open: handle idmapped mounts
` [PATCH v5 24/42] af_unix: "
` [PATCH v5 25/42] utimes: "
` [PATCH v5 26/42] fcntl: "
` [PATCH v5 27/42] notify: "
` [PATCH v5 28/42] init: "
` [PATCH v5 29/42] ioctl: "
` [PATCH v5 30/42] would_dump: "
` [PATCH v5 31/42] exec: "
` [PATCH v5 33/42] apparmor: "
` [PATCH v5 34/42] ima: "
` [PATCH v5 35/42] fat: "
` [PATCH v5 36/42] ext4: support "
` [PATCH v5 37/42] xfs: "
` [PATCH v5 38/42] ecryptfs: do not mount on top of "
` [PATCH v5 39/42] overlayfs: "
` [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH v5 41/42] tests: extend mount_setattr tests
` [PATCH v5 32/42] fs: make helpers idmap mount aware
Intent to release 3.2-rc1
2021-01-18 14:59 UTC (3+ messages)
[PATCH testsuite v2] perf_event: update perf_event test for the new CAP_PERFMON capability
2021-01-18 13:44 UTC (2+ messages)
[PATCH testsuite] tests/sysctl: use vm.swappiness instead of kernel.modprobe
2021-01-18 13:44 UTC (2+ messages)
[PATCH v2] libselinux: Always close status page fd
2021-01-18 13:37 UTC (3+ messages)
[RFC PATCH v2] selinux: security: Move selinux_state to a separate page
2021-01-18 6:15 UTC (10+ messages)
[RFC PATCH v2] selinux: security: Move selinux_state to a separate page
2021-01-18 5:56 UTC
VSOCK & getpeercon()
2021-01-16 12:48 UTC
[PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
2021-01-15 17:26 UTC (22+ messages)
` [PATCH v10 5/8] IMA: limit critical data measurement based on a label
` [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
[PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
2021-01-15 17:23 UTC (2+ messages)
[PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
2021-01-14 22:51 UTC (8+ messages)
[PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
2021-01-14 22:50 UTC (8+ messages)
` [PATCH v15 1/4] security: add inode_init_security_anon() LSM hook
` [PATCH v15 2/4] fs: add LSM-supporting anon-inode interface
` [PATCH v15 3/4] selinux: teach SELinux about anonymous inodes
` [PATCH v15 4/4] userfaultfd: use secure anon inodes for userfaultfd
[PATCH] selinux: include a consumer of the new IMA critical data hook
2021-01-14 20:01 UTC (4+ messages)
can't unmount /sys/fs/selinux
2021-01-14 16:24 UTC (5+ messages)
[PATCH] libselinux: Always close status page fd
2021-01-14 15:11 UTC (6+ messages)
[PATCH v2 1/2] setfiles: Do not abort on labeling error
2021-01-13 21:09 UTC (2+ messages)
` [PATCH v2 2/2] setfiles: drop ABORT_ON_ERRORS and related code
[PATCH v2] libsepol/cil: fix NULL pointer dereference when parsing an improper integer
2021-01-13 22:28 UTC (3+ messages)
[PATCH] libsepol: destroy filename_trans list properly
2021-01-13 22:30 UTC (3+ messages)
[PATCH] python/semanage: empty stdout before exiting on BrokenPipeError
2021-01-13 22:50 UTC (3+ messages)
` [PATCH 2/2] python/semanage: Sort imports in alphabetical order
[PATCH] setfiles: Do not abort on labeling error
2021-01-13 15:41 UTC (3+ messages)
Why every file context is "system_u:object_r"
2021-01-13 14:43 UTC (2+ messages)
[PATCH v2] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
2021-01-13 13:58 UTC (2+ messages)
[PATCH testsuite] perf_event: update perf_event test for the new CAP_PERFMON capability
2021-01-12 17:02 UTC
[PATCH] selinux: fall back to SECURITY_FS_USE_GENFS if no xattr support
2021-01-12 16:38 UTC (3+ messages)
[PATCH 0/5] Clean up SELinux global variables
2021-01-12 15:18 UTC (11+ messages)
` [PATCH 1/5] selinux: remove unused "
` [PATCH 2/5] selinux: drop the unnecessary aurule_callback variable
` [PATCH 3/5] selinux: make selinuxfs_mount static
` [PATCH 4/5] selinux: mark some global variables __ro_after_init
` [PATCH 5/5] selinux: mark selinux_xfrm_refcount as __read_mostly
[PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
2021-01-12 13:51 UTC (2+ messages)
[PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-01-11 17:09 UTC (8+ messages)
[PATCH v13 0/4] SELinux support for anonymous inodes and UFFD
2021-01-08 21:31 UTC (7+ messages)
` [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).