selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-06 00:57:01 to 2025-05-19 11:37:09 UTC [more...]

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-19 11:37 UTC  (15+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
` [PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
` [PATCH v5 4/7] fs: split fileattr/fsxattr converters into helpers
` [PATCH v5 5/7] fs: make vfs_fileattr_[get|set] return -EOPNOSUPP
` [PATCH v5 6/7] fs: prepare for extending file_get/setattr()
` [PATCH v5 7/7] fs: introduce file_getattr and file_setattr syscalls

[PATCH v3 01/14] selinux: avoid nontransitive comparison
 2025-05-17 21:53 UTC  (32+ messages)
` [PATCH v3 02/14] selinux: use u16 for security classes
` [PATCH v3 03/14] selinux: more strict policy parsing
` [PATCH v3 04/14] selinux: check length fields in policies
` [PATCH v3 05/14] selinux: validate constraints
` [PATCH v3 06/14] selinux: pre-validate conditional expressions
` [PATCH v3 07/14] selinux: check type attr map overflows
` [PATCH v3 08/14] selinux: reorder policydb_index()
` [PATCH v3 09/14] selinux: beef up isvalid checks
` [PATCH v3 10/14] selinux: validate symbols
` [PATCH v3 11/14] selinux: more strict bounds check
` [PATCH v3 12/14] selinux: check for simple types
` [PATCH v3 13/14] selinux: restrict policy strings
` [PATCH v3 14/14] selinux: harden MLS context string generation against overflows
` [PATCH v3 00/14] selinux: harden against malformed policies

Recent selinux-testsuite failures in tests/mmap:109 (execheap/execmem)
 2025-05-16 19:54 UTC  (4+ messages)

[RFC PATCH 0/29] Rework the LSM initialization
 2025-05-15 21:02 UTC  (36+ messages)
` [RFC PATCH 14/29] lsm: add missing function header comment blocks in lsm_init.c
` [RFC PATCH 16/29] lsm: output available LSMs when debugging
` [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH 18/29] loadpin: move initcalls to "
` [RFC PATCH 19/29] ipe: "
` [RFC PATCH 21/29] tomoyo: "
` [RFC PATCH 22/29] safesetid: "
` [RFC PATCH 23/29] apparmor: "
` [RFC PATCH 24/29] lockdown: "
` [RFC PATCH 25/29] ima,evm: "
` [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event
` [RFC PATCH 29/29] lsm: add support for counting lsm_prop support among LSMs

[PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec
 2025-05-15 16:48 UTC  (15+ messages)
` [PATCH 1/2] "

[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
 2025-05-15 14:22 UTC  (2+ messages)

[PATCH v2 00/49] SELinux namespace support
 2025-05-15 13:59 UTC  (52+ messages)
` [PATCH v2 01/49] selinux: restore passing of selinux_state
` [PATCH v2 02/49] selinux: introduce current_selinux_state
` [PATCH v2 03/49] selinux: support multiple selinuxfs instances
` [PATCH v2 04/49] selinux: dynamically allocate selinux namespace
` [PATCH v2 05/49] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v2 06/49] selinux: support per-task/cred selinux namespace
` [PATCH v2 07/49] selinux: introduce cred_selinux_state() and use it
` [PATCH v2 08/49] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v2 09/49] selinuxfs: restrict write operations to the same "
` [PATCH v2 10/49] selinux: introduce a global SID table
` [PATCH v2 11/49] selinux: wrap security server interfaces to use the "
` [PATCH v2 12/49] selinux: update hook functions to use correct selinux namespace
` [PATCH v2 13/49] selinux: introduce cred_task_has_perm()
` [PATCH v2 14/49] selinux: introduce cred_has_extended_perms()
` [PATCH v2 15/49] selinux: introduce cred_self_has_perm()
` [PATCH v2 16/49] selinux: introduce cred_has_perm()
` [PATCH v2 17/49] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v2 18/49] selinux: introduce task_obj_perm()
` [PATCH v2 19/49] selinux: fix selinux_lsm_getattr() check
` [PATCH v2 20/49] selinux: update bprm hooks for selinux namespaces
` [PATCH v2 21/49] selinux: add kerneldoc to new permission checking functions
` [PATCH v2 22/49] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v2 23/49] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v2 24/49] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v2 25/49] selinux: introduce selinux_state_has_perm()
` [PATCH v2 26/49] selinux: annotate selinuxfs permission checks
` [PATCH v2 27/49] selinux: annotate process transition "
` [PATCH v2 28/49] selinux: convert xfrm and netlabel "
` [PATCH v2 29/49] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v2 30/49] selinux: add limits for SELinux namespaces
` [PATCH v2 31/49] selinux: fix namespace creation
` [PATCH v2 32/49] selinux: limit selinux netlink notifications to init namespace
` [PATCH v2 33/49] selinux: refactor selinux_state_create()
` [PATCH v2 34/49] selinux: make open_perms namespace-aware
` [PATCH v2 35/49] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v2 36/49] selinux: set initial SID context for init to "kernel" in global SID table
` [PATCH v2 37/49] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
` [PATCH v2 38/49] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v2 39/49] selinux: init inode from nearest initialized namespace
` [PATCH v2 40/49] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v2 41/49] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v2 42/49] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v2 43/49] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v2 44/49] selinux: maintain a small cache in the global SID table
` [PATCH v2 45/49] selinux: change /sys/fs/selinux/unshare to check current process state
` [PATCH v2 46/49] selinux: acquire/release SELinux state properly in socket hooks
` [PATCH v2 47/49] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v2 48/49] selinux: repair security_fs_use() interface and its users
` [PATCH v2 49/49] selinux: style cleanups for node_sid prototypes

[PATCH 1/2] selinux: introduce neveraudit types
 2025-05-15 12:20 UTC  (3+ messages)
` [PATCH 2/2] selinux: optimize selinux_inode_getattr/permission() based on neveraudit|permissive

[PATCH] libselinux: prioritize local literal fcontext definitions
 2025-05-15  9:52 UTC  (5+ messages)

[PATCH] Trivial fix comment
 2025-05-15  9:27 UTC 

[PATCH] A trivial simplification to shorten the code a bit
 2025-05-15  9:26 UTC 

[PATCH] userspace: Make git ignore files '.vimrc' and 'tags'
 2025-05-15  9:18 UTC 

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-15  7:50 UTC  (8+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr

[PATCH] userspace: Make git ignore ctags output file called 'tags'
 2025-05-15  7:37 UTC  (2+ messages)

[PATCH v2] libsepol,checkpolicy: introduce neveraudit types
 2025-05-14 19:59 UTC 

[PATCH] README: update subscribe information
 2025-05-14 14:00 UTC  (2+ messages)

[PATCH v2] semanage: improve -e documentation and fix delete operation
 2025-05-14 10:04 UTC  (2+ messages)

[RFC] selinux: Keep genfscon prefix match semantics in userspace for wildcard
 2025-05-14  1:55 UTC  (9+ messages)

github.com/SELinuxProject/selinux has outdated info
 2025-05-13 22:08 UTC 

Changing return type from 'int' to 'void'
 2025-05-13 21:36 UTC 

[PATCH] Trivial fix comment
 2025-05-13 21:31 UTC 

[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
 2025-05-13 21:30 UTC 

[PATCH] A trivial simplification to shorten the code a bit
 2025-05-13 21:28 UTC 

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-13  8:24 UTC  (7+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
` [PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
` [PATCH v5 4/7] fs: split fileattr/fsxattr converters into helpers

[PATCH v5 5/7] fs: make vfs_fileattr_[get|set] return -EOPNOSUPP
 2025-05-12 13:28 UTC  (2+ messages)

[PATCH 6.1.y] selinux: avoid dereference of garbage after mount failure
 2025-05-12  1:44 UTC 

[PATCH v1 bpf-next 0/5] af_unix: Allow BPF LSM to scrub SCM_RIGHTS at sendmsg()
 2025-05-09 15:06 UTC  (14+ messages)
` [PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()

[PATCH v1 bpf-next 3/5] af_unix: Remove redundant scm->fp check in __scm_destroy()
 2025-05-09 14:13 UTC  (2+ messages)

[PATCH] policycoreutils: run_init: define _GNU_SOURCE
 2025-05-06 19:34 UTC  (3+ messages)

[PATCH v2] checkpolicy: Allow lineno > 1 for source file line
 2025-05-06 19:34 UTC  (3+ messages)

[PATCH v2] libselinux: be careful with non-portable LFS macro
 2025-05-06 19:33 UTC  (3+ messages)

[PATCH 2/2] semodule: add config argument
 2025-05-06 19:33 UTC  (4+ messages)
` [PATCH 1/2] libsemanage: add semanage_handle_create_with_path

[PATCH v1 bpf-next 0/5] af_unix: Allow BPF LSM to scrub SCM_RIGHTS at sendmsg()
 2025-05-06 14:57 UTC  (3+ messages)

[SELinuxProject/selinux] The SIGBUS signal is triggered because the status page is incorrectly written. (Issue #475)
 2025-05-06 12:18 UTC 

[PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()
 2025-05-06  8:56 UTC  (3+ messages)

[PATCH] SELinux: Add check for the user data passed to kcalloc in hashtab_init
 2025-05-06  8:14 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).