messages from 2025-05-06 00:57:01 to 2025-05-19 11:37:09 UTC [more...]
[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
2025-05-19 11:37 UTC (15+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
` [PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
` [PATCH v5 4/7] fs: split fileattr/fsxattr converters into helpers
` [PATCH v5 5/7] fs: make vfs_fileattr_[get|set] return -EOPNOSUPP
` [PATCH v5 6/7] fs: prepare for extending file_get/setattr()
` [PATCH v5 7/7] fs: introduce file_getattr and file_setattr syscalls
[PATCH v3 01/14] selinux: avoid nontransitive comparison
2025-05-17 21:53 UTC (32+ messages)
` [PATCH v3 02/14] selinux: use u16 for security classes
` [PATCH v3 03/14] selinux: more strict policy parsing
` [PATCH v3 04/14] selinux: check length fields in policies
` [PATCH v3 05/14] selinux: validate constraints
` [PATCH v3 06/14] selinux: pre-validate conditional expressions
` [PATCH v3 07/14] selinux: check type attr map overflows
` [PATCH v3 08/14] selinux: reorder policydb_index()
` [PATCH v3 09/14] selinux: beef up isvalid checks
` [PATCH v3 10/14] selinux: validate symbols
` [PATCH v3 11/14] selinux: more strict bounds check
` [PATCH v3 12/14] selinux: check for simple types
` [PATCH v3 13/14] selinux: restrict policy strings
` [PATCH v3 14/14] selinux: harden MLS context string generation against overflows
` [PATCH v3 00/14] selinux: harden against malformed policies
Recent selinux-testsuite failures in tests/mmap:109 (execheap/execmem)
2025-05-16 19:54 UTC (4+ messages)
[RFC PATCH 0/29] Rework the LSM initialization
2025-05-15 21:02 UTC (36+ messages)
` [RFC PATCH 14/29] lsm: add missing function header comment blocks in lsm_init.c
` [RFC PATCH 16/29] lsm: output available LSMs when debugging
` [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH 18/29] loadpin: move initcalls to "
` [RFC PATCH 19/29] ipe: "
` [RFC PATCH 21/29] tomoyo: "
` [RFC PATCH 22/29] safesetid: "
` [RFC PATCH 23/29] apparmor: "
` [RFC PATCH 24/29] lockdown: "
` [RFC PATCH 25/29] ima,evm: "
` [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event
` [RFC PATCH 29/29] lsm: add support for counting lsm_prop support among LSMs
[PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec
2025-05-15 16:48 UTC (15+ messages)
` [PATCH 1/2] "
[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
2025-05-15 14:22 UTC (2+ messages)
[PATCH v2 00/49] SELinux namespace support
2025-05-15 13:59 UTC (52+ messages)
` [PATCH v2 01/49] selinux: restore passing of selinux_state
` [PATCH v2 02/49] selinux: introduce current_selinux_state
` [PATCH v2 03/49] selinux: support multiple selinuxfs instances
` [PATCH v2 04/49] selinux: dynamically allocate selinux namespace
` [PATCH v2 05/49] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v2 06/49] selinux: support per-task/cred selinux namespace
` [PATCH v2 07/49] selinux: introduce cred_selinux_state() and use it
` [PATCH v2 08/49] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v2 09/49] selinuxfs: restrict write operations to the same "
` [PATCH v2 10/49] selinux: introduce a global SID table
` [PATCH v2 11/49] selinux: wrap security server interfaces to use the "
` [PATCH v2 12/49] selinux: update hook functions to use correct selinux namespace
` [PATCH v2 13/49] selinux: introduce cred_task_has_perm()
` [PATCH v2 14/49] selinux: introduce cred_has_extended_perms()
` [PATCH v2 15/49] selinux: introduce cred_self_has_perm()
` [PATCH v2 16/49] selinux: introduce cred_has_perm()
` [PATCH v2 17/49] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v2 18/49] selinux: introduce task_obj_perm()
` [PATCH v2 19/49] selinux: fix selinux_lsm_getattr() check
` [PATCH v2 20/49] selinux: update bprm hooks for selinux namespaces
` [PATCH v2 21/49] selinux: add kerneldoc to new permission checking functions
` [PATCH v2 22/49] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v2 23/49] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v2 24/49] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v2 25/49] selinux: introduce selinux_state_has_perm()
` [PATCH v2 26/49] selinux: annotate selinuxfs permission checks
` [PATCH v2 27/49] selinux: annotate process transition "
` [PATCH v2 28/49] selinux: convert xfrm and netlabel "
` [PATCH v2 29/49] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v2 30/49] selinux: add limits for SELinux namespaces
` [PATCH v2 31/49] selinux: fix namespace creation
` [PATCH v2 32/49] selinux: limit selinux netlink notifications to init namespace
` [PATCH v2 33/49] selinux: refactor selinux_state_create()
` [PATCH v2 34/49] selinux: make open_perms namespace-aware
` [PATCH v2 35/49] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v2 36/49] selinux: set initial SID context for init to "kernel" in global SID table
` [PATCH v2 37/49] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
` [PATCH v2 38/49] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v2 39/49] selinux: init inode from nearest initialized namespace
` [PATCH v2 40/49] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v2 41/49] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v2 42/49] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v2 43/49] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v2 44/49] selinux: maintain a small cache in the global SID table
` [PATCH v2 45/49] selinux: change /sys/fs/selinux/unshare to check current process state
` [PATCH v2 46/49] selinux: acquire/release SELinux state properly in socket hooks
` [PATCH v2 47/49] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v2 48/49] selinux: repair security_fs_use() interface and its users
` [PATCH v2 49/49] selinux: style cleanups for node_sid prototypes
[PATCH 1/2] selinux: introduce neveraudit types
2025-05-15 12:20 UTC (3+ messages)
` [PATCH 2/2] selinux: optimize selinux_inode_getattr/permission() based on neveraudit|permissive
[PATCH] libselinux: prioritize local literal fcontext definitions
2025-05-15 9:52 UTC (5+ messages)
[PATCH] Trivial fix comment
2025-05-15 9:27 UTC
[PATCH] A trivial simplification to shorten the code a bit
2025-05-15 9:26 UTC
[PATCH] userspace: Make git ignore files '.vimrc' and 'tags'
2025-05-15 9:18 UTC
[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
2025-05-15 7:50 UTC (8+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
[PATCH] userspace: Make git ignore ctags output file called 'tags'
2025-05-15 7:37 UTC (2+ messages)
[PATCH v2] libsepol,checkpolicy: introduce neveraudit types
2025-05-14 19:59 UTC
[PATCH] README: update subscribe information
2025-05-14 14:00 UTC (2+ messages)
[PATCH v2] semanage: improve -e documentation and fix delete operation
2025-05-14 10:04 UTC (2+ messages)
[RFC] selinux: Keep genfscon prefix match semantics in userspace for wildcard
2025-05-14 1:55 UTC (9+ messages)
github.com/SELinuxProject/selinux has outdated info
2025-05-13 22:08 UTC
Changing return type from 'int' to 'void'
2025-05-13 21:36 UTC
[PATCH] Trivial fix comment
2025-05-13 21:31 UTC
[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
2025-05-13 21:30 UTC
[PATCH] A trivial simplification to shorten the code a bit
2025-05-13 21:28 UTC
[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
2025-05-13 8:24 UTC (7+ messages)
` [PATCH v5 1/7] fs: split fileattr related helpers into separate file
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
` [PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
` [PATCH v5 4/7] fs: split fileattr/fsxattr converters into helpers
[PATCH v5 5/7] fs: make vfs_fileattr_[get|set] return -EOPNOSUPP
2025-05-12 13:28 UTC (2+ messages)
[PATCH 6.1.y] selinux: avoid dereference of garbage after mount failure
2025-05-12 1:44 UTC
[PATCH v1 bpf-next 0/5] af_unix: Allow BPF LSM to scrub SCM_RIGHTS at sendmsg()
2025-05-09 15:06 UTC (14+ messages)
` [PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()
[PATCH v1 bpf-next 3/5] af_unix: Remove redundant scm->fp check in __scm_destroy()
2025-05-09 14:13 UTC (2+ messages)
[PATCH] policycoreutils: run_init: define _GNU_SOURCE
2025-05-06 19:34 UTC (3+ messages)
[PATCH v2] checkpolicy: Allow lineno > 1 for source file line
2025-05-06 19:34 UTC (3+ messages)
[PATCH v2] libselinux: be careful with non-portable LFS macro
2025-05-06 19:33 UTC (3+ messages)
[PATCH 2/2] semodule: add config argument
2025-05-06 19:33 UTC (4+ messages)
` [PATCH 1/2] libsemanage: add semanage_handle_create_with_path
[PATCH v1 bpf-next 0/5] af_unix: Allow BPF LSM to scrub SCM_RIGHTS at sendmsg()
2025-05-06 14:57 UTC (3+ messages)
[SELinuxProject/selinux] The SIGBUS signal is triggered because the status page is incorrectly written. (Issue #475)
2025-05-06 12:18 UTC
[PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()
2025-05-06 8:56 UTC (3+ messages)
[PATCH] SELinux: Add check for the user data passed to kcalloc in hashtab_init
2025-05-06 8:14 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).