selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-13 09:18:33 to 2025-05-21 08:57:58 UTC [more...]

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-21  8:57 UTC  (12+ messages)
` [PATCH v5 6/7] fs: prepare for extending file_get/setattr()
` [PATCH v5 7/7] fs: introduce file_getattr and file_setattr syscalls

[PATCH RESEND v17 1/3] lsm, selinux: Add setup_report permission to binder
 2025-05-21  4:13 UTC  (3+ messages)
` [PATCH "

[PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
 2025-05-21  0:31 UTC  (5+ messages)

[PATCH 1/2] selinux: introduce neveraudit types
 2025-05-20 23:59 UTC  (8+ messages)
` [PATCH 2/2] selinux: optimize selinux_inode_getattr/permission() based on neveraudit|permissive

[PATCH] SELinux: Add check for the user data passed to kcalloc in hashtab_init
 2025-05-20 23:46 UTC  (3+ messages)

[PATCH] selinux: add a 5 second sleep to /sys/fs/selinux/user
 2025-05-20 21:22 UTC  (2+ messages)

[RFC PATCH 4/6] selinux: improve network lookup failure warnings
 2025-05-20 21:09 UTC  (2+ messages)
` [PATCH RFC "

[PATCH v2] libsepol,checkpolicy: introduce neveraudit types
 2025-05-20 19:54 UTC  (2+ messages)

[PATCH] userspace: Make git ignore files '.vimrc' and 'tags'
 2025-05-20 13:37 UTC  (2+ messages)

[PATCH v2 00/49] SELinux namespace support
 2025-05-20 12:06 UTC  (53+ messages)
` [PATCH v2 01/49] selinux: restore passing of selinux_state
` [PATCH v2 02/49] selinux: introduce current_selinux_state
` [PATCH v2 03/49] selinux: support multiple selinuxfs instances
` [PATCH v2 04/49] selinux: dynamically allocate selinux namespace
` [PATCH v2 05/49] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v2 06/49] selinux: support per-task/cred selinux namespace
` [PATCH v2 07/49] selinux: introduce cred_selinux_state() and use it
` [PATCH v2 08/49] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v2 09/49] selinuxfs: restrict write operations to the same "
` [PATCH v2 10/49] selinux: introduce a global SID table
` [PATCH v2 11/49] selinux: wrap security server interfaces to use the "
` [PATCH v2 12/49] selinux: update hook functions to use correct selinux namespace
` [PATCH v2 13/49] selinux: introduce cred_task_has_perm()
` [PATCH v2 14/49] selinux: introduce cred_has_extended_perms()
` [PATCH v2 15/49] selinux: introduce cred_self_has_perm()
` [PATCH v2 16/49] selinux: introduce cred_has_perm()
` [PATCH v2 17/49] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v2 18/49] selinux: introduce task_obj_perm()
` [PATCH v2 19/49] selinux: fix selinux_lsm_getattr() check
` [PATCH v2 20/49] selinux: update bprm hooks for selinux namespaces
` [PATCH v2 21/49] selinux: add kerneldoc to new permission checking functions
` [PATCH v2 22/49] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v2 23/49] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v2 24/49] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v2 25/49] selinux: introduce selinux_state_has_perm()
` [PATCH v2 26/49] selinux: annotate selinuxfs permission checks
` [PATCH v2 27/49] selinux: annotate process transition "
` [PATCH v2 28/49] selinux: convert xfrm and netlabel "
` [PATCH v2 29/49] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v2 30/49] selinux: add limits for SELinux namespaces
` [PATCH v2 31/49] selinux: fix namespace creation
` [PATCH v2 32/49] selinux: limit selinux netlink notifications to init namespace
` [PATCH v2 33/49] selinux: refactor selinux_state_create()
` [PATCH v2 34/49] selinux: make open_perms namespace-aware
` [PATCH v2 35/49] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v2 36/49] selinux: set initial SID context for init to "kernel" in global SID table
` [PATCH v2 37/49] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
` [PATCH v2 38/49] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v2 39/49] selinux: init inode from nearest initialized namespace
` [PATCH v2 40/49] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v2 41/49] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v2 42/49] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v2 43/49] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v2 44/49] selinux: maintain a small cache in the global SID table
` [PATCH v2 45/49] selinux: change /sys/fs/selinux/unshare to check current process state
` [PATCH v2 46/49] selinux: acquire/release SELinux state properly in socket hooks
` [PATCH v2 47/49] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v2 48/49] selinux: repair security_fs_use() interface and its users
` [PATCH v2 49/49] selinux: style cleanups for node_sid prototypes

[PATCH v3 00/42] SELinux namespace support
 2025-05-20 11:59 UTC  (43+ messages)
` [PATCH v3 01/42] selinux: restore passing of selinux_state
` [PATCH v3 02/42] selinux: introduce current_selinux_state
` [PATCH v3 03/42] selinux: support multiple selinuxfs instances
` [PATCH v3 04/42] selinux: dynamically allocate selinux namespace
` [PATCH v3 05/42] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v3 06/42] selinux: limit selinux netlink notifications to init namespace
` [PATCH v3 07/42] selinux: support per-task/cred selinux namespace
` [PATCH v3 08/42] selinux: introduce cred_selinux_state() and use it
` [PATCH v3 09/42] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v3 10/42] selinux: add limits for SELinux namespaces
` [PATCH v3 11/42] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v3 12/42] selinux: refactor selinux_state_create()
` [PATCH v3 13/42] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v3 14/42] selinuxfs: restrict write operations to the same selinux namespace
` [PATCH v3 15/42] selinux: introduce a global SID table
` [PATCH v3 16/42] selinux: wrap security server interfaces to use the "
` [PATCH v3 17/42] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v3 18/42] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v3 19/42] selinux: maintain a small cache in the global SID table
` [PATCH v3 20/42] selinux: update hook functions to use correct selinux namespace
` [PATCH v3 21/42] selinux: introduce cred_task_has_perm()
` [PATCH v3 22/42] selinux: introduce cred_has_extended_perms()
` [PATCH v3 23/42] selinux: introduce cred_self_has_perm()
` [PATCH v3 24/42] selinux: introduce cred_has_perm()
` [PATCH v3 25/42] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v3 26/42] selinux: introduce task_obj_perm()
` [PATCH v3 27/42] selinux: update bprm hooks for selinux namespaces
` [PATCH v3 28/42] selinux: add kerneldoc to new permission checking functions
` [PATCH v3 29/42] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v3 30/42] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v3 31/42] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v3 32/42] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v3 33/42] selinux: introduce selinux_state_has_perm()
` [PATCH v3 34/42] selinux: annotate selinuxfs permission checks
` [PATCH v3 35/42] selinux: annotate process transition "
` [PATCH v3 36/42] selinux: convert xfrm and netlabel "
` [PATCH v3 37/42] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v3 38/42] selinux: make open_perms namespace-aware
` [PATCH v3 39/42] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v3 40/42] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
` [PATCH v3 41/42] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v3 42/42] selinux: init inode from nearest initialized namespace

[PATCH 6.1.y] selinux: avoid dereference of garbage after mount failure
 2025-05-20 11:18 UTC  (2+ messages)

[PATCH v3 01/14] selinux: avoid nontransitive comparison
 2025-05-17 21:53 UTC  (31+ messages)
` [PATCH v3 02/14] selinux: use u16 for security classes
` [PATCH v3 03/14] selinux: more strict policy parsing
` [PATCH v3 04/14] selinux: check length fields in policies
` [PATCH v3 05/14] selinux: validate constraints
` [PATCH v3 06/14] selinux: pre-validate conditional expressions
` [PATCH v3 07/14] selinux: check type attr map overflows
` [PATCH v3 08/14] selinux: reorder policydb_index()
` [PATCH v3 09/14] selinux: beef up isvalid checks
` [PATCH v3 10/14] selinux: validate symbols
` [PATCH v3 11/14] selinux: more strict bounds check
` [PATCH v3 12/14] selinux: check for simple types
` [PATCH v3 13/14] selinux: restrict policy strings
` [PATCH v3 14/14] selinux: harden MLS context string generation against overflows

Recent selinux-testsuite failures in tests/mmap:109 (execheap/execmem)
 2025-05-16 19:54 UTC  (4+ messages)

[RFC PATCH 0/29] Rework the LSM initialization
 2025-05-15 21:02 UTC  (36+ messages)
` [RFC PATCH 14/29] lsm: add missing function header comment blocks in lsm_init.c
` [RFC PATCH 16/29] lsm: output available LSMs when debugging
` [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH 18/29] loadpin: move initcalls to "
` [RFC PATCH 19/29] ipe: "
` [RFC PATCH 21/29] tomoyo: "
` [RFC PATCH 22/29] safesetid: "
` [RFC PATCH 23/29] apparmor: "
` [RFC PATCH 24/29] lockdown: "
` [RFC PATCH 25/29] ima,evm: "
` [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event
` [RFC PATCH 29/29] lsm: add support for counting lsm_prop support among LSMs

[PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec
 2025-05-15 16:48 UTC  (15+ messages)
` [PATCH 1/2] "

[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
 2025-05-15 14:22 UTC  (2+ messages)

[PATCH] libselinux: prioritize local literal fcontext definitions
 2025-05-15  9:52 UTC  (5+ messages)

[PATCH] Trivial fix comment
 2025-05-15  9:27 UTC 

[PATCH] A trivial simplification to shorten the code a bit
 2025-05-15  9:26 UTC 

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-15  7:50 UTC  (6+ messages)
` [PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr

[PATCH] userspace: Make git ignore ctags output file called 'tags'
 2025-05-15  7:37 UTC  (2+ messages)

[PATCH] README: update subscribe information
 2025-05-14 14:00 UTC  (2+ messages)

[PATCH v2] semanage: improve -e documentation and fix delete operation
 2025-05-14 10:04 UTC  (2+ messages)

[RFC] selinux: Keep genfscon prefix match semantics in userspace for wildcard
 2025-05-14  1:55 UTC  (9+ messages)

github.com/SELinuxProject/selinux has outdated info
 2025-05-13 22:08 UTC 

Changing return type from 'int' to 'void'
 2025-05-13 21:36 UTC 

[PATCH] Trivial fix comment
 2025-05-13 21:31 UTC 

[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
 2025-05-13 21:30 UTC 

[PATCH] A trivial simplification to shorten the code a bit
 2025-05-13 21:28 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).