messages from 2025-08-14 02:25:10 to 2025-09-01 13:20:00 UTC [more...]
[PATCH v2 0/4] nios2: Add architecture support for clone3
2025-09-01 13:19 UTC (6+ messages)
` [PATCH v2 1/4] copy_sighand: Handle architectures where sizeof(unsigned long) < sizeof(u64)
` [PATCH v2 2/4] copy_process: pass clone_flags as u64 across calltree
` [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
` [PATCH v2 4/4] nios2: implement architecture-specific portion of sys_clone3
[PATCH v6 0/4] Audit: Records for multiple security contexts
2025-08-30 15:42 UTC (10+ messages)
` [PATCH v6 1/4] Audit: Create audit_stamp structure
` [PATCH v6 2/4] LSM: security_lsmblob_to_secctx module selection
` [PATCH v6 3/4] Audit: Add record for multiple task security contexts
` [PATCH v6 4/4] Audit: Add record for multiple object contexts
[PATCH v2 7/7] virtio_balloon: Stop calling page_address() in free_pages()
2025-08-30 11:48 UTC (2+ messages)
[PATCH testsuite v4] tests/bpf: Add tests for SELinux BPF token access control
2025-08-29 18:17 UTC
[PATCH testsuite v3] tests/bpf: Add tests for SELinux BPF token access control
2025-08-29 16:39 UTC (3+ messages)
[PATCH v3] selinux: enable per-file labeling for functionfs
2025-08-29 16:31 UTC (3+ messages)
[PATCH] selinux: fix sel_read_bool() allocation and error handling
2025-08-29 14:21 UTC (2+ messages)
[PATCH v3] libsepol: Support functionfs_seclabel policycap
2025-08-29 12:25 UTC (2+ messages)
[PATCH] memfd,selinux: call security_inode_init_security_anon
2025-08-29 10:56 UTC (5+ messages)
[PATCH v2 1/2] selinux: enable per-file labeling for functionfs
2025-08-28 15:13 UTC (5+ messages)
` [PATCH v2 2/2] libsepol: Support functionfs_seclabel policycap
[PATCH 2/2] selinux: make __inode_security_revalidate non-sleeping
2025-08-26 20:08 UTC (4+ messages)
` [PATCH v2] [V2] selinux: restore sleepable revalidation; keep fast no-sleep check
fpp cil-policy
2025-08-25 16:08 UTC (2+ messages)
[PATCH v3] SELinux: Add support for BPF token access control
2025-08-25 14:08 UTC (5+ messages)
[PATCH] x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN)
2025-08-25 11:40 UTC (6+ messages)
LSM namespacing API
2025-08-23 23:00 UTC (36+ messages)
[RFC PATCH v3 0/34] Rework the LSM initialization
2025-08-22 20:45 UTC (38+ messages)
` [PATCH v3 01/34] lsm: split the notifier code out into lsm_notifier.c
` [PATCH v3 02/34] lsm: split the init code out into lsm_init.c
` [PATCH v3 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [PATCH v3 04/34] lsm: introduce looping macros for the initialization code
` [PATCH v3 05/34] lsm: integrate report_lsm_order() code into caller
` [PATCH v3 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [PATCH v3 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [PATCH v3 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [PATCH v3 09/34] lsm: rename the lsm order variables for consistency
` [PATCH v3 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [PATCH v3 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [PATCH v3 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [PATCH v3 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [PATCH v3 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [PATCH v3 16/34] lsm: cleanup the LSM blob size code
` [PATCH v3 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [PATCH v3 18/34] lsm: fold lsm_init_ordered() into security_init()
` [PATCH v3 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [PATCH v3 20/34] lsm: cleanup the debug and console output "
` [PATCH v3 21/34] lsm: output available LSMs when debugging
` [PATCH v3 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [PATCH v3 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [PATCH v3 24/34] loadpin: move initcalls to "
` [PATCH v3 25/34] ipe: "
` [PATCH v3 26/34] smack: "
` [PATCH v3 27/34] tomoyo: "
` [PATCH v3 28/34] safesetid: "
` [PATCH v3 29/34] apparmor: "
` [PATCH v3 30/34] lockdown: "
` [PATCH v3 31/34] ima,evm: "
` [PATCH v3 32/34] selinux: "
` [PATCH v3 33/34] lsm: consolidate all of the LSM framework initcalls
` [PATCH v3 34/34] lsm: add a LSM_STARTED_ALL notification event
[PATCH] selinux: enable per-file labeling for functionfs
2025-08-21 22:33 UTC (4+ messages)
[PATCH testsuite v2] tests/bpf: Add tests for SELinux BPF token access control
2025-08-21 18:21 UTC (5+ messages)
[PATCH] docs: Remove remainders of reiserfs
2025-08-18 16:46 UTC (4+ messages)
[PATCH v2] SELinux: Add support for BPF token access control
2025-08-18 16:41 UTC (3+ messages)
[Help] how to compile te with checkpolicy
2025-08-18 12:44 UTC (6+ messages)
[PATCH v5 0/5] Audit: Records for multiple security contexts
2025-08-16 17:27 UTC (7+ messages)
` [PATCH v5 1/5] Audit: Create audit_stamp structure
` [PATCH v5 2/5] LSM: security_lsmblob_to_secctx module selection
` [PATCH v5 3/5] Audit: Add record for multiple task security contexts
` [PATCH v5 4/5] Audit: Fix indentation in audit_log_exit
` [PATCH v5 5/5] Audit: Add record for multiple object contexts
[PATCH] SELinux: Add support for BPF token access control
2025-08-16 17:27 UTC (13+ messages)
[PATCH v3] seunshare: fix the frail tmpdir cleanup
2025-08-14 17:47 UTC (3+ messages)
[PATCH] libsepol: Fix erroneous genfscon asterisks
2025-08-14 16:48 UTC (2+ messages)
[PATCH v7 00/42] SELinux namespace support
2025-08-14 13:26 UTC (43+ messages)
` [PATCH v7 01/42] selinux: restore passing of selinux_state
` [PATCH v7 02/42] selinux: introduce current_selinux_state
` [PATCH v7 03/42] selinux: support multiple selinuxfs instances
` [PATCH v7 04/42] selinux: dynamically allocate selinux namespace
` [PATCH v7 05/42] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v7 06/42] selinux: limit selinux netlink notifications to init namespace
` [PATCH v7 07/42] selinux: support per-task/cred selinux namespace
` [PATCH v7 08/42] selinux: introduce cred_selinux_state() and use it
` [PATCH v7 09/42] selinux: init inode from nearest initialized namespace
` [PATCH v7 10/42] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v7 11/42] selinux: add limits for SELinux namespaces
` [PATCH v7 12/42] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v7 13/42] selinux: refactor selinux_state_create()
` [PATCH v7 14/42] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v7 15/42] selinuxfs: restrict write operations to the same selinux namespace
` [PATCH v7 16/42] selinux: introduce a global SID table
` [PATCH v7 17/42] selinux: wrap security server interfaces to use the "
` [PATCH v7 18/42] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v7 19/42] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v7 20/42] selinux: maintain a small cache in the global SID table
` [PATCH v7 21/42] selinux: update hook functions to use correct selinux namespace
` [PATCH v7 22/42] selinux: introduce cred_task_has_perm()
` [PATCH v7 23/42] selinux: introduce cred_has_extended_perms()
` [PATCH v7 24/42] selinux: introduce cred_self_has_perm()
` [PATCH v7 25/42] selinux: introduce cred_has_perm()
` [PATCH v7 26/42] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v7 27/42] selinux: introduce task_obj_has_perm()
` [PATCH v7 28/42] selinux: update bprm hooks for selinux namespaces
` [PATCH v7 29/42] selinux: add kerneldoc to new permission checking functions
` [PATCH v7 30/42] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v7 31/42] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v7 32/42] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v7 33/42] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v7 34/42] selinux: introduce selinux_state_has_perm()
` [PATCH v7 35/42] selinux: annotate selinuxfs permission checks
` [PATCH v7 36/42] selinux: annotate process transition "
` [PATCH v7 37/42] selinux: convert xfrm and netlabel "
` [PATCH v7 38/42] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v7 39/42] selinux: make open_perms namespace-aware
` [PATCH v7 40/42] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v7 41/42] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v7 42/42] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces
[RFC PATCH 2/2] memfd: call security_inode_init_security_anon
2025-08-14 2:24 UTC (6+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).