selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-08-14 13:27:06 to 2025-09-01 13:35:31 UTC [more...]

[PATCH v2 0/4] nios2: Add architecture support for clone3
 2025-09-01 13:35 UTC  (9+ messages)
` [PATCH v2 1/4] copy_sighand: Handle architectures where sizeof(unsigned long) < sizeof(u64)
` [PATCH v2 2/4] copy_process: pass clone_flags as u64 across calltree
` [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
` [PATCH v2 4/4] nios2: implement architecture-specific portion of sys_clone3

[PATCH v6 0/4] Audit: Records for multiple security contexts
 2025-08-30 15:42 UTC  (10+ messages)
  ` [PATCH v6 1/4] Audit: Create audit_stamp structure
  ` [PATCH v6 2/4] LSM: security_lsmblob_to_secctx module selection
  ` [PATCH v6 3/4] Audit: Add record for multiple task security contexts
  ` [PATCH v6 4/4] Audit: Add record for multiple object contexts

[PATCH v2 7/7] virtio_balloon: Stop calling page_address() in free_pages()
 2025-08-30 11:48 UTC  (2+ messages)

[PATCH testsuite v4] tests/bpf: Add tests for SELinux BPF token access control
 2025-08-29 18:17 UTC 

[PATCH testsuite v3] tests/bpf: Add tests for SELinux BPF token access control
 2025-08-29 16:39 UTC  (3+ messages)

[PATCH v3] selinux: enable per-file labeling for functionfs
 2025-08-29 16:31 UTC  (3+ messages)

[PATCH] selinux: fix sel_read_bool() allocation and error handling
 2025-08-29 14:21 UTC  (2+ messages)

[PATCH v3] libsepol: Support functionfs_seclabel policycap
 2025-08-29 12:25 UTC  (2+ messages)

[PATCH] memfd,selinux: call security_inode_init_security_anon
 2025-08-29 10:56 UTC  (5+ messages)

[PATCH v2 1/2] selinux: enable per-file labeling for functionfs
 2025-08-28 15:13 UTC  (5+ messages)
` [PATCH v2 2/2] libsepol: Support functionfs_seclabel policycap

[PATCH 2/2] selinux: make __inode_security_revalidate non-sleeping
 2025-08-26 20:08 UTC  (4+ messages)
` [PATCH v2] [V2] selinux: restore sleepable revalidation; keep fast no-sleep check

fpp cil-policy
 2025-08-25 16:08 UTC  (2+ messages)

[PATCH v3] SELinux: Add support for BPF token access control
 2025-08-25 14:08 UTC  (5+ messages)

[PATCH] x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN)
 2025-08-25 11:40 UTC  (6+ messages)

LSM namespacing API
 2025-08-23 23:00 UTC  (36+ messages)

[RFC PATCH v3 0/34] Rework the LSM initialization
 2025-08-22 20:45 UTC  (38+ messages)
` [PATCH v3 01/34] lsm: split the notifier code out into lsm_notifier.c
` [PATCH v3 02/34] lsm: split the init code out into lsm_init.c
` [PATCH v3 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [PATCH v3 04/34] lsm: introduce looping macros for the initialization code
` [PATCH v3 05/34] lsm: integrate report_lsm_order() code into caller
` [PATCH v3 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [PATCH v3 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [PATCH v3 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [PATCH v3 09/34] lsm: rename the lsm order variables for consistency
` [PATCH v3 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [PATCH v3 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [PATCH v3 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [PATCH v3 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [PATCH v3 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [PATCH v3 16/34] lsm: cleanup the LSM blob size code
` [PATCH v3 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [PATCH v3 18/34] lsm: fold lsm_init_ordered() into security_init()
` [PATCH v3 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [PATCH v3 20/34] lsm: cleanup the debug and console output "
` [PATCH v3 21/34] lsm: output available LSMs when debugging
` [PATCH v3 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [PATCH v3 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [PATCH v3 24/34] loadpin: move initcalls to "
` [PATCH v3 25/34] ipe: "
` [PATCH v3 26/34] smack: "
` [PATCH v3 27/34] tomoyo: "
` [PATCH v3 28/34] safesetid: "
` [PATCH v3 29/34] apparmor: "
` [PATCH v3 30/34] lockdown: "
` [PATCH v3 31/34] ima,evm: "
` [PATCH v3 32/34] selinux: "
` [PATCH v3 33/34] lsm: consolidate all of the LSM framework initcalls
` [PATCH v3 34/34] lsm: add a LSM_STARTED_ALL notification event

[PATCH] selinux: enable per-file labeling for functionfs
 2025-08-21 22:33 UTC  (4+ messages)

[PATCH testsuite v2] tests/bpf: Add tests for SELinux BPF token access control
 2025-08-21 18:21 UTC  (5+ messages)

[PATCH] docs: Remove remainders of reiserfs
 2025-08-18 16:46 UTC  (2+ messages)

[PATCH v2] SELinux: Add support for BPF token access control
 2025-08-18 16:41 UTC  (3+ messages)

[Help] how to compile te with checkpolicy
 2025-08-18 12:44 UTC  (6+ messages)

[PATCH v5 0/5] Audit: Records for multiple security contexts
 2025-08-16 17:27 UTC  (7+ messages)
  ` [PATCH v5 1/5] Audit: Create audit_stamp structure
  ` [PATCH v5 2/5] LSM: security_lsmblob_to_secctx module selection
  ` [PATCH v5 3/5] Audit: Add record for multiple task security contexts
  ` [PATCH v5 4/5] Audit: Fix indentation in audit_log_exit
  ` [PATCH v5 5/5] Audit: Add record for multiple object contexts

[PATCH] SELinux: Add support for BPF token access control
 2025-08-16 17:27 UTC  (13+ messages)

[PATCH v3] seunshare: fix the frail tmpdir cleanup
 2025-08-14 17:47 UTC  (3+ messages)

[PATCH] libsepol: Fix erroneous genfscon asterisks
 2025-08-14 16:48 UTC  (2+ messages)

[PATCH v7 00/42] SELinux namespace support
 2025-08-14 13:26 UTC  (43+ messages)
` [PATCH v7 01/42] selinux: restore passing of selinux_state
` [PATCH v7 02/42] selinux: introduce current_selinux_state
` [PATCH v7 03/42] selinux: support multiple selinuxfs instances
` [PATCH v7 04/42] selinux: dynamically allocate selinux namespace
` [PATCH v7 05/42] netstate,selinux: create the selinux netlink socket per network namespace
` [PATCH v7 06/42] selinux: limit selinux netlink notifications to init namespace
` [PATCH v7 07/42] selinux: support per-task/cred selinux namespace
` [PATCH v7 08/42] selinux: introduce cred_selinux_state() and use it
` [PATCH v7 09/42] selinux: init inode from nearest initialized namespace
` [PATCH v7 10/42] selinux: add a selinuxfs interface to unshare selinux namespace
` [PATCH v7 11/42] selinux: add limits for SELinux namespaces
` [PATCH v7 12/42] selinux: exempt creation of init SELinux namespace from limits
` [PATCH v7 13/42] selinux: refactor selinux_state_create()
` [PATCH v7 14/42] selinux: allow userspace to detect non-init SELinux namespace
` [PATCH v7 15/42] selinuxfs: restrict write operations to the same selinux namespace
` [PATCH v7 16/42] selinux: introduce a global SID table
` [PATCH v7 17/42] selinux: wrap security server interfaces to use the "
` [PATCH v7 18/42] selinux: introduce a Kconfig option for SELinux namespaces
` [PATCH v7 19/42] selinux: eliminate global SID table if !CONFIG_SECURITY_SELINUX_NS
` [PATCH v7 20/42] selinux: maintain a small cache in the global SID table
` [PATCH v7 21/42] selinux: update hook functions to use correct selinux namespace
` [PATCH v7 22/42] selinux: introduce cred_task_has_perm()
` [PATCH v7 23/42] selinux: introduce cred_has_extended_perms()
` [PATCH v7 24/42] selinux: introduce cred_self_has_perm()
` [PATCH v7 25/42] selinux: introduce cred_has_perm()
` [PATCH v7 26/42] selinux: introduce cred_ssid_has_perm() and cred_other_has_perm()
` [PATCH v7 27/42] selinux: introduce task_obj_has_perm()
` [PATCH v7 28/42] selinux: update bprm hooks for selinux namespaces
` [PATCH v7 29/42] selinux: add kerneldoc to new permission checking functions
` [PATCH v7 30/42] selinux: convert selinux_file_send_sigiotask() to namespace-aware helper
` [PATCH v7 31/42] selinux: rename cred_has_perm*() to cred_tsid_has_perm*()
` [PATCH v7 32/42] selinux: update cred_tsid_has_perm_noaudit() to return the combined avd
` [PATCH v7 33/42] selinux: convert additional checks to cred_ssid_has_perm()
` [PATCH v7 34/42] selinux: introduce selinux_state_has_perm()
` [PATCH v7 35/42] selinux: annotate selinuxfs permission checks
` [PATCH v7 36/42] selinux: annotate process transition "
` [PATCH v7 37/42] selinux: convert xfrm and netlabel "
` [PATCH v7 38/42] selinux: switch selinux_lsm_setattr() checks to current namespace
` [PATCH v7 39/42] selinux: make open_perms namespace-aware
` [PATCH v7 40/42] selinux: split cred_ssid_has_perm() into two cases
` [PATCH v7 41/42] selinux: convert nlmsg_sock_has_extended_perms() to namespace-aware
` [PATCH v7 42/42] selinux: disallow writes to /sys/fs/selinux/user in non-init namespaces


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).