Show patches with: Submitter = Seth Forshee       |    State = Action Required       |   168 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps 1 - - --- 2015-12-02 Seth Forshee New
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns 1 - - --- 2015-12-02 Seth Forshee New
[13/19] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2015-12-02 Seth Forshee New
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2015-12-02 Seth Forshee New
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes 1 - - --- 2015-12-02 Seth Forshee New
[10/19] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2015-12-02 Seth Forshee New
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2015-12-02 Seth Forshee New
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2015-12-02 Seth Forshee New
[07/19] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2015-12-02 Seth Forshee New
[06/19] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2015-12-02 Seth Forshee New
[05/19] userns: Replace in_userns with current_in_userns 2 - - --- 2015-12-02 Seth Forshee New
[04/19] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2015-12-02 Seth Forshee New
[03/19] fs: Treat foreign mounts as nosuid 2 - - --- 2015-12-02 Seth Forshee New
[02/19] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2015-12-02 Seth Forshee New
[01/19] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2015-12-02 Seth Forshee New
[v3,7/7] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2015-11-17 Seth Forshee New
[v3,6/7] userns: Replace in_userns with current_in_userns 1 - - --- 2015-11-17 Seth Forshee New
[v3,5/7] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2015-11-17 Seth Forshee New
[v3,4/7] fs: Treat foreign mounts as nosuid 1 - - --- 2015-11-17 Seth Forshee New
[v3,3/7] mtd: Check permissions towards mtd block device inode when mounting - - - --- 2015-11-17 Seth Forshee New
[v3,2/7] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-11-17 Seth Forshee New
[v3,1/7] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-11-17 Seth Forshee New
[v2,7/7] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-10-13 Seth Forshee New
[v2,6/7] userns: Replace in_userns with current_in_userns - - - --- 2015-10-13 Seth Forshee New
[v2,5/7] selinux: Add support for unprivileged mounts from user namespaces 1 - - --- 2015-10-13 Seth Forshee New
[v2,4/7] fs: Treat foreign mounts as nosuid - - - --- 2015-10-13 Seth Forshee New
[v2,3/7] mtd: Check permissions towards mtd block device inode when mounting - - - --- 2015-10-13 Seth Forshee New
[v2,2/7] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-10-13 Seth Forshee New
[v2,1/7] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-10-13 Seth Forshee New
[5/5] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-09-30 Seth Forshee New
[4/5] userns: Replace in_userns with current_in_userns - - - --- 2015-09-30 Seth Forshee New
[3/5] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-09-30 Seth Forshee New
[2/5] fs: Treat foreign mounts as nosuid - - - --- 2015-09-30 Seth Forshee New
[1/5] fs: Verify access of user towards block device file when mounting - - - --- 2015-09-30 Seth Forshee New
[v4,7/7] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-09-23 Seth Forshee New
[v4,6/7] Smack: Add support for unprivileged mounts from user namespaces 1 - - --- 2015-09-23 Seth Forshee New
[v4,5/7] fs: Treat foreign mounts as nosuid - - - --- 2015-09-23 Seth Forshee New
[v4,4/7] fs: Limit file caps to the user namespace of the super block 1 - - --- 2015-09-23 Seth Forshee New
[v4,3/7] fs: Verify access of user towards block device file when mounting - - - --- 2015-09-23 Seth Forshee New
[v4,2/7] userns: Simpilify MNT_NODEV handling. - - - --- 2015-09-23 Seth Forshee New
[v4,1/7] fs: Add user namesapace member to struct super_block - - - --- 2015-09-23 Seth Forshee New
[v3,7/7] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-09-16 Seth Forshee New
[v3,6/7] Smack: Add support for unprivileged mounts from user namespaces - - - --- 2015-09-16 Seth Forshee New
[v3,5/7] fs: Treat foreign mounts as nosuid - - - --- 2015-09-16 Seth Forshee New
[v3,4/7] fs: Limit file caps to the user namespace of the super block 1 - - --- 2015-09-16 Seth Forshee New
[v3,3/7] fs: Verify access of user towards block device file when mounting - - - --- 2015-09-16 Seth Forshee New
[v3,2/7] userns: Simpilify MNT_NODEV handling. - - - --- 2015-09-16 Seth Forshee New
[v3,1/7] fs: Add user namesapace member to struct super_block - - - --- 2015-09-16 Seth Forshee New
[v2,7/7] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-08-10 Seth Forshee New
[v2,6/7] Smack: Add support for unprivileged mounts from user namespaces - - - --- 2015-08-10 Seth Forshee New
[v2,5/7] fs: Treat foreign mounts as nosuid - - - --- 2015-08-10 Seth Forshee New
[v2,4/7] fs: Limit file caps to the user namespace of the super block 1 - - --- 2015-08-10 Seth Forshee New
[v2,3/7] fs: Verify access of user towards block device file when mounting - - - --- 2015-08-10 Seth Forshee New
[v2,2/7] userns: Simpilify MNT_NODEV handling. - - - --- 2015-08-10 Seth Forshee New
[v2,1/7] fs: Add user namesapace member to struct super_block - - - --- 2015-08-10 Seth Forshee New
[1/7] fs: Add user namesapace member to struct super_block - - - --- 2015-08-07 Seth Forshee New
[0/7] Initial support for user namespace owned mounts - - - --- 2015-07-28 Seth Forshee New
[6/7] selinux: Ignore security labels on user namespace mounts - - - --- 2015-07-24 Seth Forshee New
[0/7] Initial support for user namespace owned mounts - - - --- 2015-07-21 Seth Forshee New
[7/7] smack: Don't use security labels for user namespace mounts - - - --- 2015-07-15 Seth Forshee New
[6/7] selinux: Ignore security labels on user namespace mounts - - - --- 2015-07-15 Seth Forshee New
[5/7] security: Restrict security attribute updates for userns mounts - - - --- 2015-07-15 Seth Forshee New
[4/7] fs: Treat foreign mounts as nosuid - - - --- 2015-07-15 Seth Forshee New
[3/7] fs: Ignore file caps in mounts from other user namespaces 1 - - --- 2015-07-15 Seth Forshee New
[2/7] userns: Simpilify MNT_NODEV handling. - - - --- 2015-07-15 Seth Forshee New
[1/7] fs: Add user namesapace member to struct super_block - - - --- 2015-07-15 Seth Forshee New
[fuse-devel] fuse_get_context() and namespaces - - - --- 2015-06-03 Seth Forshee New
[fuse-devel] fuse_get_context() and namespaces - - - --- 2015-05-22 Seth Forshee New
« 1 2 »