Patchwork SELinux Development list

login
register
mail settings

Incoming patches

Filters: State = Action Required remove filter    |    Archived = No remove filter
Patch A/R/T Date Submitter Delegate State
[07/32] selinux: Implement the new mount API LSM hooks [ver #9] - - - 2018-07-10 David Howells New
python/semanage: Replace bare except with specific one - - - 2018-07-10 Vit Mojzis New
python/semanage: Fix logger class definition - - - 2018-07-09 Vit Mojzis New
[RFC,v3] ipv6: make ipv6_renew_options() interrupt/kernel safe - - - 2018-07-04 Paul Moore New
[RFC,v2] ipv6: make ipv6_renew_options() interrupt/kernel safe - - - 2018-07-02 Paul Moore New
[RFC,net-next,01/15] net: Reserve protocol numbers for LoRa - - - 2018-07-01 Andreas Färber New
[v4,05/26] docs: Fix some broken references 5 1 - 2018-06-15 Mauro Carvalho Chehab New
[v3,05/27] docs: Fix some broken references 5 1 - 2018-06-14 Mauro Carvalho Chehab New
[-next] security: use octal not symbolic permissions 1 - - 2018-06-11 Joe Perches New
[V3,5/5,selinux-next] selinux: Switch to rcu read locks for avc_compute - - - 2018-05-30 peter enderborg New
[V3,4/5,selinux-next] selinux: seqno separation - - - 2018-05-30 peter enderborg New
[V3,3/5,selinux-next] selinux: sidtab_clone switch to use rwlock. - - - 2018-05-30 peter enderborg New
[V3,2/5,selinux-next] selinux: Introduce selinux_ruleset struct - - - 2018-05-30 peter enderborg New
[V3,1/5,selinux-next] selinux: Make allocation atomic in policydb objects functions. - - - 2018-05-30 peter enderborg New
[4/6] openvswitch: convert to genradix - - - 2018-05-23 willy@infradead.org New
[6/6] Drop flex_arrays - - - 2018-05-23 Kent Overstreet New
[5/6] selinux: convert to genradix - - - 2018-05-23 Kent Overstreet New
[4/6] openvswitch: convert to genradix - - - 2018-05-23 Kent Overstreet New
[3/6] md: convert to genradix - - - 2018-05-23 Kent Overstreet New
[2/6] proc: commit to genradix - - - 2018-05-23 Kent Overstreet New
[1/6] Generic radix trees - - - 2018-05-23 Kent Overstreet New
[24/23] LSM: Functions for dealing with struct secids - - - 2018-05-11 Casey Schaufler New
[23/23] Netfilter: Add a selection for Smack - - - 2018-05-11 Casey Schaufler New
[22/23] LSM: Fix setting of the IMA data in inode init - - - 2018-05-11 Casey Schaufler New
[21/23] LSM: Multiple concurrent major security modules - - - 2018-05-11 Casey Schaufler New
[20/23] LSM: Move common usercopy into - - - 2018-05-11 Casey Schaufler New
[19/23] LSM: Use multiple secids in LSM interfaces - - - 2018-05-11 Casey Schaufler New
[18/23] LSM: Use multiple secids in security module interfaces - - - 2018-05-11 Casey Schaufler New
[17/23] LSM: Allow mount options from multiple security modules - - - 2018-05-11 Casey Schaufler New
[16/23] LSM: Sharing of security blobs - - - 2018-05-11 Casey Schaufler New
[15/23] LSM: Mark security blob allocation failures as unlikely - - - 2018-05-11 Casey Schaufler New
[14/23] LSM: Infrastructure management of the key security blob - - - 2018-05-11 Casey Schaufler New
[13/23] LSM: Infrastructure management of the ipc security blob - - - 2018-05-11 Casey Schaufler New
[12/23] LSM: Infrastructure management of the sock security - - - 2018-05-11 Casey Schaufler New
[11/23] LSM: Infrastructure management of the superblock - - - 2018-05-11 Casey Schaufler New
[10/23] LSM: Infrastructure management of the inode security - - - 2018-05-11 Casey Schaufler New
[09/23] Smack: Abstract use of inode security blob - - - 2018-05-11 Casey Schaufler New
[08/23] SELinux: Abstract use of inode security blob - - - 2018-05-11 Casey Schaufler New
[07/23] LSM: Infrastructure management of the task security - - - 2018-05-11 Casey Schaufler New
[06/23] LSM: Infrastructure management of the file security - - - 2018-05-11 Casey Schaufler New
[05/23] SELinux: Abstract use of file security blob - - - 2018-05-11 Casey Schaufler New
[04/23] LSM: Infrastructure management of the cred security - - - 2018-05-11 Casey Schaufler New
[03/23] SELinux: Abstract use of cred security blob - - - 2018-05-11 Casey Schaufler New
[02/23] Smack: Abstract use of cred security blob - - - 2018-05-11 Casey Schaufler New
[01/23] procfs: add smack subdir to attrs - - - 2018-05-11 Casey Schaufler New
[15/18] security: Remove pr_fmt duplicate logging prefixes 1 - - 2018-05-10 Joe Perches New
[Fwd:,[PATCH,v2,14/15] selinux: allow setxattr on rootfs so initramfs code can set them] - - - 2018-01-25 Stephen Smalley New
[Fwd:,[PATCH,v2,15/15] selinux: delay sid population for rootfs till init is complete] - - - 2018-01-25 Stephen Smalley New
[RFC,v0.2] selinuxns: extend namespace support to security.selinux xattrs - - - 2017-11-21 James Morris New
selinux-testsuite: inet_socket: test xfrm state selectors - - - 2017-10-30 Stephen Smalley New
Additional tests for long-time supported netlink classes - - - 2017-07-13 Milos Malik New
[v6,2/2] selinux: expose policy brief via selinuxfs - - - 2017-05-17 Sebastien Buisson New
[v6,1/2] selinux: add brief info to policydb - - - 2017-05-17 Sebastien Buisson New
selinux-testsuite: capable_file: Add dac_override and dac_read_search tests - - - 2017-03-02 Stephen Smalley New
[v4,21/21] fuse: Allow user namespace mounts - - - 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() - - - 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids - - - 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts - - - 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns - - - 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() - - - 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts - - - 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns - - - 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces - - - 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid - - - 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting - - - 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() - - - 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces - - - 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock - - - 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces - - - 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() - - - 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids - - - 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts - - - 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() - - - 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() - - - 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns - - - 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() - - - 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 2016-04-26 Seth Forshee New