Show patches with: State = Action Required       |   57 patches
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v2] selinux: log invalid contexts in AVCs [v2] selinux: log invalid contexts in AVCs - - - 0 0 0 2019-01-21 Ondrej Mosnacek New
[3/3] scripts: introduce env_use_destdir.sh helper [1/3] Travis-CI: upgrade PyPy to 6.0 - - - 0 0 0 2019-01-20 Nicolas Iooss New
[2/3] Travis-CI: add Ruby 2.6 to the test matrix [1/3] Travis-CI: upgrade PyPy to 6.0 - - - 0 0 0 2019-01-20 Nicolas Iooss New
[1/3] Travis-CI: upgrade PyPy to 6.0 [1/3] Travis-CI: upgrade PyPy to 6.0 1 - - 0 0 0 2019-01-20 Nicolas Iooss New
[-next] selinux: Fix error return code in policydb_read() [-next] selinux: Fix error return code in policydb_read() - - - 0 0 0 2019-01-18 Wei Yongjun New
[RFC] selinux: log invalid contexts in AVCs [RFC] selinux: log invalid contexts in AVCs - - - 0 0 0 2019-01-18 Ondrej Mosnacek New
libselinux/audit2why.so: Filter out non-python related symbols libselinux/audit2why.so: Filter out non-python related symbols 1 - - 0 0 0 2019-01-15 Petr Lautrbach New
selinux: avc: mark avc node as not a leak selinux: avc: mark avc node as not a leak - - - 0 0 0 2019-01-09 Prateek Patel New
[3/7] selinux: convert to kvmalloc Untitled series #57711 - - - 0 0 0 2018-12-17 Stephen Smalley New
[RFC] selinux: add a fallback to defcontext for native labeling [RFC] selinux: add a fallback to defcontext for native labeling - - - 0 0 0 2018-09-19 Jann Horn via Selinux New
[RFC,net-next,01/15] net: Reserve protocol numbers for LoRa - - - 0 0 0 2018-07-01 Andreas Färber New
[-next] security: use octal not symbolic permissions 1 - - 0 0 0 2018-06-11 Joe Perches New
[V3,5/5,selinux-next] selinux: Switch to rcu read locks for avc_compute - - - 0 0 0 2018-05-30 peter enderborg New
[V3,4/5,selinux-next] selinux: seqno separation - - - 0 0 0 2018-05-30 peter enderborg New
[V3,3/5,selinux-next] selinux: sidtab_clone switch to use rwlock. - - - 0 0 0 2018-05-30 peter enderborg New
[V3,2/5,selinux-next] selinux: Introduce selinux_ruleset struct - - - 0 0 0 2018-05-30 peter enderborg New
[V3,1/5,selinux-next] selinux: Make allocation atomic in policydb objects functions. - - - 0 0 0 2018-05-30 peter enderborg New
[15/18] security: Remove pr_fmt duplicate logging prefixes 1 - - 0 0 0 2018-05-10 Joe Perches New
[Fwd:,[PATCH,v2,14/15] selinux: allow setxattr on rootfs so initramfs code can set them] - - - 0 0 0 2018-01-25 Stephen Smalley New
[Fwd:,[PATCH,v2,15/15] selinux: delay sid population for rootfs till init is complete] - - - 0 0 0 2018-01-25 Stephen Smalley New
[RFC,v0.2] selinuxns: extend namespace support to security.selinux xattrs - - - 0 0 0 2017-11-21 James Morris New
selinux-testsuite: inet_socket: test xfrm state selectors - - - 0 0 0 2017-10-30 Stephen Smalley New
Additional tests for long-time supported netlink classes - - - 0 0 0 2017-07-13 Milos Malik New
[v6,2/2] selinux: expose policy brief via selinuxfs - - - 0 0 0 2017-05-17 Sebastien Buisson New
[v6,1/2] selinux: add brief info to policydb - - - 0 0 0 2017-05-17 Sebastien Buisson New
selinux-testsuite: capable_file: Add dac_override and dac_read_search tests - - - 0 0 0 2017-03-02 Stephen Smalley New
[v4,21/21] fuse: Allow user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - 0 0 0 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 0 0 0 2016-04-26 Seth Forshee New