Show patches with: none      |   8999 patches
« 1 2 ... 52 53 5489 90 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[userspace,v2,1/4] libsepol: fix CIL_KEY_* build errors with -fno-common Fix build with -fno-common - - - --- 2020-01-23 Ondrej Mosnacek Accepted
[userspace,4/4] Makefile: always build with -fno-common Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,3/4] checkpolicy: remove unused te_assertions Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,2/4] libsepol: remove unused cil_mem_error_handler Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,1/4] libsepol: fix CIL_KEY_* build errors with -fno-common Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[v4] libsepol,checkpolicy: remove use of hardcoded security class values [v4] libsepol,checkpolicy: remove use of hardcoded security class values 1 - - --- 2020-01-21 Stephen Smalley Accepted
libselinux: export flush_class_cache(), call it on policyload libselinux: export flush_class_cache(), call it on policyload - - - --- 2020-01-21 Stephen Smalley Accepted
[v5,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[2/2] selinux-testsuite: Add fs*(2) API filesystem tests selinux-testsuite: Add fs*(2) API filesystem tests 1 - - --- 2020-01-20 Richard Haines Superseded
[1/2] selinux-testsuite: Prepare for adding fs*(2) API tests selinux-testsuite: Add fs*(2) API filesystem tests 1 - - --- 2020-01-20 Richard Haines Superseded
[V7,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests 1 - - --- 2020-01-19 Richard Haines Accepted
[v2] selinux: fix regression introduced by move_mount(2) syscall [v2] selinux: fix regression introduced by move_mount(2) syscall - 2 - --- 2020-01-17 Stephen Smalley Accepted
[v3] libsepol,checkpolicy: remove use of hardcoded security class values [v3] libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-17 Stephen Smalley Superseded
libselinux: update man pages for userspace policy enforcers libselinux: update man pages for userspace policy enforcers - - - --- 2020-01-17 Stephen Smalley Accepted
selinux: move status variables out of selinux_ss selinux: move status variables out of selinux_ss - 1 - --- 2020-01-17 Ondrej Mosnacek Accepted
[v3] selinux: map RTM_GETLINK to a privileged permission [v3] selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-17 Jeffrey Vander Stoep Changes Requested
[v2,5/5] selinux: generalize evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,4/5] selinux: convert cond_expr to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,3/5] selinux: convert cond_av_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,2/5] selinux: convert cond_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,1/5] selinux: simplify evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Accepted
[RFC] selinux: policydb - convert filename trans hash to rhashtable [RFC] selinux: policydb - convert filename trans hash to rhashtable - - - --- 2020-01-16 Lucas Stach Changes Requested
[v2] libsepol,checkpolicy: remove use of hardcoded security class values [v2] libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-16 Stephen Smalley Superseded
libsepol,checkpolicy: remove use of hardcoded security class values libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-16 Stephen Smalley Superseded
[v2] selinux: map RTM_GETLINK to a privileged permission [v2] selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-16 Jeffrey Vander Stoep Superseded
[V6,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-16 Richard Haines Superseded
[v2] selinux: fix wrong buffer types in policydb.c [v2] selinux: fix wrong buffer types in policydb.c - 1 - --- 2020-01-16 Ondrej Mosnacek Accepted
selinux: map RTM_GETLINK to a privileged permission selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-16 Jeffrey Vander Stoep Superseded
selinux: fix sparse warnings in policydb.c selinux: fix sparse warnings in policydb.c - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[6/6] selinux: generalize evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[5/6] selinux: convert cond_expr to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[4/6] selinux: convert cond_av_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[3/6] selinux: convert cond_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[2/6] selinux: simplify security_preserve_bools() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[1/6] selinux: do not allocate ancillary buffer on first load selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Accepted
libselinux: remove flask.h and av_permissions.h libselinux: remove flask.h and av_permissions.h 1 - - --- 2020-01-15 Stephen Smalley Accepted
[V5,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests 1 - - --- 2020-01-14 Richard Haines Superseded
[V4,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-14 Richard Haines Superseded
[RFC] selinux: implement move_mount hook [RFC] selinux: implement move_mount hook - - - --- 2020-01-13 Stephen Smalley Superseded
[v2] selinux: remove redundant selinux_nlmsg_perm [v2] selinux: remove redundant selinux_nlmsg_perm 1 - - --- 2020-01-13 Huaisheng Ye Accepted
[V3,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-12 Richard Haines Superseded
selinux: remove redundant selinux_nlmsg_perm selinux: remove redundant selinux_nlmsg_perm 1 - - --- 2020-01-12 Huaisheng Ye Superseded
[RFC] selinux: remove redundant allocation and helper functions [RFC] selinux: remove redundant allocation and helper functions 1 1 - --- 2020-01-10 Paul Moore Accepted
[testsuite] tests/prlimit: avoid invalid limit combinations [testsuite] tests/prlimit: avoid invalid limit combinations 1 - - --- 2020-01-10 Ondrej Mosnacek Accepted
[RFC] selinux: add policy capability for systemd overhaul [RFC] selinux: add policy capability for systemd overhaul - - - --- 2020-01-10 Christian Göttsche Rejected
[RFC,3/3] libselinux: add policy capability test binary Add policy capability for systemd overhaul - - - --- 2020-01-10 Christian Göttsche RFC
[RFC,2/3] libselinux: add security_is_policy_capabilty_enabled() Add policy capability for systemd overhaul - - - --- 2020-01-10 Christian Göttsche RFC
[RFC,1/3] libsepol: add policy capability for systemd overhaul Add policy capability for systemd overhaul - - - --- 2020-01-10 Christian Göttsche RFC
selinux: remove redundant msg_msg_alloc_security selinux: remove redundant msg_msg_alloc_security 1 - - --- 2020-01-10 Huaisheng Ye Accepted
[V2,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-09 Richard Haines Superseded
[v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. [v4] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. - - - --- 2020-01-09 Ravi Kumar Siddojigari Accepted
selinux: make default_noexec read-only after init selinux: make default_noexec read-only after init - - - --- 2020-01-08 Stephen Smalley Accepted
Documentation,selinux: deprecate setting checkreqprot to 1 Documentation,selinux: deprecate setting checkreqprot to 1 - - - --- 2020-01-08 Stephen Smalley Accepted
[v2] selinux: reorder hooks to make runtime disable less broken [v2] selinux: reorder hooks to make runtime disable less broken - 1 - --- 2020-01-08 Ondrej Mosnacek Accepted
[4.19,011/115] afs: Fix SELinux setting security label on /afs Untitled series #224925 - 1 - --- 2020-01-07 Greg KH Accepted
[5.4,020/191] afs: Fix SELinux setting security label on /afs Untitled series #224899 - 1 - --- 2020-01-07 Greg KH Accepted
[RFC] selinux: deprecate setting checkreqprot to 1 [RFC] selinux: deprecate setting checkreqprot to 1 - - - --- 2020-01-07 Stephen Smalley RFC
Documentation,selinux: fix references to old selinuxfs mount point Documentation,selinux: fix references to old selinuxfs mount point - - - --- 2020-01-07 Stephen Smalley Accepted
Documentation,selinux: fix references to old selinuxfs mount point Documentation,selinux: fix references to old selinuxfs mount point - - - --- 2020-01-07 Stephen Smalley Changes Requested
[2/2] security,selinux: get rid of security_delete_hooks() LSM: Drop security_delete_hooks() 1 1 - --- 2020-01-07 Ondrej Mosnacek Changes Requested
[1/2] selinux: treat atomic flags more carefully LSM: Drop security_delete_hooks() 1 2 - --- 2020-01-07 Ondrej Mosnacek Accepted
[v2] selinux: deprecate disabling SELinux and runtime [v2] selinux: deprecate disabling SELinux and runtime 3 - - --- 2020-01-07 Paul Moore Accepted
[v2] selinuxfs: use scnprinft to get real length for inode [v2] selinuxfs: use scnprinft to get real length for inode - - - --- 2020-01-07 liuyang34 Accepted
security: selinux: allow per-file labelling for binderfs security: selinux: allow per-file labelling for binderfs 3 - - --- 2020-01-06 Hridya Valsaraju Accepted
[v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. [v3] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. - - - --- 2020-01-06 Ravi Kumar Siddojigari Changes Requested
selinuxfs: use scnprinft to get real length in sel_read_class selinuxfs: use scnprinft to get real length in sel_read_class - - - --- 2020-01-06 liuyang34 Changes Requested
[v13,26/25] Audit: Multiple LSM support in audit rules LSM: Module stacking for AppArmor - - - --- 2020-01-03 Casey Schaufler Superseded
[v13,25/25] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor - 2 - --- 2019-12-24 Casey Schaufler Superseded
[24/25] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - - - --- 2019-12-24 Casey Schaufler Superseded
[v13,23/25] NET: Add SO_PEERCONTEXT for multiple LSMs LSM: Module stacking for AppArmor - - - --- 2019-12-24 Casey Schaufler Superseded
[v13,22/25] Audit: Include object data for all security modules LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,21/25] Audit: Add subj_LSM fields when necessary LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,20/25] LSM: Verify LSM display sanity in binder LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,19/25] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,18/25] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,17/25] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,16/25] LSM: Use lsmcontext in security_dentry_init_security LSM: Module stacking for AppArmor - - - --- 2019-12-24 Casey Schaufler Superseded
[v13,15/25] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,14/25] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,13/25] LSM: Specify which LSM to display LSM: Module stacking for AppArmor 1 - - --- 2019-12-24 Casey Schaufler Superseded
[v13,12/25] IMA: Change internal interfaces to use lsmblobs LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,11/25] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,10/25] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,09/25] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,08/25] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,07/25] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,06/25] Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,05/25] net: Prepare UDS for security module stacking LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,04/25] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,03/25] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 2 - --- 2019-12-24 Casey Schaufler Superseded
[v13,02/25] LSM: Create and manage the lsmblob data structure. LSM: Module stacking for AppArmor 1 1 - --- 2019-12-24 Casey Schaufler Superseded
« 1 2 ... 52 53 5489 90 »