Show patches with: none      |   9424 patches
« 1 2 ... 91 92 9394 95 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
Avoid mounting /proc outside of selinux_init_load_policy(). - - - --- 2016-05-13 Stephen Smalley Not Applicable
setools3: Allow to override PKG_CONFIG - - - --- 2016-05-12 Julien Pivotto Not Applicable
libqpol: Make Makefile AR overwritable - - - --- 2016-05-12 Julien Pivotto Not Applicable
libsemanage: Support overriding Makefile RANLIB - - - --- 2016-05-12 Julien Pivotto Not Applicable
[3/3] policycoreutils: setfiles - Modify to use selinux_restorecon - - - --- 2016-05-10 Richard Haines Not Applicable
[2/3] libselinux: Add setfiles support to selinux_restorecon(3) - - - --- 2016-05-10 Richard Haines Not Applicable
[1/3] libselinux: Evaluate inodes in selinux_restorecon(3) - - - --- 2016-05-10 Richard Haines Not Applicable
policycoreutils: fix the extract example in semodule.8 - - - --- 2016-05-10 Petr Lautrbach Not Applicable
policycoreutils: update sandbox.8 man page - - - --- 2016-05-10 Petr Lautrbach Not Applicable
policycoreutils: remove typos from chcat --help - - - --- 2016-05-10 Petr Lautrbach Not Applicable
libselinux, libsemanage: respect CC and PKG_CONFIG environment variable - - - --- 2016-05-08 Julien Pivotto Not Applicable
libsepol: Change which attributes CIL keeps in the binary policy - - - --- 2016-05-06 James Carter Not Applicable
[6/6,v3] libsepol: When generating CIL use HLL line mark for neverallows - - - --- 2016-05-05 James Carter Not Applicable
[5/6,v3] libsepol/cil: Remove path field from cil_tree_node struct - - - --- 2016-05-05 James Carter Not Applicable
[4/6,v3] libsepol/cil: Replace cil_log() calls with cil_tree_log() - - - --- 2016-05-05 James Carter Not Applicable
[3/6,v3] libsepol/cil: Add cil_tree_log() and supporting functions - - - --- 2016-05-05 James Carter Not Applicable
[2/6,v3] libsepol/cil: Store CIL filename in parse tree and AST - - - --- 2016-05-05 James Carter Not Applicable
[1/6,v3] libsepol/cil: Add high-level language line marking support - - - --- 2016-05-05 James Carter Not Applicable
[3/3] libsepol: remove libsepol.map when cleaning - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[2/3] sepolgen: remove additional files when cleaning - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[1/3] Update .gitignore files - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[6/6,v2] libsepol: When generating CIL use HLL line mark for neverallows - - - --- 2016-05-04 James Carter Not Applicable
[5/6,v2] libsepol/cil: Remove path field from cil_tree_node struct - - - --- 2016-05-04 James Carter Not Applicable
[4/6,v2] libsepol/cil: Replace cil_log() calls with cil_tree_log() - - - --- 2016-05-04 James Carter Not Applicable
[3/6,v2] libsepol/cil: Add cil_tree_log() and supporting functions - - - --- 2016-05-04 James Carter Not Applicable
[2/6,v2] libsepol/cil: Store CIL filename in parse tree and AST - - - --- 2016-05-04 James Carter Not Applicable
[1/6,v2] libsepol/cil: Add high-level language line marking support - - - --- 2016-05-04 James Carter Not Applicable
libsepol: Change logic of bounds checking - - - --- 2016-05-03 James Carter Not Applicable
[v3] selinux: Only apply bounds checking to source types - - - --- 2016-05-03 Stephen Smalley Superseded
libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__. - - - --- 2016-05-03 Stephen Smalley Not Applicable
Fix multiple spelling errors - - - --- 2016-05-01 Laurent Bigonville Not Applicable
[v4,7/7] genhomedircon: fix FALLBACK_NAME regex - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,6/7] genhomedircon: write contexts for username and userid - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,5/7] genhomedircon: make USERID, USERNAME context lists - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,4/7] genhomedircon: Add uid and gid to struct user_entry - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,3/7] genhomedircon: move fallback user to genhomedircon_user_entry_t - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,2/7] genhomedircon: rename FALLBACK #defines consistent with user struct - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,1/7] genhomedircon: factor out common replacement code - - - --- 2016-04-30 Jason Zaman Not Applicable
libsepol: Only apply bounds checking to source types in rules - - - --- 2016-04-29 James Carter Not Applicable
libsepol/cil: Do not add an attribute as a type in the attr_type_map - - - --- 2016-04-29 James Carter Not Applicable
[v2] selinux: Only apply bounds checking to source types - - - --- 2016-04-29 Stephen Smalley Superseded
[v3,5/8] genhomedircon: Add uid and gid to struct user_entry - - - --- 2016-04-29 Jason Zaman Superseded
selinux: Only apply bounds checking to source types - - - --- 2016-04-28 Stephen Smalley Superseded
[2/2] libsepol: fix type bounds checking for attributes - - - --- 2016-04-28 Stephen Smalley Not Applicable
[1/2] libsepol: Only apply bounds checking to source types in rules - - - --- 2016-04-28 Stephen Smalley Not Applicable
[v4,21/21] fuse: Allow user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - --- 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 2 - - --- 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - --- 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid 2 - - --- 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock 1 - - --- 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-26 Seth Forshee New
selinux: Build policy on systems not supporting DCCP protocol - - - --- 2016-04-24 Richard Haines Accepted
[v2,8/8] genhomedircon: fix FALLBACK_NAME regex - - - --- 2016-04-23 Jason Zaman Superseded
[v2,7/8] genhomedircon: write contexts for username and userid - - - --- 2016-04-23 Jason Zaman Superseded
[v2,6/8] genhomedircon: make USERID, USERNAME context lists - - - --- 2016-04-23 Jason Zaman Superseded
[v2,5/8] genhomedircon: Add uid and gid to struct user_entry - - - --- 2016-04-23 Jason Zaman Superseded
[v2,4/8] genhomedircon: make all write context funcs take user_entry struct - - - --- 2016-04-23 Jason Zaman Superseded
[v2,3/8] genhomedircon: rename FALLBACK #defines consistent with struct - - - --- 2016-04-23 Jason Zaman Superseded
[v2,2/8] genhomedircon: move fallback user to genhomedircon_user_entry_t - - - --- 2016-04-23 Jason Zaman Superseded
[v2,1/8] genhomedircon: factor out common replacement code - - - --- 2016-04-23 Jason Zaman Superseded
[v3,21/21] fuse: Allow user namespace mounts - - - --- 2016-04-22 Seth Forshee Superseded
[v3,18/21] fuse: Add support for pid namespaces - - - --- 2016-04-22 Seth Forshee Superseded
[v3,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2016-04-22 Seth Forshee Superseded
[v3,16/21] fs: Allow superblock owner to access do_remount_sb() - - - --- 2016-04-22 Seth Forshee Superseded
[v3,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids - - - --- 2016-04-22 Seth Forshee Superseded
[v3,13/21] fs: Update posix_acl support to handle user namespace mounts - - - --- 2016-04-22 Seth Forshee Superseded
[v3,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2016-04-22 Seth Forshee Superseded
[v3,11/21] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2016-04-22 Seth Forshee Superseded
[v3,10/21] fs: Check for invalid i_uid in may_follow_link() - - - --- 2016-04-22 Seth Forshee Superseded
[v3,09/21] Smack: Handle labels consistently in untrusted mounts - - - --- 2016-04-22 Seth Forshee Superseded
[v3,08/21] userns: Replace in_userns with current_in_userns - - - --- 2016-04-22 Seth Forshee Superseded
[v3,07/21] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2016-04-22 Seth Forshee Superseded
[v3,06/21] fs: Treat foreign mounts as nosuid - - - --- 2016-04-22 Seth Forshee Superseded
[v3,04/21] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2016-04-22 Seth Forshee Superseded
[v3,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces - - - --- 2016-04-22 Seth Forshee Superseded
« 1 2 ... 91 92 9394 95 »