Show patches with: none      |   3572 patches
« 1 2 3 435 36 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC] selinux: randomize layout of key structures [RFC] selinux: randomize layout of key structures - - - 0 0 0 2019-12-13 Stephen Smalley New
[RFC] selinux: clean up selinux_enabled/disabled [RFC] selinux: clean up selinux_enabled/disabled - - - 0 0 0 2019-12-13 Stephen Smalley New
[testsuite] selinux-testsuite: fix tun_tap checks [testsuite] selinux-testsuite: fix tun_tap checks 1 - - 0 0 0 2019-12-13 Ondrej Mosnacek New
LSM: allow an LSM to disable all hooks at once LSM: allow an LSM to disable all hooks at once - - - 0 0 0 2019-12-11 Ondrej Mosnacek New
[v2] mcstrans: start early and stop late [v2] mcstrans: start early and stop late - - - 0 0 0 2019-12-11 Dominick Grift New
[2/8] afs: Fix SELinux setting security label on /afs Untitled series #214893 - - - 0 0 0 2019-12-11 David Howells New
[v4] selinux-testsuite: add lockdown tests [v4] selinux-testsuite: add lockdown tests - - - 0 0 0 2019-12-10 Stephen Smalley New
[v1,3/3] perf tool: extend Perf tool with CAP_SYS_PERFMON support Introduce CAP_SYS_PERFMON capability for secure Perf users groups - - - 0 0 0 2019-12-05 Alexey Budankov New
[v1,2/3] perf/core: apply CAP_SYS_PERFMON to CPUs and kernel monitoring Introduce CAP_SYS_PERFMON capability for secure Perf users groups - - - 0 0 0 2019-12-05 Alexey Budankov New
[v1,1/3] capabilities: introduce CAP_SYS_PERFMON to kernel and user space Introduce CAP_SYS_PERFMON capability for secure Perf users groups - - - 0 0 0 2019-12-05 Alexey Budankov New
[v11,25/25] AppArmor: Remove the exclusive flag [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,24/25] LSM: Add /proc attr entry for full LSM context [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,23/25] NET: Add SO_PEERCONTEXT for multiple LSMs [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,22/25] Audit: Include object data for all security modules [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,21/25] Audit: Add subj_LSM fields when necessary [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,20/25] LSM: Verify LSM display sanity in binder [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,19/25] NET: Store LSM netlabel data in a lsmblob [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,18/25] LSM: security_secid_to_secctx in netlink netfilter [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,17/25] LSM: Use lsmcontext in security_inode_getsecctx [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,16/25] LSM: Use lsmcontext in security_dentry_init_security [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,15/25] LSM: Use lsmcontext in security_secid_to_secctx [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,14/25] LSM: Ensure the correct LSM context releaser [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,13/25] LSM: Specify which LSM to display [v11,01/25] LSM: Infrastructure management of the sock security - - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,12/25] IMA: Change internal interfaces to use lsmblobs [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,11/25] LSM: Use lsmblob in security_cred_getsecid [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,10/25] LSM: Use lsmblob in security_inode_getsecid [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,09/25] LSM: Use lsmblob in security_task_getsecid [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,08/25] LSM: Use lsmblob in security_ipc_getsecid [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,07/25] LSM: Use lsmblob in security_secid_to_secctx [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,06/25] LSM: Use lsmblob in security_secctx_to_secid [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,05/25] net: Prepare UDS for security module stacking [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,04/25] LSM: Use lsmblob in security_kernel_act_as [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,03/25] LSM: Use lsmblob in security_audit_rule_match [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[v11,02/25] LSM: Create and manage the lsmblob data structure. [v11,01/25] LSM: Infrastructure management of the sock security 1 - - 0 0 0 2019-11-13 Casey Schaufler New
[v11,01/25] LSM: Infrastructure management of the sock security [v11,01/25] LSM: Infrastructure management of the sock security 1 2 - 0 0 0 2019-11-13 Casey Schaufler New
[RFC,v3] security,capability: pass object information to security_capable [RFC,v3] security,capability: pass object information to security_capable - - - 0 0 0 2019-08-15 Aaron Goidel New
[RFC] audit, security: allow LSMs to selectively enable audit collection [RFC] audit, security: allow LSMs to selectively enable audit collection - - - 0 0 0 2019-08-15 Aaron Goidel New
[v4,21/21] fuse: Allow user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - 0 0 0 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - 0 0 0 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 0 0 0 2016-04-26 Seth Forshee New
selinux: remove unnecessary selinux cred request selinux: remove unnecessary selinux cred request - 1 - 0 0 0 2019-12-12 Shaokun Zhang Accepted
security: only build lsm_audit if CONFIG_SECURITY=y security: only build lsm_audit if CONFIG_SECURITY=y - - - 0 0 0 2019-12-10 Stephen Smalley Accepted
[RFC] selinux: ensure we cleanup the internal AVC counters on error in avc_insert() [RFC] selinux: ensure we cleanup the internal AVC counters on error in avc_insert() 1 - - 0 0 0 2019-12-10 Paul Moore Accepted
[V4,1/1] selinux-testsuite: Add perf_event tests [V4,1/1] selinux-testsuite: Add perf_event tests 1 - - 0 0 0 2019-12-08 Richard Haines Accepted
python/semanage: check variable type of port before trying to split python/semanage: check variable type of port before trying to split 1 - - 0 0 0 2019-12-07 Joshua Schmidlkofer Accepted
[V2] selinux_testsuite: Add socketpair test [V2] selinux_testsuite: Add socketpair test 1 - - 0 0 0 2019-12-04 Richard Haines Accepted
selinux-testsuite: Add TUN/TAP driver tests selinux-testsuite: Add TUN/TAP driver tests 1 - - 0 0 0 2019-12-01 Richard Haines Accepted
[testsuite,v6] policy: use the kernel_request_load_module() interface [testsuite,v6] policy: use the kernel_request_load_module() interface 1 - - 0 0 0 2019-11-28 Ondrej Mosnacek Accepted
[RFC,v2] security,lockdown,selinux: implement SELinux lockdown [RFC,v2] security,lockdown,selinux: implement SELinux lockdown - 1 - 0 0 0 2019-11-27 Stephen Smalley Accepted
selinux-testsuite: update the dependencies in README.md selinux-testsuite: update the dependencies in README.md 1 - - 0 0 0 2019-11-27 Paul Moore Accepted
[testsuite] travis: improve selinuxfs mocking [testsuite] travis: improve selinuxfs mocking 1 - - 0 0 0 2019-11-27 Ondrej Mosnacek Accepted
[GIT,PULL] SELinux patches for v5.5 [GIT,PULL] SELinux patches for v5.5 - - - 0 0 0 2019-11-26 Paul Moore Accepted
[v5] selinux: cache the SID -> context string translation [v5] selinux: cache the SID -> context string translation - 2 1 0 0 0 2019-11-26 Ondrej Mosnacek Accepted
selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests selinux: clean up selinux_inode_permission MAY_NOT_BLOCK tests - - - 0 0 0 2019-11-22 Stephen Smalley Accepted
[2/2] selinux: fall back to ref-walk if audit is required [1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link" - - - 0 0 0 2019-11-22 Stephen Smalley Accepted
[1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link" [1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link" - - - 0 0 0 2019-11-22 Stephen Smalley Accepted
[V5] selinux-testsuite: Add kernel module tests [V5] selinux-testsuite: Add kernel module tests 1 - - 0 0 0 2019-11-22 Richard Haines Accepted
[v9] selinux: sidtab: reverse lookup hash table [v9] selinux: sidtab: reverse lookup hash table - 1 1 0 0 0 2019-11-22 Jeff Vander Stoep Accepted
Travis-CI: Drop Python 2 from matrix Travis-CI: Drop Python 2 from matrix 1 - - 0 0 0 2019-11-19 Petr Lautrbach Accepted
[testsuite,v4,3/3] travis: test building the test policy package Fix refpolicy build & build test_policy.pp in Travis - 1 1 0 0 0 2019-11-18 Ondrej Mosnacek Accepted
[testsuite,v4,2/3] policy: add fallbacks for Fedora-specific macros Fix refpolicy build & build test_policy.pp in Travis - - - 0 0 0 2019-11-18 Ondrej Mosnacek Accepted
[testsuite,v4,1/3] policy: drop the unneeded userdom_search_generic_user_home_dirs() Fix refpolicy build & build test_policy.pp in Travis - - - 0 0 0 2019-11-18 Ondrej Mosnacek Accepted
dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot dbus: Fix FileNotFoundError in org.selinux.relabel_on_boot 1 - - 0 0 0 2019-11-15 Petr Lautrbach Accepted
[V3] selinux-testsuite: Add key_socket tests [V3] selinux-testsuite: Add key_socket tests - - - 0 0 0 2019-11-15 Richard Haines Accepted
restorecond: Fix redundant console log output error restorecond: Fix redundant console log output error 1 - - 0 0 0 2019-11-14 kongbaichuan Accepted
[testsuite] tests/sctp: initialize addrlen for accept(2) properly [testsuite] tests/sctp: initialize addrlen for accept(2) properly 1 - - 0 0 0 2019-11-12 Ondrej Mosnacek Accepted
[3/3] libselinux,libsemanage: check in python_exception.i files [1/3] libselinux,libsemanage: never create -.o in exception.sh 1 - - 0 0 0 2019-11-11 Nicolas Iooss Accepted
[2/3] libselinux,libsemanage: fix python_exception.i dependencies [1/3] libselinux,libsemanage: never create -.o in exception.sh 1 - - 0 0 0 2019-11-11 Nicolas Iooss Accepted
[1/3] libselinux,libsemanage: never create -.o in exception.sh [1/3] libselinux,libsemanage: never create -.o in exception.sh 1 - - 0 0 0 2019-11-11 Nicolas Iooss Accepted
[v2] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions" [v2] python/sepolicy: Revert "Only invoke RPM on RPM-enabled Linux distributions" 1 - - 0 0 0 2019-11-07 Petr Lautrbach Accepted
Replace www.nsa.gov references by github.com/SELinuxProject Replace www.nsa.gov references by github.com/SELinuxProject - - - 0 0 0 2019-11-06 Petr Lautrbach Accepted
libsepol/cil: Report disabling an optional block only at high verbose levels libsepol/cil: Report disabling an optional block only at high verbose levels 1 - - 0 0 0 2019-11-01 jwcart2 Accepted
« 1 2 3 435 36 »