Show patches with: Archived = No       |   9222 patches
« 1 2 ... 90 91 92 93 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC,v2,16/18] calipso: Add validation of CALIPSO option. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,15/18] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,14/18] calipso: Allow the lsm to label the skbuff directly. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,13/18] calipso: Allow request sockets to be relabelled by the lsm. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,12/18] ipv6: Allow request socks to contain IPv6 options. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,11/18] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,10/18] calipso: Set the calipso socket label to match the secattr. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,09/18] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,08/18] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,07/18] netlabel: Add support for removing a CALIPSO DOI. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,06/18] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,05/18] netlabel: Add support for enumerating the CALIPSO DOI list. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,04/18] netlabel: Add support for querying a CALIPSO DOI. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,03/18] netlabel: Initial support for the CALIPSO netlink protocol. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,02/18] netlabel: Add an address family to domain hash entries. - - - --- 2016-01-08 Huw Davies Changes Requested
[RFC,v2,01/18] netlabel: Mark rcu pointers with __rcu. - - - --- 2016-01-08 Huw Davies Changes Requested
selinux: Inode label revalidation performance fix - - - --- 2016-01-05 Andreas Gruenbacher Accepted
[RESEND,v2,18/18] fuse: Allow user namespace mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,15/18] fuse: Add support for pid namespaces - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2016-01-04 Seth Forshee Superseded
update deps and change yum to dnf - - - --- 2016-01-04 Joshua Brindle Rejected
policycoreutils: semanage: list reserver_port_t - - - --- 2016-01-04 Petr Lautrbach Accepted
[RFC,17/17] calipso: Add a label cache. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,16/17] calipso: Add validation of CALIPSO option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,15/17] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - --- 2015-12-22 Huw Davies Superseded
[RFC,14/17] calipso: Allow the lsm to label the skbuff directly. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,13/17] calipso: Allow request sockets to be relabelled by the lsm. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,12/17] ipv6: Allow request socks to contain IPv6 options. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,11/17] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,10/17] calipso: Set the calipso socket label to match the secattr. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,09/17] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,08/17] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,07/17] netlabel: Add support for removing a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,06/17] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,05/17] netlabel: Add support for enumerating the CALIPSO DOI list. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,04/17] netlabel: Add support for querying a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,03/17] netlabel: Initial support for the CALIPSO netlink protocol. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,02/17] netlabel: Add an address family to domain hash entries. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,01/17] netlabel: Mark rcu pointers with __rcu. - - - --- 2015-12-22 Huw Davies Superseded
[v2] secilc/docs: Convert DocBook documentation into github markdown - - - --- 2015-12-15 Yuli Khodorkovskiy Accepted
policycoreutils/chcat: Add a fallback in case os.getlogin() returns nothing - - - --- 2015-12-13 Laurent Bigonville Accepted
secilc/docs: Convert DocBook documentation into github markdown - - - --- 2015-12-11 Yuli Khodorkovskiy Changes Requested
libselinux: Don't wrap rpm_execcon with DISABLE_RPM - - - --- 2015-12-10 Petr Lautrbach Accepted
libselinux/man: Add information about thread specific on setfscreatecon - - - --- 2015-12-09 Petr Lautrbach Accepted
libselinux: Verify context input to funtions to make sure the context field is not null. - - - --- 2015-12-09 Petr Lautrbach Rejected
[v2,18/18] fuse: Allow user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-07 Seth Forshee Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,15/18] fuse: Add support for pid namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2015-12-07 Seth Forshee Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-07 Seth Forshee Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2015-12-07 Seth Forshee Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-07 Seth Forshee Superseded
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-07 Seth Forshee Superseded
libsepol/cil: Validate extended avrules and permissionxs - - - --- 2015-12-07 Steve Lawrence Accepted
[19/19] fuse: Allow user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-02 Seth Forshee Superseded
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[16/19] fuse: Add support for pid namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps - - - --- 2015-12-02 Seth Forshee Superseded
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[13/19] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-02 Seth Forshee Superseded
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-02 Seth Forshee Superseded
[10/19] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-02 Seth Forshee Superseded
[07/19] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-02 Seth Forshee Superseded
[06/19] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-02 Seth Forshee Superseded
[05/19] userns: Replace in_userns with current_in_userns - - - --- 2015-12-02 Seth Forshee Superseded
[04/19] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[03/19] fs: Treat foreign mounts as nosuid - - - --- 2015-12-02 Seth Forshee Superseded
[02/19] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-02 Seth Forshee Superseded
[01/19] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-02 Seth Forshee Superseded
libsepol/cil: Remove duplicated 'if' condition in cil_tree - - - --- 2015-12-01 Steve Lawrence Accepted
[2/2] secilc/docs: Add documentation for neverallowx rules - - - --- 2015-12-01 Steve Lawrence Accepted
« 1 2 ... 90 91 92 93 »