Show patches with: State = Action Required       |   179 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v6,39/40] xfs: support idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,38/40] ext4: support idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,37/40] fat: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,36/40] tests: add mount_setattr() selftests idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,35/40] fs: introduce MOUNT_ATTR_IDMAP idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,34/40] fs: add mount_setattr() idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,33/40] fs: add attr_flags_to_mnt_flags helper idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,32/40] fs: split out functions to hold writers idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,31/40] namespace: only take read lock in do_reconfigure_mnt() idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,30/40] mount: make {lock,unlock}_mount_hash() static idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,29/40] namespace: take lock_mount_hash() directly when changing flags idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,28/40] overlayfs: do not mount on top of idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,27/40] ecryptfs: do not mount on top of idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,26/39] ima: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,25/40] apparmor: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,23/40] exec: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,22/40] would_dump: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,21/40] ioctl: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,20/40] init: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,19/40] fcntl: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,18/40] utimes: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,17/40] af_unix: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,16/40] open: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,15/40] open: handle idmapped mounts in do_truncate() idmapped mounts - - - --- 2021-01-21 Christian Brauner New
[v6,14/40] namei: prepare for idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,13/40] namei: introduce struct renamedata idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,12/40] namei: handle idmapped mounts in may_*() helpers idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,11/40] stat: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,10/40] commoncap: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,09/40] xattr: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,08/40] acl: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,07/40] attr: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,06/40] inode: make init and permission helpers idmapped mount aware idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,05/39] namei: make permission helpers idmapped mount aware idmapped mounts 1 1 - --- 2021-01-21 Christian Brauner New
[v6,04/40] capability: handle idmapped mounts idmapped mounts 1 1 - --- 2021-01-21 Christian Brauner New
[v6,03/40] fs: add file and path permissions helpers idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,02/40] fs: add id translation helpers idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[v6,01/40] mount: attach mappings to mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner New
[1/1] process_madvise.2: Add process_madvise man page [1/1] process_madvise.2: Add process_madvise man page - - - --- 2021-01-20 Suren Baghdasaryan New
[v2,1/1] libsepol: do not decode out-of-bound rolebounds [v2,1/1] libsepol: do not decode out-of-bound rolebounds - - - --- 2021-01-20 Nicolas Iooss New
[RFC,1/1] selinux-notebook: Add new section for Embedded Systems selinux-notebook: Add new section for Embedded Systems - - - --- 2021-01-19 Richard Haines New
NFSv4.2: fix return value of _nfs4_get_security_label() NFSv4.2: fix return value of _nfs4_get_security_label() - 1 - --- 2021-01-15 Ondrej Mosnacek New
[v2,2/2] setfiles: drop ABORT_ON_ERRORS and related code [v2,1/2] setfiles: Do not abort on labeling error - - - --- 2021-01-13 Petr Lautrbach New
[v2,1/2] setfiles: Do not abort on labeling error [v2,1/2] setfiles: Do not abort on labeling error - - - --- 2021-01-13 Petr Lautrbach New
python/sepolgen: allow any policy statement in ifndef python/sepolgen: allow any policy statement in ifndef - - - --- 2021-01-11 Vit Mojzis New
[2/2] libselinux: update getseuser [1/2] libselinux: accept const fromcon in get_context API - - - --- 2021-01-08 Christian Göttsche New
[1/2] libselinux: accept const fromcon in get_context API [1/2] libselinux: accept const fromcon in get_context API - - - --- 2021-01-08 Christian Göttsche New
[2/2] libsepol/cil: Fix heap-use-after-free in __class_reset_perm_values() [1/2] libsepol/cil: Update symtab nprim field when adding or removing datums - - - --- 2021-01-06 James Carter New
[1/2] libsepol/cil: Update symtab nprim field when adding or removing datums [1/2] libsepol/cil: Update symtab nprim field when adding or removing datums - - - --- 2021-01-06 James Carter New
newrole: preserve environment variable XDG_RUNTIME_DIR newrole: preserve environment variable XDG_RUNTIME_DIR - - - --- 2021-01-06 Christian Göttsche New
[1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine [1/1] GitHub Actions: run SELinux testsuite in Fedora virtual machine - - - --- 2020-12-30 Nicolas Iooss New
[1/6] libsepol: do not decode out-of-bound rolebounds [1/6] libsepol: do not decode out-of-bound rolebounds - - - --- 2020-12-30 Nicolas Iooss New
[RFC,DBUS] selinux: add option to control checking of reply messages [RFC,DBUS] selinux: add option to control checking of reply messages - - - --- 2020-12-28 Christian Göttsche New
selinux: make use of variables when defining libdir and includedir selinux: make use of variables when defining libdir and includedir - - - --- 2020-07-16 W. Michael Petullo New
[v4,21/21] fuse: Allow user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - --- 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 2 - - --- 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - --- 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid 2 - - --- 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock 1 - - --- 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-26 Seth Forshee New
[v3,1/1] selinux-testsuite: Add userfaultfd test [v3,1/1] selinux-testsuite: Add userfaultfd test - - - --- 2021-01-08 Lokesh Gidra omos Under Review
[RFC,1/1] selinux-testsuite: Reduce sctp test runtime selinux-testsuite: Reduce sctp test runtime - - - --- 2020-11-04 Richard Haines omos Under Review
[V2,1/1] selinux-testsuite: Add btrfs support for filesystem tests selinux-testsuite: Add btrfs support for filesystem tests - - - --- 2020-11-03 Richard Haines omos Queued
[RFC,V2,2/2] selinux-testsuite: Run SCTP tests using remote server selinux-testsuite: Run tests using remote server - - - --- 2020-08-26 Richard Haines omos New
[RFC,V2,1/2] selinux-testsuite: Run tests using remote server selinux-testsuite: Run tests using remote server - - - --- 2020-08-26 Richard Haines omos New
[RFC,5/5] selinux-testsuite: add testing for unprivileged sandboxing capability [RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil - - - --- 2020-03-13 Stephen Smalley omos New
[RFC,4/5] selinux-testsuite: add tests/sandbox/rxdir_rx_allow.cil [RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil - - - --- 2020-03-13 Stephen Smalley omos New
[RFC,3/5] selinux-testsuite: add tests/sandbox/rxdir_no_allow.cil [RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil - - - --- 2020-03-13 Stephen Smalley omos New
[RFC,2/5] selinux-testsuite: add tests/sandbox/nodir_rx_allow.cil [RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil - - - --- 2020-03-13 Stephen Smalley omos New
[RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil [RFC,1/5] selinux-testsuite: add tests/sandbox/nodir_no_allow.cil - - - --- 2020-03-13 Stephen Smalley omos New
selinux: include a consumer of the new IMA critical data hook selinux: include a consumer of the new IMA critical data hook 1 1 - --- 2021-01-14 Lakshmi Ramasubramanian pcmoore New
[v5,41/42] tests: extend mount_setattr tests idmapped mounts - - - --- 2021-01-12 Christian Brauner pcmoore New
[v5,40/42] fs: introduce MOUNT_ATTR_IDMAP idmapped mounts - - - --- 2021-01-12 Christian Brauner pcmoore New
[v5,39/42] overlayfs: do not mount on top of idmapped mounts idmapped mounts - - - --- 2021-01-12 Christian Brauner pcmoore New
[v5,38/42] ecryptfs: do not mount on top of idmapped mounts idmapped mounts - - - --- 2021-01-12 Christian Brauner pcmoore New
« 1 2 »