Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Series =
LSM: Module stacking for all
| Archived =
No
| 81 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
cel
Apply
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[81/90] Netlabel: Return the labeling type on socket
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[80/90] Smack: Let netlabel do the work on connections
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[79/90] Smack: Don't set the socket label on each send
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[78/90] Smack: Let netlabel do the work on the ambient domain
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[77/90] Netlabel: Add a secattr comparison API function
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[76/90] Smack: Set netlabel flags properly on new label import
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[75/90] Smack: Fix setting of the CIPSO MLS_CAT flags
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[74/90] LSM: Change error detection for UDP peer security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[73/90] Smack: Advertise the secid to netlabel
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[72/90] LSM: Fix for security_init_inode_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[71/90] LSM: Infrastructure security blobs for mount options
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[70/90] LSM: Correct handling of ENOSYS in inode_setxattr
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[69/90] LSM: Use full security context in security_inode_setsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[68/90] LSM: Support multiple LSMs using inode_init_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[67/90] Smack: Detect if secmarks can be safely used
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[66/90] LSM: refactor security_setprocattr
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[65/90] LSM: Add secmark refcounting to call_one list
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[64/90] netfilter: Remove unnecessary NULL check in lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[63/90] Smack: Consolidate secmark conversions
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[62/90] netfilter: Fix memory leak introduced with lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[61/90] LSM: Make getting the secmark right cleaner
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[60/90] LSM: Add secmark_relabel_packet to the set of one call hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[59/90] AppArmor: Remove the exclusive flag
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[58/90] LSM: Specify which LSM to display
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[57/90] SELinux: Use blob offset in current_sid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[56/90] LSM: Special handling for secctx lsm hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[55/90] LSM: Remove unused macro
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[54/90] kernfs: remove lsm_context scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[53/90] LSM: Use lsm_context in security_inode_setsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[52/90] LSM: Use lsm_context in inode_setsecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[51/90] LSM: Add the release function to the lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[50/90] fs: remove lsm_context scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[49/90] LSM: Use lsm_context in security_secid_to_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[48/90] LSM: Use lsm_context in security_release_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[47/90] LSM: Use lsm_context in release_secctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[46/90] LSM: Use lsm_context in security_secctx_to_secid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[45/90] LSM: Use lsm_context in security_inode_getsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[44/90] LSM: Use lsm_context in security_inode_notifysecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[43/90] LSM: Use lsm_context in security_dentry_init_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[42/90] LSM: Use lsm_context in dentry_init_security hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[41/90] LSM: Use lsm_context in inode_notifysecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[40/90] LSM: Use lsm_context in inode_getsecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[39/90] LSM: Use lsm_context in secctx_to_secid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[38/90] LSM: Use lsm_context in secid_to_secctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[37/90] LSM: Create a data structure for a security context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[36/90] LSM: Limit calls to certain module hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[35/90] AppArmor: Remove unnecessary hook stub
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[34/90] Smack: Restore the release_secctx hook
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[33/90] IMA: FIXUP prototype using lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[32/90] LSM: Remove lsm_export scaffolding functions
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[31/90] Netlabel: Replace secids with lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[30/90] NET: Remove netfilter scaffolding for lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[29/90] NET: Remove scaffolding on new secmarks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[28/90] NET: Remove scaffolding on secmarks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[27/90] NET: Change the UNIXCB from a secid to an lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[26/90] IMA: Clean out lsm_export scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[25/90] Audit: Convert osid to an lsm_export structure
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[24/90] Audit: Convert target_sid to an lsm_export structure
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[23/90] Audit: Change audit_sig_sid to audit_sig_lsm
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[22/90] LSM: Use lsm_export in security_cred_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[21/90] LSM: Use lsm_export in security_inode_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[20/90] LSM: Use lsm_export in security_task_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[19/90] LSM: Use lsm_export in security_ipc_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[18/90] LSM: Use lsm_export in security_secid_to_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[17/90] LSM: Use lsm_export in security_secctx_to_secid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[15/90] LSM: Use lsm_export in security_kernel_act_as
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[14/90] LSM: Use lsm_export in security_audit_rule_match
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[13/90] LSM: Use lsm_export in the secctx_to_secid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[12/90] LSM: Use lsm_export in the secid_to_secctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[11/90] LSM: Fix logical operation in lsm_export checks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[10/90] LSM: Use lsm_export in the audit_rule_match hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[09/90] LSM: Use lsm_export in the getpeersec_dgram hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[08/90] LSM: Use lsm_export in the kernel_ask_as hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[07/90] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[06/90] LSM: Use lsm_export in the cred_getsecid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[05/90] LSM: Use lsm_export in the inode_getsecid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[04/90] LSM: Create an lsm_export data structure.
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[03/90] LSM: Infrastructure management of the key security blob
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[02/90] LSM: Infrastructure management of the sock security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[01/90] LSM: Infrastructure management of the superblock
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable