Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 9284 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
…
92
93
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v1,2/2] libsemanage: allow specifying SUBDIRS when building
[v1,1/2] libsepol: allow specifying SUBDIRS when building
- - -
-
-
-
2024-11-13
dmitry.sharshakov@siderolabs.com
bachradsusi
New
[v1,1/2] libsepol: allow specifying SUBDIRS when building
[v1,1/2] libsepol: allow specifying SUBDIRS when building
- - -
-
-
-
2024-11-13
dmitry.sharshakov@siderolabs.com
bachradsusi
New
selinux: replace kmem_cache_create() with KMEM_CACHE()
selinux: replace kmem_cache_create() with KMEM_CACHE()
- - -
-
-
-
2024-08-27
ericsu@linux.microsoft.com
pcmoore
Accepted
[v1,2/2] policygen: respect CIL option when generating comments
[v1,1/2] sepolgen: initialize gen_cil
- - -
-
-
-
2024-08-01
dmitry.sharshakov@siderolabs.com
bachradsusi
Accepted
[v1,1/2] sepolgen: initialize gen_cil
[v1,1/2] sepolgen: initialize gen_cil
1 - -
-
-
-
2024-08-01
dmitry.sharshakov@siderolabs.com
bachradsusi
Accepted
[2/2] sepolgen: Support named xperms
[1/2] sepolgen: Update refparser to handle xperm
- - -
-
-
-
2022-08-01
chris.lindee@gmail.com
Changes Requested
[1/2] sepolgen: Update refparser to handle xperm
[1/2] sepolgen: Update refparser to handle xperm
- - -
-
-
-
2022-08-01
chris.lindee@gmail.com
Changes Requested
[v3,1/1] selinux: fix error initialization in inode_doinit_with_dentry()
fix error initialization in inode_doinit_with_dentry()
- - -
-
-
-
2020-10-09
rentianyue@tj.kylinos.cn
pcmoore
Accepted
[v2,1/1] selinux: fix error initialization in inode_doinit_with_dentry()
selinux: fix error initialization in inode_doinit_with_dentry()
1 - -
-
-
-
2020-09-30
rentianyue@tj.kylinos.cn
pcmoore
Superseded
libsepol: fix memory leak in sepol_bool_query()
- - -
-
-
-
2017-09-13
Jan.Zarsky.jzarsky@redhat.com
Not Applicable
sort input files
- - -
-
-
-
2017-05-30
bernhardout@lsmod.de
Not Applicable
Security: selinux - Improvement in code readability when
- - -
-
-
-
2016-11-11
shailendra.v@samsung.com
Rejected
[security-next] selinux: use sysfs_emit() to instead of scnprintf()
[security-next] selinux: use sysfs_emit() to instead of scnprintf()
- - -
-
-
-
2022-12-05
ye.xingchen@zte.com.cn
Rejected
[v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
[v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
2 - -
-
-
-
2019-08-12
Aaron Goidel
Accepted
[v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
[v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
2 - -
-
-
-
2019-08-09
Aaron Goidel
Superseded
[RFC,v2] security,capability: pass object information to security_capable
[RFC,v2] security,capability: pass object information to security_capable
- - -
-
-
-
2019-08-01
Aaron Goidel
Superseded
selinux-testsuite: add tests for fsnotify
selinux-testsuite: add tests for fsnotify
- - -
-
-
-
2019-08-01
Aaron Goidel
Superseded
fanotify, inotify, dnotify, security: add security hook for fs notifications
fanotify, inotify, dnotify, security: add security hook for fs notifications
1 - -
-
-
-
2019-07-31
Aaron Goidel
Superseded
[RFC,v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
[RFC,v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
- - -
-
-
-
2019-07-23
Aaron Goidel
Superseded
[RFC,v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
[RFC,v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
- - -
-
-
-
2019-07-18
Aaron Goidel
Superseded
selinux-testsuite: add tests for fsnotify
selinux-testsuite: add tests for fsnotify
- - -
-
-
-
2019-07-10
Aaron Goidel
Superseded
[RFC] fanotify, inotify, dnotify, security: add security hook for fs notifications
[RFC] fanotify, inotify, dnotify, security: add security hook for fs notifications
- - -
-
-
-
2019-07-10
Aaron Goidel
Superseded
[v2,1/1] fix building against musl and uClibc libc libraries.
[v2,1/1] fix building against musl and uClibc libc libraries.
- - -
-
-
-
2020-04-07
Adam Duskett
Not Applicable
[1/1] fix building against musl and uClibc libc libraries.
[1/1] fix building against musl and uClibc libc libraries.
1 - -
-
-
-
2020-04-07
Adam Duskett
Accepted
[v6,7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- 1 -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- 2 -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 1 -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,2/7] pid: use checkpoint_restore_ns_capable() for set_tid
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 1 -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v6,1/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 1 -
-
-
-
2020-07-19
Adrian Reber
Not Applicable
[v5,6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 - -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v5,5/6] prctl: Allow checkpoint/restore capable processes to change exe link
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v5,4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- 1 -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v5,3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 - -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v5,2/6] pid: use checkpoint_restore_ns_capable() for set_tid
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 - -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v5,1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 - -
-
-
-
2020-07-15
Adrian Reber
Superseded
[v4,3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- 1 -
-
-
-
2020-07-01
Adrian Reber
Superseded
[v4,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
capabilities: Introduce CAP_CHECKPOINT_RESTORE
1 - -
-
-
-
2020-07-01
Adrian Reber
Superseded
[v4,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-07-01
Adrian Reber
Superseded
[v3,3/3] prctl: Allow ptrace capable processes to change exe_fd
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-18
Adrian Reber
Not Applicable
[v3,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-18
Adrian Reber
Not Applicable
[v3,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-18
Adrian Reber
Not Applicable
[v2,3/3] prctl: Allow ptrace capable processes to change exe_fd
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-03
Adrian Reber
Superseded
[v2,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-03
Adrian Reber
Superseded
[v2,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
capabilities: Introduce CAP_CHECKPOINT_RESTORE
- - -
-
-
-
2020-06-03
Adrian Reber
Superseded
capabilities: Introduce CAP_RESTORE
capabilities: Introduce CAP_RESTORE
- - -
-
-
-
2020-05-22
Adrian Reber
Not Applicable
[RFC] selinuxfs: saner handling of policy reloads
[RFC] selinuxfs: saner handling of policy reloads
- 1 -
-
-
-
2023-10-16
Al Viro
pcmoore
Accepted
[2/2] kill unused 'flags' argument in avc_has_perm_flags() and avc_audit()
[1/2] selinux: slow_avc_audit has become non-blocking
- - -
-
-
-
2021-06-10
Al Viro
pcmoore
Changes Requested
[1/2] selinux: slow_avc_audit has become non-blocking
[1/2] selinux: slow_avc_audit has become non-blocking
- - -
-
-
-
2021-06-10
Al Viro
pcmoore
Accepted
ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
- - -
-
-
-
2018-06-23
Al Viro
Superseded
policycoreutils: fixfiles: failure to create /.autorelabel is fatal
- - -
-
-
-
2018-05-12
Alan Jenkins
Not Applicable
[10/10] policycoreutils: fixfiles: use a consistent order for options to restorecon
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[09/10] policycoreutils: fixfiles: don't ignore `-F` when run in `-C` mode
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[08/10] policycoreutils: fixfiles: remove bad modes of "relabel" command
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[07/10] policycoreutils: fixfiles: un-document `-R -a` option
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[06/10] policycoreutils: fixfiles: refactor into the `set -u` dialect
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[05/10] policycoreutils: fixfiles: if restorecon aborts, we should too
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[04/10] policycoreutils: fixfiles: usage errors are fatal
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[03/10] policycoreutils: fixfiles: syntax error
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[02/10] policycoreutils: fixfiles: remove two unused variables
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis
- - -
-
-
-
2017-05-07
Alan Jenkins
Not Applicable
[6/6] policycoreutils: fixfiles: deprecate -l option
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[5/6] policycoreutils: fixfiles: move logit call outside of redirected function
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[4/6] policycoreutils: fixfiles: fix logging about R/O filesystems
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[3/6] policycoreutils: fixfiles: clarify exclude_dirs()
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[2/6] policycoreutils: fixfiles: remove (broken) redundant code
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)"
- - -
-
-
-
2017-05-04
Alan Jenkins
Not Applicable
[3/3] policycoreutils: fixfiles: remove useless use of cat
- - -
-
-
-
2017-03-26
Alan Jenkins
Not Applicable
[2/3] policycoreutils/setfiles: don't scramble stdout and stderr together
- - -
-
-
-
2017-03-26
Alan Jenkins
Not Applicable
[1/3] policycoreutils/setfiles: stdout messages don't need program prefix
- - -
-
-
-
2017-03-26
Alan Jenkins
Not Applicable
[2/2] policycoreutils: fixfiles: handle unexpected spaces in command
- - -
-
-
-
2017-03-26
Alan Jenkins
Not Applicable
[1/2] policycoreutils: fixfiles should handle path arguments more robustly
- - -
-
-
-
2017-03-26
Alan Jenkins
Not Applicable
policycoreutils: let output of `fixfiles` be redirected (as normal)
- - -
-
-
-
2017-01-23
Alan Jenkins
Not Applicable
restorecon manpage: link back to fixfiles
- - -
-
-
-
2017-01-11
Alan Jenkins
Not Applicable
policycoreutils, python: Fix bad manpage formatting in "SEE ALSO"
- - -
-
-
-
2017-01-11
Alan Jenkins
Not Applicable
[testsuite] defconfig: add NF_TABLES dependency for netlink_socket tests to pass
[testsuite] defconfig: add NF_TABLES dependency for netlink_socket tests to pass
- 1 -
-
-
-
2023-11-27
Alan Wandke
omos
Accepted
[1/1,RFC] SELINUX: Remove obsolete deferred inode security init list.
SELINUX: Remove obsolete deferred inode security
- - -
-
-
-
2022-12-13
Alexander Kozhevnikov
pcmoore
Accepted
[v2] selinux: check for address length in selinux_socket_bind()
1 - -
-
-
-
2017-03-06
Alexander Potapenko
Accepted
selinux: check for address length in selinux_socket_bind()
- - -
-
-
-
2017-03-03
Alexander Potapenko
Superseded
[v3,3/3] perf docs: introduce security.txt file to document related issues
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-30
Alexey Budankov
Not Applicable
[v3,2/3] perf tool: make Perf tool aware of SELinux access control
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-30
Alexey Budankov
Not Applicable
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-30
Alexey Budankov
Not Applicable
[v3,3/3] perf docs: introduce security.txt file to document related issues
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-24
Alexey Budankov
Not Applicable
[v3,2/3] perf tool: make Perf tool aware of SELinux access control
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-24
Alexey Budankov
Not Applicable
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-24
Alexey Budankov
Not Applicable
[v2,4/4] perf docs: introduce security.txt file to document related issues
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-22
Alexey Budankov
Superseded
[v2,3/4] perf tool: make Perf tool aware of SELinux access control
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-22
Alexey Budankov
Superseded
[v2,2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-22
Alexey Budankov
Superseded
[v2,1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
perf: make Perf tool aware of SELinux access control
- - -
-
-
-
2020-04-22
Alexey Budankov
Superseded
[v8,12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Introduce CAP_PERFMON to secure system performance monitoring and observability
- - -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
Introduce CAP_PERFMON to secure system performance monitoring and observability
- - -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
1 - -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,09/12] drivers/perf: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
2 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,08/12] parisc/perf: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
2 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,07/12] powerpc/perf: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
2 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
2 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
1 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Introduce CAP_PERFMON to secure system performance monitoring and observability
2 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
[v8,03/12] perf/core: open access to probes for CAP_PERFMON privileged process
Introduce CAP_PERFMON to secure system performance monitoring and observability
1 1 -
-
-
-
2020-04-02
Alexey Budankov
Not Applicable
«
1
2
3
4
…
92
93
»