Show patches with: none      |   8934 patches
« 1 2 ... 33 34 3589 90 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[2/2] libsepol: Validate policydb values when reading binary policy libsepol: Validate policydb values when reading binary - - - --- 2021-02-05 James Carter Accepted
[1/2] libsepol: Create function ebitmap_highest_set_bit() libsepol: Validate policydb values when reading binary - - - --- 2021-02-05 James Carter Accepted
[3/3] libsepol/cil: introduce intermediate cast to silence -Wvoid-pointer-to-enum-cast [1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument 1 - - --- 2021-02-05 Nicolas Iooss Accepted
[2/3] libsepol/cil: be more robust when encountering <src_info> [1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument 1 - - --- 2021-02-05 Nicolas Iooss Accepted
[1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument [1/3] libsepol/cil: fix NULL pointer dereference with empty macro argument 1 - - --- 2021-02-05 Nicolas Iooss Accepted
libsepol/cil: Fix integer overflow in the handling of hll line marks libsepol/cil: Fix integer overflow in the handling of hll line marks - - - --- 2021-02-04 James Carter Superseded
[2/2] keys: Allow request_key upcalls from a container to be intercepted keys: request_key() interception in containers - - - --- 2021-02-04 David Howells Not Applicable
[1/2] Add namespace tags that can be used for matching without pinning a ns keys: request_key() interception in containers - - - --- 2021-02-04 David Howells Not Applicable
[RESEND,v5] proc: Allow pid_revalidate() during LOOKUP_RCU [RESEND,v5] proc: Allow pid_revalidate() during LOOKUP_RCU - - - --- 2021-02-04 Stephen Brennan pcmoore New
[2/2] secilc/docs: add syntax highlighting for secil secilc/docs: add syntax highlighting for cil examples - - - --- 2021-02-04 bauen1 Accepted
[1/2] secilc/docs: use fenced code blocks for cil examples secilc/docs: add syntax highlighting for cil examples - - - --- 2021-02-04 bauen1 Accepted
[2/2] policycoreutils/fixfiles.8: add missing file systems and merge check and verify [1/2] libselinux/getconlist: report failures 1 - - --- 2021-02-03 Christian Göttsche Accepted
[1/2] libselinux/getconlist: report failures [1/2] libselinux/getconlist: report failures - - - --- 2021-02-03 Christian Göttsche Accepted
[3/3] libsepol: include header files in source files when matching declarations [1/3] libsepol: remove unused files 1 - - --- 2021-02-03 Nicolas Iooss Accepted
[2/3] libsepol: uniformize prototypes of sepol_mls_contains and sepol_mls_check [1/3] libsepol: remove unused files 1 - - --- 2021-02-03 Nicolas Iooss Accepted
[1/3] libsepol: remove unused files [1/3] libsepol: remove unused files 1 - - --- 2021-02-03 Nicolas Iooss Accepted
[V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit [V2] libsepol/cil: Fix heap-use-after-free when using optional blockinherit 1 - - --- 2021-02-02 James Carter Accepted
[v3,1/1] process_madvise.2: Add process_madvise man page [v3,1/1] process_madvise.2: Add process_madvise man page - 1 - --- 2021-02-02 Suren Baghdasaryan Not Applicable
[1/1] libsepol/cil: unlink blockinherit->block link when destroying a block [1/1] libsepol/cil: unlink blockinherit->block link when destroying a block 1 - - --- 2021-02-01 Nicolas Iooss Accepted
[v2,1/1] scripts/release: make the script more robust, and release a source repository snapshot [v2,1/1] scripts/release: make the script more robust, and release a source repository snapshot - - - --- 2021-02-01 Nicolas Iooss Changes Requested
setfiles: drop now unused static variable setfiles: drop now unused static variable - - - --- 2021-02-01 Christian Göttsche Rejected
policycoreutils/setfiles: Drop unused nerr variable policycoreutils/setfiles: Drop unused nerr variable 1 - - --- 2021-02-01 Petr Lautrbach Accepted
libsepol/cil: Fix heap-use-after-free when using optional blockinherit libsepol/cil: Fix heap-use-after-free when using optional blockinherit - - - --- 2021-02-01 James Carter Superseded
libsepol/cil: fix memory leak when a constraint expression is too deep libsepol/cil: fix memory leak when a constraint expression is too deep 1 - - --- 2021-01-31 Nicolas Iooss Accepted
libsepol/cil: fix heap-use-after-free when using optional blockinherit libsepol/cil: fix heap-use-after-free when using optional blockinherit - - - --- 2021-01-31 Nicolas Iooss Superseded
[1/1] scripts/release: make the script more robust and direct [1/1] scripts/release: make the script more robust and direct - - - --- 2021-01-30 Nicolas Iooss Superseded
[3/3] IMA: add support to measure duplicate buffer for critical data hook support for duplicate measurement of integrity critical data - - - --- 2021-01-30 Tushar Sugandhi pcmoore Not Applicable
[2/3] IMA: update functions to read allow_dup policy condition support for duplicate measurement of integrity critical data - - - --- 2021-01-30 Tushar Sugandhi pcmoore Not Applicable
[1/3] IMA: add policy condition to measure duplicate critical data support for duplicate measurement of integrity critical data - - - --- 2021-01-30 Tushar Sugandhi pcmoore Not Applicable
scripts/release: Release also tarball with everything scripts/release: Release also tarball with everything - - - --- 2021-01-29 Petr Lautrbach Rejected
[v2] selinux: measure state and policy capabilities [v2] selinux: measure state and policy capabilities - - - --- 2021-01-29 Lakshmi Ramasubramanian pcmoore Changes Requested
[v2,1/1] process_madvise.2: Add process_madvise man page [v2,1/1] process_madvise.2: Add process_madvise man page - - - --- 2021-01-29 Suren Baghdasaryan Superseded
[v2] libsemanage: sync filesystem with sandbox [v2] libsemanage: sync filesystem with sandbox - - - --- 2021-01-28 Petr Lautrbach Changes Requested
libsemanage: sync filesystem with sandbox libsemanage: sync filesystem with sandbox - - - --- 2021-01-28 Petr Lautrbach Superseded
selinux-notebook: Add policy version 33 requirements selinux-notebook: Add policy version 33 requirements - - - --- 2021-01-27 Richard Haines Accepted
selinux-notebook: Add new section for Embedded Systems selinux-notebook: Add new section for Embedded Systems - - - --- 2021-01-27 Richard Haines Accepted
[v24,25/25] AppArmor: Remove the exclusive flag [v24,01/25] LSM: Infrastructure management of the sock security 2 1 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,24/25] LSM: Add /proc attr entry for full LSM context [v24,01/25] LSM: Infrastructure management of the sock security - 1 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,23/25] Audit: Add a new record for multiple object LSM attributes [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,22/25] Audit: Add new record for multiple process LSM attributes [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,21/25] audit: add support for non-syscall auxiliary records [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,20/25] LSM: Verify LSM display sanity in binder [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,19/25] NET: Store LSM netlabel data in a lsmblob [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,18/25] LSM: security_secid_to_secctx in netlink netfilter [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,17/25] LSM: Use lsmcontext in security_inode_getsecctx [v24,01/25] LSM: Infrastructure management of the sock security 2 1 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,16/25] LSM: Use lsmcontext in security_secid_to_secctx [v24,01/25] LSM: Infrastructure management of the sock security 2 1 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,15/25] LSM: Ensure the correct LSM context releaser [v24,01/25] LSM: Infrastructure management of the sock security 1 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,14/25] LSM: Specify which LSM to display [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,13/25] IMA: Change internal interfaces to use lsmblobs [v24,01/25] LSM: Infrastructure management of the sock security 1 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,12/25] LSM: Use lsmblob in security_cred_getsecid [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,11/25] LSM: Use lsmblob in security_inode_getsecid [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,10/25] LSM: Use lsmblob in security_task_getsecid [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,09/25] LSM: Use lsmblob in security_ipc_getsecid [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,08/25] LSM: Use lsmblob in security_secid_to_secctx [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,07/25] LSM: Use lsmblob in security_secctx_to_secid [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,06/25] LSM: Use lsmblob in security_kernel_act_as [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,05/25] LSM: Use lsmblob in security_audit_rule_match [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,04/25] IMA: avoid label collisions with stacked LSMs [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,03/25] LSM: provide lsm name and id slot mappings [v24,01/25] LSM: Infrastructure management of the sock security - - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,02/25] LSM: Add the lsmblob data structure. [v24,01/25] LSM: Infrastructure management of the sock security 3 - - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[v24,01/25] LSM: Infrastructure management of the sock security [v24,01/25] LSM: Infrastructure management of the sock security 2 2 - --- 2021-01-26 Casey Schaufler pcmoore Superseded
[testsuite] ci: run testsuite also against the secnext kernel [testsuite] ci: run testsuite also against the secnext kernel - - - --- 2021-01-25 Ondrej Mosnacek omos Accepted
selinux-notebook: Fix document links selinux-notebook: Fix document links - - - --- 2021-01-25 Richard Haines Accepted
selinux-notebook: Add policy version 33 requirements selinux-notebook: Add policy version 33 requirements - - - --- 2021-01-25 Richard Haines Accepted
selinux-notebook: Add new section for Embedded Systems selinux-notebook: Add new section for Embedded Systems - - - --- 2021-01-25 Richard Haines Accepted
[testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE [testsuite] test_userfaultfd.te: grant test_uffd_domain CAP_SYS_PTRACE - 1 - --- 2021-01-25 Ondrej Mosnacek omos Accepted
[v5] proc: Allow pid_revalidate() during LOOKUP_RCU [v5] proc: Allow pid_revalidate() during LOOKUP_RCU - - - --- 2021-01-22 Stephen Brennan pcmoore Superseded
[v2] python/sepolgen: allow any policy statement in if(n)def [v2] python/sepolgen: allow any policy statement in if(n)def 1 - - --- 2021-01-22 Vit Mojzis omos Accepted
[testsuite,2/2] Migrate CI to GH Actions Migrate CI to GH Actions - - - --- 2021-01-22 Ondrej Mosnacek omos Accepted
[testsuite,1/2] check-syntax: use 'command -v' instead of 'which' Migrate CI to GH Actions 1 - - --- 2021-01-22 Ondrej Mosnacek omos Accepted
selinux: measure state and policy capabilities selinux: measure state and policy capabilities - - - --- 2021-01-21 Lakshmi Ramasubramanian pcmoore Changes Requested
[v6,39/40] xfs: support idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,38/40] ext4: support idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,37/40] fat: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,36/40] tests: add mount_setattr() selftests idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,35/40] fs: introduce MOUNT_ATTR_IDMAP idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,34/40] fs: add mount_setattr() idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,33/40] fs: add attr_flags_to_mnt_flags helper idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,32/40] fs: split out functions to hold writers idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,31/40] namespace: only take read lock in do_reconfigure_mnt() idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,30/40] mount: make {lock,unlock}_mount_hash() static idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,29/40] namespace: take lock_mount_hash() directly when changing flags idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,28/40] overlayfs: do not mount on top of idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,27/40] ecryptfs: do not mount on top of idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,26/39] ima: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,25/40] apparmor: handle idmapped mounts idmapped mounts - - - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,23/40] exec: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,22/40] would_dump: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,21/40] ioctl: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,20/40] init: handle idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,19/40] fcntl: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,18/40] utimes: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,17/40] af_unix: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,16/40] open: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,15/40] open: handle idmapped mounts in do_truncate() idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,14/40] namei: prepare for idmapped mounts idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,13/40] namei: introduce struct renamedata idmapped mounts - 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,12/40] namei: handle idmapped mounts in may_*() helpers idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,11/40] stat: handle idmapped mounts idmapped mounts - 2 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
[v6,10/40] commoncap: handle idmapped mounts idmapped mounts 1 1 - --- 2021-01-21 Christian Brauner pcmoore Not Applicable
« 1 2 ... 33 34 3589 90 »