Show patches with: none      |   5081 patches
« 1 2 3 450 51 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v3,1/1] selinux: fix error initialization in inode_doinit_with_dentry() fix error initialization in inode_doinit_with_dentry() - - - --- 2020-10-09 rentianyue@tj.kylinos.cn pcmoore Accepted
[v2,1/1] selinux: fix error initialization in inode_doinit_with_dentry() selinux: fix error initialization in inode_doinit_with_dentry() 1 - - --- 2020-09-30 rentianyue@tj.kylinos.cn pcmoore Superseded
libsepol: fix memory leak in sepol_bool_query() - - - --- 2017-09-13 Jan.Zarsky.jzarsky@redhat.com Not Applicable
sort input files - - - --- 2017-05-30 bernhardout@lsmod.de Not Applicable
Security: selinux - Improvement in code readability when - - - --- 2016-11-11 shailendra.v@samsung.com Rejected
[RFC,v3] security,capability: pass object information to security_capable [RFC,v3] security,capability: pass object information to security_capable - - - --- 2019-08-15 Aaron Goidel pcmoore New
[RFC] audit, security: allow LSMs to selectively enable audit collection [RFC] audit, security: allow LSMs to selectively enable audit collection - - - --- 2019-08-15 Aaron Goidel pcmoore New
[v3] fanotify, inotify, dnotify, security: add security hook for fs notifications [v3] fanotify, inotify, dnotify, security: add security hook for fs notifications 2 - - --- 2019-08-12 Aaron Goidel Accepted
[v2] fanotify, inotify, dnotify, security: add security hook for fs notifications [v2] fanotify, inotify, dnotify, security: add security hook for fs notifications 2 - - --- 2019-08-09 Aaron Goidel Superseded
[RFC,v2] security,capability: pass object information to security_capable [RFC,v2] security,capability: pass object information to security_capable - - - --- 2019-08-01 Aaron Goidel Superseded
selinux-testsuite: add tests for fsnotify selinux-testsuite: add tests for fsnotify - - - --- 2019-08-01 Aaron Goidel Superseded
fanotify, inotify, dnotify, security: add security hook for fs notifications fanotify, inotify, dnotify, security: add security hook for fs notifications 1 - - --- 2019-07-31 Aaron Goidel Superseded
[RFC,v3] fanotify, inotify, dnotify, security: add security hook for fs notifications [RFC,v3] fanotify, inotify, dnotify, security: add security hook for fs notifications - - - --- 2019-07-23 Aaron Goidel Superseded
[RFC,v2] fanotify, inotify, dnotify, security: add security hook for fs notifications [RFC,v2] fanotify, inotify, dnotify, security: add security hook for fs notifications - - - --- 2019-07-18 Aaron Goidel Superseded
selinux-testsuite: add tests for fsnotify selinux-testsuite: add tests for fsnotify - - - --- 2019-07-10 Aaron Goidel Superseded
[RFC] fanotify, inotify, dnotify, security: add security hook for fs notifications [RFC] fanotify, inotify, dnotify, security: add security hook for fs notifications - - - --- 2019-07-10 Aaron Goidel Superseded
[v2,1/1] fix building against musl and uClibc libc libraries. [v2,1/1] fix building against musl and uClibc libc libraries. - - - --- 2020-04-07 Adam Duskett Not Applicable
[1/1] fix building against musl and uClibc libc libraries. [1/1] fix building against musl and uClibc libc libraries. 1 - - --- 2020-04-07 Adam Duskett Accepted
[v6,7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-07-19 Adrian Reber Not Applicable
[v6,6/7] prctl: exe link permission error changed from -EINVAL to -EPERM capabilities: Introduce CAP_CHECKPOINT_RESTORE - 1 - --- 2020-07-19 Adrian Reber Not Applicable
[v6,5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-07-19 Adrian Reber Not Applicable
[v6,4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE - 2 - --- 2020-07-19 Adrian Reber Not Applicable
[v6,3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 1 - --- 2020-07-19 Adrian Reber Not Applicable
[v6,2/7] pid: use checkpoint_restore_ns_capable() for set_tid capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 1 - --- 2020-07-19 Adrian Reber Not Applicable
[v6,1/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 1 - --- 2020-07-19 Adrian Reber Not Applicable
[v5,6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 - - --- 2020-07-15 Adrian Reber Superseded
[v5,5/6] prctl: Allow checkpoint/restore capable processes to change exe link capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-07-15 Adrian Reber Superseded
[v5,4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE - 1 - --- 2020-07-15 Adrian Reber Superseded
[v5,3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 - - --- 2020-07-15 Adrian Reber Superseded
[v5,2/6] pid: use checkpoint_restore_ns_capable() for set_tid capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 - - --- 2020-07-15 Adrian Reber Superseded
[v5,1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 - - --- 2020-07-15 Adrian Reber Superseded
[v4,3/3] prctl: Allow ptrace capable processes to change /proc/self/exe capabilities: Introduce CAP_CHECKPOINT_RESTORE - 1 - --- 2020-07-01 Adrian Reber Superseded
[v4,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test capabilities: Introduce CAP_CHECKPOINT_RESTORE 1 - - --- 2020-07-01 Adrian Reber Superseded
[v4,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-07-01 Adrian Reber Superseded
[v3,3/3] prctl: Allow ptrace capable processes to change exe_fd capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-18 Adrian Reber Not Applicable
[v3,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-18 Adrian Reber Not Applicable
[v3,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-18 Adrian Reber Not Applicable
[v2,3/3] prctl: Allow ptrace capable processes to change exe_fd capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-03 Adrian Reber Superseded
[v2,2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-03 Adrian Reber Superseded
[v2,1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE capabilities: Introduce CAP_CHECKPOINT_RESTORE - - - --- 2020-06-03 Adrian Reber Superseded
capabilities: Introduce CAP_RESTORE capabilities: Introduce CAP_RESTORE - - - --- 2020-05-22 Adrian Reber Not Applicable
ipv6: avoid copy_from_user() via ipv6_renew_options_kern() - - - --- 2018-06-23 Al Viro Superseded
policycoreutils: fixfiles: failure to create /.autorelabel is fatal - - - --- 2018-05-12 Alan Jenkins Not Applicable
[10/10] policycoreutils: fixfiles: use a consistent order for options to restorecon - - - --- 2017-05-07 Alan Jenkins Not Applicable
[09/10] policycoreutils: fixfiles: don't ignore `-F` when run in `-C` mode - - - --- 2017-05-07 Alan Jenkins Not Applicable
[08/10] policycoreutils: fixfiles: remove bad modes of "relabel" command - - - --- 2017-05-07 Alan Jenkins Not Applicable
[07/10] policycoreutils: fixfiles: un-document `-R -a` option - - - --- 2017-05-07 Alan Jenkins Not Applicable
[06/10] policycoreutils: fixfiles: refactor into the `set -u` dialect - - - --- 2017-05-07 Alan Jenkins Not Applicable
[05/10] policycoreutils: fixfiles: if restorecon aborts, we should too - - - --- 2017-05-07 Alan Jenkins Not Applicable
[04/10] policycoreutils: fixfiles: usage errors are fatal - - - --- 2017-05-07 Alan Jenkins Not Applicable
[03/10] policycoreutils: fixfiles: syntax error - - - --- 2017-05-07 Alan Jenkins Not Applicable
[02/10] policycoreutils: fixfiles: remove two unused variables - - - --- 2017-05-07 Alan Jenkins Not Applicable
[01/10] policycoreutils: fixfiles: tidy up usage(), manpage synopsis - - - --- 2017-05-07 Alan Jenkins Not Applicable
[6/6] policycoreutils: fixfiles: deprecate -l option - - - --- 2017-05-04 Alan Jenkins Not Applicable
[5/6] policycoreutils: fixfiles: move logit call outside of redirected function - - - --- 2017-05-04 Alan Jenkins Not Applicable
[4/6] policycoreutils: fixfiles: fix logging about R/O filesystems - - - --- 2017-05-04 Alan Jenkins Not Applicable
[3/6] policycoreutils: fixfiles: clarify exclude_dirs() - - - --- 2017-05-04 Alan Jenkins Not Applicable
[2/6] policycoreutils: fixfiles: remove (broken) redundant code - - - --- 2017-05-04 Alan Jenkins Not Applicable
[1/6] Revert "policycoreutils: let output of `fixfiles` be redirected (as normal)" - - - --- 2017-05-04 Alan Jenkins Not Applicable
[3/3] policycoreutils: fixfiles: remove useless use of cat - - - --- 2017-03-26 Alan Jenkins Not Applicable
[2/3] policycoreutils/setfiles: don't scramble stdout and stderr together - - - --- 2017-03-26 Alan Jenkins Not Applicable
[1/3] policycoreutils/setfiles: stdout messages don't need program prefix - - - --- 2017-03-26 Alan Jenkins Not Applicable
[2/2] policycoreutils: fixfiles: handle unexpected spaces in command - - - --- 2017-03-26 Alan Jenkins Not Applicable
[1/2] policycoreutils: fixfiles should handle path arguments more robustly - - - --- 2017-03-26 Alan Jenkins Not Applicable
policycoreutils: let output of `fixfiles` be redirected (as normal) - - - --- 2017-01-23 Alan Jenkins Not Applicable
restorecon manpage: link back to fixfiles - - - --- 2017-01-11 Alan Jenkins Not Applicable
policycoreutils, python: Fix bad manpage formatting in "SEE ALSO" - - - --- 2017-01-11 Alan Jenkins Not Applicable
[v2] selinux: check for address length in selinux_socket_bind() 1 - - --- 2017-03-06 Alexander Potapenko Accepted
selinux: check for address length in selinux_socket_bind() - - - --- 2017-03-03 Alexander Potapenko Superseded
[v3,3/3] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov Not Applicable
[v3,2/3] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov Not Applicable
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov Not Applicable
[v3,3/3] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov Not Applicable
[v3,2/3] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov Not Applicable
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov Not Applicable
[v2,4/4] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov Superseded
[v2,3/4] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov Superseded
[v2,2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov Superseded
[v2,1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov Superseded
[v8,12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,10/12] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,09/12] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 2 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,08/12] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 2 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,07/12] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 2 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 2 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,05/12] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,04/12] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability 2 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,03/12] perf/core: open access to probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,02/12] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-04-02 Alexey Budankov Not Applicable
[v8,01/12] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability 4 - - --- 2020-04-02 Alexey Budankov Not Applicable
[v1] perf tool: make Perf tool aware of SELinux access control [v1] perf tool: make Perf tool aware of SELinux access control - - - --- 2020-03-13 Alexey Budankov Not Applicable
[v7,12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,10/12] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,09/12] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,08/12] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,07/12] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
[v7,05/12] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - 1 - --- 2020-02-17 Alexey Budankov Awaiting Upstream
« 1 2 3 450 51 »