Show patches with: none      |   8933 patches
« 1 2 ... 62 63 6489 90 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
libsepol/cil: Allow validatetrans rules to be resolved libsepol/cil: Allow validatetrans rules to be resolved 1 - - --- 2019-05-21 Richard Haines Accepted
conf-parse.y checks (with style fixes removed) conf-parse.y checks (with style fixes removed) - - - --- 2019-05-18 Jokke Hämäläinen Changes Requested
[userspace,v2] libsepol: add ebitmap_for_each_set_bit macro [userspace,v2] libsepol: add ebitmap_for_each_set_bit macro 1 - - --- 2019-05-14 Ondrej Mosnacek Accepted
[userspace] run_init: fix build when crypt() is not in unistd.h [userspace] run_init: fix build when crypt() is not in unistd.h - - - --- 2019-05-13 Ondrej Mosnacek Accepted
[userspace] libsepol: add ebitmap_for_each_set_bit macro [userspace] libsepol: add ebitmap_for_each_set_bit macro - - - --- 2019-05-13 Ondrej Mosnacek Superseded
General code cleanups, sanity checks and strdup() checks General code cleanups, sanity checks and strdup() checks - - - --- 2019-05-10 Jokke Hämäläinen Changes Requested
Trivial style fixes pt2 Trivial style fixes pt2 - - - --- 2019-05-10 Jokke Hämäläinen Accepted
Trivial style improvements Trivial style improvements - - - --- 2019-05-10 Jokke Hämäläinen Accepted
Check strdup() failure Check strdup() failure - - - --- 2019-05-10 Jokke Hämäläinen Accepted
Global replace exit(0) with more readable exit(EXIT_SUCCESS) Global replace exit(0) with more readable exit(EXIT_SUCCESS) - - - --- 2019-05-10 Jokke Hämäläinen Accepted
[2/2] another style fix Untitled series #116385 - - - --- 2019-05-10 Jokke Hämäläinen Accepted
Subject: [PATCH 1/2] Unify code style to preserve my sanity Subject: [PATCH 1/2] Unify code style to preserve my sanity - - - --- 2019-05-10 Jokke Hämäläinen Accepted
[v3] selinux: do not report error on connect(AF_UNSPEC) [v3] selinux: do not report error on connect(AF_UNSPEC) - - - --- 2019-05-10 Paolo Abeni Accepted
[v2] selinux: do not report error on connect(AF_UNSPEC) [v2] selinux: do not report error on connect(AF_UNSPEC) - - - --- 2019-05-10 Paolo Abeni Superseded
[net,v2] Revert "selinux: do not report error on connect(AF_UNSPEC)" [net,v2] Revert "selinux: do not report error on connect(AF_UNSPEC)" - - - --- 2019-05-10 Paolo Abeni Superseded
[net] Revert "selinux: do not report error on connect(AF_UNSPEC)" [net] Revert "selinux: do not report error on connect(AF_UNSPEC)" - - - --- 2019-05-10 Paolo Abeni Superseded
libselinux: Eliminate use of security_compute_user() libselinux: Eliminate use of security_compute_user() - - - --- 2019-05-09 Petr Lautrbach Changes Requested
[net] selinux: do not report error on connect(AF_UNSPEC) [net] selinux: do not report error on connect(AF_UNSPEC) - 1 - --- 2019-05-08 Paolo Abeni Superseded
[RFC] selinux: provide __le variables explicitly [RFC] selinux: provide __le variables explicitly - - - --- 2019-05-08 Nicholas Mc Guire Accepted
[GIT,PULL] SELinux patches for v5.2 [GIT,PULL] SELinux patches for v5.2 - - - --- 2019-05-07 Paul Moore Accepted
selinux: support attributes in type transitions selinux: support attributes in type transitions - - - --- 2019-05-06 Ondrej Mosnacek Changes Requested
selinux: remove some no-op BUG_ONs selinux: remove some no-op BUG_ONs - - - --- 2019-05-04 Ondrej Mosnacek Accepted
[GIT,PULL] SELinux fixes for v5.1 (#3) [GIT,PULL] SELinux fixes for v5.1 (#3) - - - --- 2019-04-29 Paul Moore Accepted
proc: prevent changes to overridden credentials proc: prevent changes to overridden credentials 3 - - --- 2019-04-19 Paul Moore Accepted
[81/90] Netlabel: Return the labeling type on socket LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[80/90] Smack: Let netlabel do the work on connections LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[79/90] Smack: Don't set the socket label on each send LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[78/90] Smack: Let netlabel do the work on the ambient domain LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[77/90] Netlabel: Add a secattr comparison API function LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[76/90] Smack: Set netlabel flags properly on new label import LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[75/90] Smack: Fix setting of the CIPSO MLS_CAT flags LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[74/90] LSM: Change error detection for UDP peer security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[73/90] Smack: Advertise the secid to netlabel LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[72/90] LSM: Fix for security_init_inode_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[71/90] LSM: Infrastructure security blobs for mount options LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[70/90] LSM: Correct handling of ENOSYS in inode_setxattr LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[69/90] LSM: Use full security context in security_inode_setsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[68/90] LSM: Support multiple LSMs using inode_init_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[67/90] Smack: Detect if secmarks can be safely used LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[66/90] LSM: refactor security_setprocattr LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[65/90] LSM: Add secmark refcounting to call_one list LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[64/90] netfilter: Remove unnecessary NULL check in lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[63/90] Smack: Consolidate secmark conversions LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[62/90] netfilter: Fix memory leak introduced with lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[61/90] LSM: Make getting the secmark right cleaner LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[60/90] LSM: Add secmark_relabel_packet to the set of one call hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[59/90] AppArmor: Remove the exclusive flag LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[58/90] LSM: Specify which LSM to display LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[57/90] SELinux: Use blob offset in current_sid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[56/90] LSM: Special handling for secctx lsm hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[55/90] LSM: Remove unused macro LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[54/90] kernfs: remove lsm_context scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[53/90] LSM: Use lsm_context in security_inode_setsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[52/90] LSM: Use lsm_context in inode_setsecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[51/90] LSM: Add the release function to the lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[50/90] fs: remove lsm_context scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[49/90] LSM: Use lsm_context in security_secid_to_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[48/90] LSM: Use lsm_context in security_release_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[47/90] LSM: Use lsm_context in release_secctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[46/90] LSM: Use lsm_context in security_secctx_to_secid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[45/90] LSM: Use lsm_context in security_inode_getsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[44/90] LSM: Use lsm_context in security_inode_notifysecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[43/90] LSM: Use lsm_context in security_dentry_init_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[42/90] LSM: Use lsm_context in dentry_init_security hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[41/90] LSM: Use lsm_context in inode_notifysecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[40/90] LSM: Use lsm_context in inode_getsecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[39/90] LSM: Use lsm_context in secctx_to_secid hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[38/90] LSM: Use lsm_context in secid_to_secctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[37/90] LSM: Create a data structure for a security context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[36/90] LSM: Limit calls to certain module hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[35/90] AppArmor: Remove unnecessary hook stub LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[34/90] Smack: Restore the release_secctx hook LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[33/90] IMA: FIXUP prototype using lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[32/90] LSM: Remove lsm_export scaffolding functions LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[31/90] Netlabel: Replace secids with lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[30/90] NET: Remove netfilter scaffolding for lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[29/90] NET: Remove scaffolding on new secmarks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[28/90] NET: Remove scaffolding on secmarks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[27/90] NET: Change the UNIXCB from a secid to an lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[26/90] IMA: Clean out lsm_export scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[25/90] Audit: Convert osid to an lsm_export structure LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[24/90] Audit: Convert target_sid to an lsm_export structure LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[23/90] Audit: Change audit_sig_sid to audit_sig_lsm LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[22/90] LSM: Use lsm_export in security_cred_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[21/90] LSM: Use lsm_export in security_inode_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[20/90] LSM: Use lsm_export in security_task_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[19/90] LSM: Use lsm_export in security_ipc_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[18/90] LSM: Use lsm_export in security_secid_to_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[17/90] LSM: Use lsm_export in security_secctx_to_secid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[15/90] LSM: Use lsm_export in security_kernel_act_as LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[14/90] LSM: Use lsm_export in security_audit_rule_match LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[13/90] LSM: Use lsm_export in the secctx_to_secid hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[12/90] LSM: Use lsm_export in the secid_to_secctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[11/90] LSM: Fix logical operation in lsm_export checks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[10/90] LSM: Use lsm_export in the audit_rule_match hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[09/90] LSM: Use lsm_export in the getpeersec_dgram hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[08/90] LSM: Use lsm_export in the kernel_ask_as hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[07/90] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[06/90] LSM: Use lsm_export in the cred_getsecid hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
« 1 2 ... 62 63 6489 90 »