Show patches with: none      |   8948 patches
« 1 2 ... 51 52 5389 90 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v2] libsepol,checkpolicy: support omitting unused initial sid contexts [v2] libsepol,checkpolicy: support omitting unused initial sid contexts 1 - - --- 2020-01-29 Stephen Smalley Accepted
[v2] selinux: allow kernfs symlinks to inherit parent directory context [v2] selinux: allow kernfs symlinks to inherit parent directory context 1 - - --- 2020-01-28 Christian Göttsche Accepted
libsepol,checkpolicy: support omitting unused initial sid contexts libsepol,checkpolicy: support omitting unused initial sid contexts - - - --- 2020-01-28 Stephen Smalley Superseded
[v6,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov Superseded
[v6,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov Superseded
[v6,03/10] perf/core: open access to probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[v6,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov Superseded
[v6,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov Superseded
[GIT,PULL] SELinux patches for v5.6 [GIT,PULL] SELinux patches for v5.6 - - - --- 2020-01-27 Paul Moore Accepted
selinux: remove unused initial SIDs and improve handling selinux: remove unused initial SIDs and improve handling - - - --- 2020-01-27 Stephen Smalley Superseded
[V2,2/2] selinux-testsuite: Add fs*(2) API filesystem tests selinux-testsuite: Add fs*(2) API filesystem tests - - - --- 2020-01-27 Richard Haines Accepted
[V2,1/2] selinux-testsuite: Prepare for adding fs*(2) API tests selinux-testsuite: Add fs*(2) API filesystem tests - - - --- 2020-01-27 Richard Haines Accepted
selinux: allow kernfs symlinks to inherit parent directory context selinux: allow kernfs symlinks to inherit parent directory context - - - --- 2020-01-24 Christian Göttsche Superseded
[1/1] sel_avc_get_stat_idx should increase position index [1/1] sel_avc_get_stat_idx should increase position index - - - --- 2020-01-24 Vasily Averin Changes Requested
[v14,23/23] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor - 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,22/23] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - - - --- 2020-01-24 Casey Schaufler Superseded
[v14,21/23] Audit: Include object data for all security modules LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,20/23] Audit: Add subj_LSM fields when necessary LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,19/23] LSM: Verify LSM display sanity in binder LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,18/23] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,17/23] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,16/23] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,15/23] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,14/23] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,13/23] LSM: Specify which LSM to display LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler Superseded
[v14,12/23] IMA: Change internal interfaces to use lsmblobs LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,11/23] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,10/23] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,09/23] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,08/23] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,07/23] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,06/23] Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,05/23] net: Prepare UDS for security module stacking LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,04/23] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,03/23] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
[v14,02/23] LSM: Create and manage the lsmblob data structure. LSM: Module stacking for AppArmor - - - --- 2020-01-24 Casey Schaufler Superseded
[v14,01/23] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler Superseded
selinux-testsuite: move variable definitions out of binder_common.h selinux-testsuite: move variable definitions out of binder_common.h 1 - - --- 2020-01-23 Paul Moore Accepted
libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling 1 - - --- 2020-01-23 James Carter Accepted
testsuite/policy: fixes for running on a labeled NFS mount testsuite/policy: fixes for running on a labeled NFS mount - - - --- 2020-01-23 Stephen Smalley Accepted
SELinux: How to split permissions for keys? SELinux: How to split permissions for keys? - - - --- 2020-01-23 David Howells Not Applicable
[userspace,v2,4/4] Makefile: always build with -fno-common Fix build with -fno-common 1 - - --- 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,3/4] checkpolicy: remove unused te_assertions Fix build with -fno-common - - - --- 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,2/4] libsepol: remove leftovers of cil_mem_error_handler Fix build with -fno-common - - - --- 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,1/4] libsepol: fix CIL_KEY_* build errors with -fno-common Fix build with -fno-common - - - --- 2020-01-23 Ondrej Mosnacek Accepted
[userspace,4/4] Makefile: always build with -fno-common Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,3/4] checkpolicy: remove unused te_assertions Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,2/4] libsepol: remove unused cil_mem_error_handler Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[userspace,1/4] libsepol: fix CIL_KEY_* build errors with -fno-common Fix build with -fno-common - - - --- 2020-01-22 Ondrej Mosnacek Superseded
[v4] libsepol,checkpolicy: remove use of hardcoded security class values [v4] libsepol,checkpolicy: remove use of hardcoded security class values 1 - - --- 2020-01-21 Stephen Smalley Accepted
libselinux: export flush_class_cache(), call it on policyload libselinux: export flush_class_cache(), call it on policyload - - - --- 2020-01-21 Stephen Smalley Accepted
[v5,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[v5,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov Changes Requested
[2/2] selinux-testsuite: Add fs*(2) API filesystem tests selinux-testsuite: Add fs*(2) API filesystem tests 1 - - --- 2020-01-20 Richard Haines Superseded
[1/2] selinux-testsuite: Prepare for adding fs*(2) API tests selinux-testsuite: Add fs*(2) API filesystem tests 1 - - --- 2020-01-20 Richard Haines Superseded
[V7,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests 1 - - --- 2020-01-19 Richard Haines Accepted
[v2] selinux: fix regression introduced by move_mount(2) syscall [v2] selinux: fix regression introduced by move_mount(2) syscall - 2 - --- 2020-01-17 Stephen Smalley Accepted
[v3] libsepol,checkpolicy: remove use of hardcoded security class values [v3] libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-17 Stephen Smalley Superseded
libselinux: update man pages for userspace policy enforcers libselinux: update man pages for userspace policy enforcers - - - --- 2020-01-17 Stephen Smalley Accepted
selinux: move status variables out of selinux_ss selinux: move status variables out of selinux_ss - 1 - --- 2020-01-17 Ondrej Mosnacek Accepted
[v3] selinux: map RTM_GETLINK to a privileged permission [v3] selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-17 Jeffrey Vander Stoep Changes Requested
[v2,5/5] selinux: generalize evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,4/5] selinux: convert cond_expr to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,3/5] selinux: convert cond_av_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,2/5] selinux: convert cond_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Superseded
[v2,1/5] selinux: simplify evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-17 Ondrej Mosnacek Accepted
[RFC] selinux: policydb - convert filename trans hash to rhashtable [RFC] selinux: policydb - convert filename trans hash to rhashtable - - - --- 2020-01-16 Lucas Stach Changes Requested
[v2] libsepol,checkpolicy: remove use of hardcoded security class values [v2] libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-16 Stephen Smalley Superseded
libsepol,checkpolicy: remove use of hardcoded security class values libsepol,checkpolicy: remove use of hardcoded security class values - - - --- 2020-01-16 Stephen Smalley Superseded
[v2] selinux: map RTM_GETLINK to a privileged permission [v2] selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-16 Jeffrey Vander Stoep Superseded
[V6,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-16 Richard Haines Superseded
[v2] selinux: fix wrong buffer types in policydb.c [v2] selinux: fix wrong buffer types in policydb.c - 1 - --- 2020-01-16 Ondrej Mosnacek Accepted
selinux: map RTM_GETLINK to a privileged permission selinux: map RTM_GETLINK to a privileged permission - - - --- 2020-01-16 Jeffrey Vander Stoep Superseded
selinux: fix sparse warnings in policydb.c selinux: fix sparse warnings in policydb.c - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[6/6] selinux: generalize evaluate_cond_node() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[5/6] selinux: convert cond_expr to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[4/6] selinux: convert cond_av_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[3/6] selinux: convert cond_list to array selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[2/6] selinux: simplify security_preserve_bools() selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Superseded
[1/6] selinux: do not allocate ancillary buffer on first load selinux: Assorted simplifications and cleanups - 1 - --- 2020-01-16 Ondrej Mosnacek Accepted
libselinux: remove flask.h and av_permissions.h libselinux: remove flask.h and av_permissions.h 1 - - --- 2020-01-15 Stephen Smalley Accepted
[V5,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests 1 - - --- 2020-01-14 Richard Haines Superseded
[V4,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-14 Richard Haines Superseded
[RFC] selinux: implement move_mount hook [RFC] selinux: implement move_mount hook - - - --- 2020-01-13 Stephen Smalley Superseded
[v2] selinux: remove redundant selinux_nlmsg_perm [v2] selinux: remove redundant selinux_nlmsg_perm 1 - - --- 2020-01-13 Huaisheng Ye Accepted
[V3,1/1] selinux-testsuite: Add filesystem tests selinux-testsuite: Add filesystem tests - - - --- 2020-01-12 Richard Haines Superseded
selinux: remove redundant selinux_nlmsg_perm selinux: remove redundant selinux_nlmsg_perm 1 - - --- 2020-01-12 Huaisheng Ye Superseded
« 1 2 ... 51 52 5389 90 »