Show patches with: none      |   4551 patches
« 1 2 3 445 46 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
selinux-testsuite: Remove unused sctp code selinux-testsuite: Remove unused sctp code 1 - - 0 0 0 2020-07-02 Richard Haines omos Queued
[04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps 1 - - 0 0 0 2016-06-09 Deepa Dinamani Deferred
libselinux/getconlist: add verbose switch to print more information libselinux/getconlist: add verbose switch to print more information - - - 0 0 0 2020-02-19 Christian Göttsche Deferred
[RFC] selinux: runtime disable is deprecated, add some ssleep() discomfort [RFC] selinux: runtime disable is deprecated, add some ssleep() discomfort - - - 0 0 0 2020-06-02 Paul Moore Deferred
[01/19] block_dev: Support checking inode permissions in lookup_bdev() - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[02/19] block_dev: Check permissions towards block device inode when mounting - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[03/19] fs: Treat foreign mounts as nosuid - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[04/19] selinux: Add support for unprivileged mounts from user namespaces - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[05/19] userns: Replace in_userns with current_in_userns - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[06/19] Smack: Handle labels consistently in untrusted mounts - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[07/19] fs: Check for invalid i_uid in may_follow_link() - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[10/19] fs: Update posix_acl support to handle user namespace mounts - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[13/19] fs: Allow superblock owner to access do_remount_sb() - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[16/19] fuse: Add support for pid namespaces - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[19/19] fuse: Allow user namespace mounts - - - 0 0 0 2015-12-02 Seth Forshee Superseded
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,15/18] fuse: Add support for pid namespaces - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[v2,18/18] fuse: Allow user namespace mounts - - - 0 0 0 2015-12-07 Seth Forshee Superseded
[RFC,01/17] netlabel: Mark rcu pointers with __rcu. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,02/17] netlabel: Add an address family to domain hash entries. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,03/17] netlabel: Initial support for the CALIPSO netlink protocol. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,04/17] netlabel: Add support for querying a CALIPSO DOI. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,05/17] netlabel: Add support for enumerating the CALIPSO DOI list. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,06/17] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,07/17] netlabel: Add support for removing a CALIPSO DOI. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,08/17] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,09/17] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,10/17] calipso: Set the calipso socket label to match the secattr. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,11/17] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,12/17] ipv6: Allow request socks to contain IPv6 options. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,13/17] calipso: Allow request sockets to be relabelled by the lsm. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,14/17] calipso: Allow the lsm to label the skbuff directly. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,15/17] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,16/17] calipso: Add validation of CALIPSO option. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RFC,17/17] calipso: Add a label cache. - - - 0 0 0 2015-12-22 Huw Davies Superseded
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,15/18] fuse: Add support for pid namespaces - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[RESEND,v2,18/18] fuse: Allow user namespace mounts - - - 0 0 0 2016-01-04 Seth Forshee Superseded
[1/3] libsepol: Add function to check if module name matches filename - - - 0 0 0 2016-03-25 James Carter Superseded
[2/3] policycoreutils/hll/pp: Warn if module name different from filenames - - - 0 0 0 2016-03-25 James Carter Superseded
[3/3] checkpolicy: Warn if module name different than filenames - - - 0 0 0 2016-03-25 James Carter Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - 0 0 0 2016-03-28 Seth Forshee Superseded
selinux: restrict kernel module loading - - - 0 0 0 2016-04-01 Jeffrey Vander Stoep Superseded
[v2] selinux: restrict kernel module loading - - - 0 0 0 2016-04-03 Jeffrey Vander Stoep Superseded
[RFC] selinux: distinguish non-init user namespace capability checks - - - 0 0 0 2016-04-06 Stephen Smalley Superseded
[RFC] selinux-testsuite: Add tests for non-init userns capability checks - - - 0 0 0 2016-04-06 Stephen Smalley Superseded
[RFC] selinux-testsuite: Add tests for non-init userns capability checks - - - 0 0 0 2016-04-06 Stephen Smalley Superseded
[RFC] selinux: apply execstack check on thread stacks - - - 0 0 0 2016-04-06 Stephen Smalley Superseded
[RFC] selinux-testsuite: Add test for execstack on thread stack - - - 0 0 0 2016-04-06 Stephen Smalley Superseded
[1/2,v2] policycoreutils/hll/pp: Warn if module name different than output filename - - - 0 0 0 2016-04-07 James Carter Superseded
[2/2,v2] checkpolicy: Warn if module name different than output filename - - - 0 0 0 2016-04-07 James Carter Superseded
[1/7] genhomedircon: factor out common replacement code - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[2/7] genhomedircon: move fallback user to genhomedircon_user_entry_t - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[3/7] genhomedircon: rename FALLBACK #defines consistent with struct - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[4/7] genhomedircon: make all write context funcs take user_entry struct - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[5/7] genhomedircon: Add uid and gid to struct user_entry - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[6/7] genhomedircon: make USERID, USERNAME context lists - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[7/7] genhomedircon: write contexts for username and userid - - - 0 0 0 2016-04-08 Jason Zaman Superseded
[v3,01/21] fs: fix a posible leak of allocated superblock - - - 0 0 0 2016-04-22 Seth Forshee Superseded
[v3,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - 0 0 0 2016-04-22 Seth Forshee Superseded
[v3,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces - - - 0 0 0 2016-04-22 Seth Forshee Superseded
[v3,04/21] block_dev: Support checking inode permissions in lookup_bdev() - - - 0 0 0 2016-04-22 Seth Forshee Superseded
« 1 2 3 445 46 »