Show patches with: none      |   4097 patches
« 1 2 3 440 41 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v5] libselinux: Eliminate use of security_compute_user() [v5] libselinux: Eliminate use of security_compute_user() 1 - - 0 0 0 2020-02-11 Petr Lautrbach Superseded
[GIT,PULL] SELinux fixes for v5.6 (#1) [GIT,PULL] SELinux fixes for v5.6 (#1) - - - 0 0 0 2020-02-10 Paul Moore Accepted
[v4] libselinux: Eliminate use of security_compute_user() [v4] libselinux: Eliminate use of security_compute_user() - - - 0 0 0 2020-02-10 Petr Lautrbach Changes Requested
[v3] libselinux: Eliminate use of security_compute_user() [v3] libselinux: Eliminate use of security_compute_user() - - - 0 0 0 2020-02-08 Petr Lautrbach Superseded
label_file.c: Fix MAC build label_file.c: Fix MAC build 1 - - 0 0 0 2020-02-07 Nick Kralevich Accepted
[v3] security: selinux: allow per-file labeling for bpffs [v3] security: selinux: allow per-file labeling for bpffs 1 - - 0 0 0 2020-02-07 Steven Moreland Accepted
[userspace] libsepol/cil: remove unnecessary hash tables [userspace] libsepol/cil: remove unnecessary hash tables 1 - - 0 0 0 2020-02-07 Ondrej Mosnacek Accepted
libselinux: drop error return from is_selinux_enabled.3 libselinux: drop error return from is_selinux_enabled.3 - - - 0 0 0 2020-02-07 Christian Göttsche Superseded
[v2] security: selinux: allow per-file labeling for bpffs [v2] security: selinux: allow per-file labeling for bpffs - - - 0 0 0 2020-02-06 Steven Moreland Superseded
security: selinux: allow per-file labeling for bpffs security: selinux: allow per-file labeling for bpffs - - - 0 0 0 2020-02-06 Steven Moreland Superseded
[2/2] Travis-CI: test that DEBUG build works userspace: Fix DEBUG=1 build 1 - - 0 0 0 2020-02-06 Ondrej Mosnacek Accepted
[1/2] libsemanage: preserve parent Makefile's flags in debug mode userspace: Fix DEBUG=1 build - - - 0 0 0 2020-02-06 Ondrej Mosnacek Accepted
[RFC,2/2] semodule: support changing policyvers via command line userspace: Allow changing version of kernel policy built by semodule - - - 0 0 0 2020-02-06 Ondrej Mosnacek Rejected
[RFC,1/2] libsemanage: support changing policy version via API userspace: Allow changing version of kernel policy built by semodule - - - 0 0 0 2020-02-06 Ondrej Mosnacek Rejected
[v6,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,03/10] perf/core: open access to probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v6,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-02-05 Alexey Budankov Superseded
[v2] libselinux: Eliminate use of security_compute_user() [v2] libselinux: Eliminate use of security_compute_user() - - - 0 0 0 2020-02-04 Petr Lautrbach Changes Requested
[RFC,1/1] selinux-testsuite: Test all mount option context types selinux-testsuite: Test all mount option context types - - - 0 0 0 2020-02-04 Richard Haines Rejected
security/selinux: Add support for new key permissions security/selinux: Add support for new key permissions - - - 0 0 0 2020-02-03 Richard Haines New
[v3,5/5] selinux: generalize evaluate_cond_node() selinux: Assorted simplifications and cleanups - - - 0 0 0 2020-02-03 Ondrej Mosnacek Accepted
[v3,4/5] selinux: convert cond_expr to array selinux: Assorted simplifications and cleanups - 1 - 0 0 0 2020-02-03 Ondrej Mosnacek Accepted
[v3,3/5] selinux: convert cond_av_list to array selinux: Assorted simplifications and cleanups - 1 - 0 0 0 2020-02-03 Ondrej Mosnacek Accepted
[v3,2/5] selinux: convert cond_list to array selinux: Assorted simplifications and cleanups - - - 0 0 0 2020-02-03 Ondrej Mosnacek Accepted
[v3,1/5] selinux: simplify evaluate_cond_node() selinux: Assorted simplifications and cleanups - - - 0 0 0 2020-02-03 Ondrej Mosnacek Not Applicable
selinux: fix sidtab string cache locking selinux: fix sidtab string cache locking 1 - - 0 0 0 2020-02-03 Ondrej Mosnacek Accepted
[RFC] libsepol: Add 'key_perms' policy capability [RFC] libsepol: Add 'key_perms' policy capability - - - 0 0 0 2020-02-02 Richard Haines Changes Requested
[RFC,1/1] selinux-testsuite: Add additional key permission tests selinux-testsuite: Add additional key permission tests - - - 0 0 0 2020-02-02 Richard Haines Changes Requested
selinux: Fix typo in filesystem name selinux: Fix typo in filesystem name 1 - - 0 0 0 2020-02-02 Hridya Valsaraju Accepted
[v2] selinux: sel_avc_get_stat_idx should increase position index [v2] selinux: sel_avc_get_stat_idx should increase position index 1 - - 0 0 0 2020-02-01 Vasily Averin Accepted
selinux-testsuite: Binder goto brexit fix selinux-testsuite: Binder goto brexit fix 1 - - 0 0 0 2020-01-31 Richard Haines Accepted
libsepol/cil: Rewrite verification of map classes and classpermissionsets libsepol/cil: Rewrite verification of map classes and classpermissionsets 1 - - 0 0 0 2020-01-31 James Carter Accepted
libsepol: add support for new polcap genfs_seclabel_symlinks libsepol: add support for new polcap genfs_seclabel_symlinks 1 - - 0 0 0 2020-01-31 Christian Göttsche Accepted
[v3,2/2] testsuite: add further nfs tests [v3,1/2] testsuite: provide support for testing labeled NFS - - - 0 0 0 2020-01-30 Stephen Smalley Accepted
[v3,1/2] testsuite: provide support for testing labeled NFS [v3,1/2] testsuite: provide support for testing labeled NFS - - - 0 0 0 2020-01-30 Stephen Smalley Accepted
[v2,2/2] testsuite: add further nfs tests [v2,1/2] testsuite: provide support for testing labeled NFS - - - 0 0 0 2020-01-30 Stephen Smalley Superseded
[v2,1/2] testsuite: provide support for testing labeled NFS [v2,1/2] testsuite: provide support for testing labeled NFS - - - 0 0 0 2020-01-30 Stephen Smalley Superseded
testsuite: add further nfs tests testsuite: add further nfs tests - - - 0 0 0 2020-01-30 Stephen Smalley Superseded
[1/1] selinux-testsuite: Add watch_sb and watch_mount checks selinux-testsuite: Add watch_sb and watch_mount checks 1 - - 0 0 0 2020-01-30 Richard Haines Accepted
testsuite: provide support for testing labeled NFS testsuite: provide support for testing labeled NFS - - - 0 0 0 2020-01-30 Stephen Smalley Superseded
testsuite: enable running over labeled NFS testsuite: enable running over labeled NFS - - - 0 0 0 2020-01-29 Stephen Smalley Accepted
[v2] selinux: remove unused initial SIDs and improve handling [v2] selinux: remove unused initial SIDs and improve handling - - - 0 0 0 2020-01-29 Stephen Smalley Changes Requested
[v2] libsepol,checkpolicy: support omitting unused initial sid contexts [v2] libsepol,checkpolicy: support omitting unused initial sid contexts 1 - - 0 0 0 2020-01-29 Stephen Smalley Accepted
[v2] selinux: allow kernfs symlinks to inherit parent directory context [v2] selinux: allow kernfs symlinks to inherit parent directory context 1 - - 0 0 0 2020-01-28 Christian Göttsche Accepted
libsepol,checkpolicy: support omitting unused initial sid contexts libsepol,checkpolicy: support omitting unused initial sid contexts - - - 0 0 0 2020-01-28 Stephen Smalley Superseded
[v6,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,03/10] perf/core: open access to probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[v6,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - 0 0 0 2020-01-28 Alexey Budankov Superseded
[GIT,PULL] SELinux patches for v5.6 [GIT,PULL] SELinux patches for v5.6 - - - 0 0 0 2020-01-27 Paul Moore Accepted
selinux: remove unused initial SIDs and improve handling selinux: remove unused initial SIDs and improve handling - - - 0 0 0 2020-01-27 Stephen Smalley Superseded
[V2,2/2] selinux-testsuite: Add fs*(2) API filesystem tests selinux-testsuite: Add fs*(2) API filesystem tests - - - 0 0 0 2020-01-27 Richard Haines Accepted
[V2,1/2] selinux-testsuite: Prepare for adding fs*(2) API tests selinux-testsuite: Add fs*(2) API filesystem tests - - - 0 0 0 2020-01-27 Richard Haines Accepted
selinux: allow kernfs symlinks to inherit parent directory context selinux: allow kernfs symlinks to inherit parent directory context - - - 0 0 0 2020-01-24 Christian Göttsche Superseded
[1/1] sel_avc_get_stat_idx should increase position index [1/1] sel_avc_get_stat_idx should increase position index - - - 0 0 0 2020-01-24 Vasily Averin Changes Requested
[v14,23/23] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor - 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,22/23] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,21/23] Audit: Include object data for all security modules LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,20/23] Audit: Add subj_LSM fields when necessary LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,19/23] LSM: Verify LSM display sanity in binder LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,18/23] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,17/23] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,16/23] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,15/23] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,14/23] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,13/23] LSM: Specify which LSM to display LSM: Module stacking for AppArmor 1 - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,12/23] IMA: Change internal interfaces to use lsmblobs LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,11/23] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,10/23] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,09/23] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,08/23] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,07/23] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,06/23] Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,05/23] net: Prepare UDS for security module stacking LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,04/23] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,03/23] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,02/23] LSM: Create and manage the lsmblob data structure. LSM: Module stacking for AppArmor - - - 0 0 0 2020-01-24 Casey Schaufler Superseded
[v14,01/23] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 1 2 - 0 0 0 2020-01-24 Casey Schaufler Superseded
selinux-testsuite: move variable definitions out of binder_common.h selinux-testsuite: move variable definitions out of binder_common.h 1 - - 0 0 0 2020-01-23 Paul Moore Accepted
libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling 1 - - 0 0 0 2020-01-23 James Carter Accepted
testsuite/policy: fixes for running on a labeled NFS mount testsuite/policy: fixes for running on a labeled NFS mount - - - 0 0 0 2020-01-23 Stephen Smalley Accepted
SELinux: How to split permissions for keys? SELinux: How to split permissions for keys? - - - 0 0 0 2020-01-23 David Howells Not Applicable
[userspace,v2,4/4] Makefile: always build with -fno-common Fix build with -fno-common 1 - - 0 0 0 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,3/4] checkpolicy: remove unused te_assertions Fix build with -fno-common - - - 0 0 0 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,2/4] libsepol: remove leftovers of cil_mem_error_handler Fix build with -fno-common - - - 0 0 0 2020-01-23 Ondrej Mosnacek Accepted
[userspace,v2,1/4] libsepol: fix CIL_KEY_* build errors with -fno-common Fix build with -fno-common - - - 0 0 0 2020-01-23 Ondrej Mosnacek Accepted
[userspace,4/4] Makefile: always build with -fno-common Fix build with -fno-common - - - 0 0 0 2020-01-22 Ondrej Mosnacek Superseded
« 1 2 3 440 41 »