Show patches with: Archived = No       |   9273 patches
« 1 2 ... 15 16 1792 93 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[2/4] checkpolicy: reject condition with bool and tunable in expression [1/4] checkpolicy: drop unused token CLONE - - - --- 2023-05-12 Christian Göttsche bachradsusi Accepted
[1/4] checkpolicy: drop unused token CLONE [1/4] checkpolicy: drop unused token CLONE 1 - - --- 2023-05-12 Christian Göttsche bachradsusi Accepted
[v2] selinux: make header files self-including [v2] selinux: make header files self-including - - - --- 2023-05-12 Christian Göttsche pcmoore Accepted
[RFC,v2] fs/xattr: add *at family syscalls [RFC,v2] fs/xattr: add *at family syscalls 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,9/9] net: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT - 1 - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,8/9] bpf: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,7/9] kernel: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT - 1 - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,6/9] fs: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,5/9] drivers: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,4/9] block: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT - - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,3/9] capability: use new capable_any functionality [v4,1/9] capability: introduce new capable flag NODENYAUDIT 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,2/9] capability: add any wrapper to test for multiple caps with exactly one audit message [v4,1/9] capability: introduce new capable flag NODENYAUDIT - - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
[v4,1/9] capability: introduce new capable flag NODENYAUDIT [v4,1/9] capability: introduce new capable flag NODENYAUDIT - 1 - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
security: keys: perform capable check only on privileged operations security: keys: perform capable check only on privileged operations 1 - - --- 2023-05-11 Christian Göttsche pcmoore Handled Elsewhere
selinux: make header files self-including selinux: make header files self-including - - - --- 2023-05-11 Christian Göttsche pcmoore Superseded
selinux: deprecated fs ocon selinux: deprecated fs ocon - - - --- 2023-05-11 Christian Göttsche pcmoore Accepted
selinux: keep context struct members in sync selinux: keep context struct members in sync - - - --- 2023-05-11 Christian Göttsche pcmoore Accepted
[2/2] block: use block_admin_capable() for Persistent Reservations capability: Introduce CAP_BLOCK_ADMIN - - - --- 2023-05-11 tianjia.zhang pcmoore Handled Elsewhere
[1/2] capability: Introduce CAP_BLOCK_ADMIN capability: Introduce CAP_BLOCK_ADMIN - - - --- 2023-05-11 tianjia.zhang pcmoore Handled Elsewhere
selinux: small cleanups in selinux_audit_rule_init() selinux: small cleanups in selinux_audit_rule_init() - - - --- 2023-05-05 Paul Moore pcmoore Accepted
selinux: remove avc_disable() as it is no longer used selinux: remove avc_disable() as it is no longer used - - - --- 2023-05-05 Paul Moore pcmoore Rejected
selinux: more Makefile tweaks selinux: more Makefile tweaks - 1 - --- 2023-05-05 Paul Moore pcmoore Accepted
[-next,2/2] lsm: Change inode_setattr hook to take struct path argument lsm: Change inode_setattr() to take struct - - - --- 2023-05-05 Xiu Jianfeng pcmoore Handled Elsewhere
[-next,1/2] fs: Change notify_change() to take struct path argument lsm: Change inode_setattr() to take struct 1 - - --- 2023-05-05 Xiu Jianfeng pcmoore Handled Elsewhere
selinux: make cleanup on error consistent selinux: make cleanup on error consistent - - - --- 2023-05-04 Juraj Marcin pcmoore Rejected
[v2,4/4] python/audit2allow: Remove unused "debug" option python: Improve man pages - - - --- 2023-05-04 Vit Mojzis bachradsusi Accepted
[v2,3/4] python/semanage: Improve man pages python: Improve man pages - - - --- 2023-05-04 Vit Mojzis bachradsusi Accepted
[v2,2/4] python/audit2allow: Add missing options to man page python: Improve man pages - - - --- 2023-05-04 Vit Mojzis bachradsusi Accepted
[v2,1/4] python/chcat: Improve man pages python: Improve man pages 1 - - --- 2023-05-04 Vit Mojzis bachradsusi Accepted
[3/3] python/semanage: Improve man pages python: Improve man pages - - - --- 2023-05-03 Vit Mojzis bachradsusi Superseded
[2/3] python/audit2allow: Add missing options to man page python: Improve man pages - - - --- 2023-05-03 Vit Mojzis bachradsusi Superseded
[1/3] python/chcat: Improve man pages python: Improve man pages - - - --- 2023-05-03 Vit Mojzis bachradsusi Superseded
[v10,10/11] SELinux: Add selfattr hooks Untitled series #743939 - - - --- 2023-04-28 Casey Schaufler pcmoore Handled Elsewhere
[v10,10/11] SELinux: Add selfattr hooks Untitled series #743935 - - - --- 2023-04-28 Casey Schaufler pcmoore Handled Elsewhere
[v9,10/11] SELinux: Add selfattr hooks Untitled series #742249 - - - --- 2023-04-21 Casey Schaufler Handled Elsewhere
[GIT,PULL] SELinux patches for v6.4 [GIT,PULL] SELinux patches for v6.4 - - - --- 2023-04-20 Paul Moore pcmoore Accepted
[LSM,v2,2/2] selinux: Implement mptcp_add_subflow hook security: SELinux/LSM label with MPTCP and accept 1 - - --- 2023-04-20 Matthieu Baerts pcmoore Accepted
[LSM,v2,1/2] security, lsm: Introduce security_mptcp_add_subflow() security: SELinux/LSM label with MPTCP and accept 1 - - --- 2023-04-20 Matthieu Baerts pcmoore Accepted
libselinux: set CFLAGS for pip installation libselinux: set CFLAGS for pip installation 1 - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,6/6] libsemanage/tests: rename bool identifiers [v2,1/6] libsepol: rename struct member - - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,5/6] libsepol: rename bool identifiers [v2,1/6] libsepol: rename struct member - - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,4/6] checkpolicy: rename bool identifiers [v2,1/6] libsepol: rename struct member - - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,3/6] libsepol/tests: rename bool indentifiers [v2,1/6] libsepol: rename struct member - - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,2/6] checkpolicy: update cond_expr_t struct member name [v2,1/6] libsepol: rename struct member - - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[v2,1/6] libsepol: rename struct member [v2,1/6] libsepol: rename struct member 1 - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[RESEND] libsemanage: fix memory leak in semanage_user_roles [RESEND] libsemanage: fix memory leak in semanage_user_roles 1 - - --- 2023-04-20 Christian Göttsche bachradsusi Accepted
[6/6] selinux: declare read-only data arrays const [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[5/6] selinux: retain const qualifier on string literal in avtab_hash_eval() [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[4/6] selinux: drop return at end of void function avc_insert() [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[3/6] selinux: avc: drop unused function avc_disable() [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[2/6] selinux: adjust typos in comments [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[1/6] selinux: do not leave dangling pointer behind [1/6] selinux: do not leave dangling pointer behind - - - --- 2023-04-20 Christian Göttsche pcmoore Accepted
[TESTSUITE] README.md: update dependencies [TESTSUITE] README.md: update dependencies - - - --- 2023-04-20 Christian Göttsche omos Rejected
libsepol/cil: Fix class permission verification in CIL libsepol/cil: Fix class permission verification in CIL - - 1 --- 2023-04-20 James Carter bachradsusi Accepted
[LSM,2/2] selinux: Implement mptcp_add_subflow hook security: SELinux/LSM label with MPTCP and accept 1 - - --- 2023-04-19 Matthieu Baerts pcmoore Changes Requested
[LSM,1/2] security, lsm: Introduce security_mptcp_add_subflow() security: SELinux/LSM label with MPTCP and accept 1 - - --- 2023-04-19 Matthieu Baerts pcmoore Changes Requested
[9/9,v3] secilc/docs: Add deny rule to CIL documentation Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[8/9,v3] secilc/test: Add deny rule tests Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[7/9,v3] secilc/secil2tree: Add option to write CIL AST after post processing Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[6/9,v3] libsepol: Export the cil_write_post_ast function Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[5/9,v3] libsepol/cil: Add cil_write_post_ast function Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[4/9,v3] libsepol/cil: Process deny rules Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[3/9,v3] libsepol/cil: Add cil_tree_node_remove function Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[2/9,v3] libsepol/cil: Add cil_list_is_empty macro Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[1/9,v3] libsepol/cil: Parse and add deny rule to AST, but do not process Add CIL Deny Rule - - - --- 2023-04-13 James Carter bachradsusi Superseded
[v2] selinux: ensure av_permissions.h is built when needed [v2] selinux: ensure av_permissions.h is built when needed - - - --- 2023-04-12 Paul Moore pcmoore Accepted
[6/6] secilc/test: Add notself and other tests Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
[5/6] secilc/docs: Add notself and other keywords to CIL documentation Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
[4/6] libsepol: update CIL generation for trivial not-self rules Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
[3/6] libsepol/cil: Add notself and other support to CIL Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
[2/6] libsepol/cil: Do not call ebitmap_init twice for an ebitmap Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
[1/6] libsepol: Changes to ebitmap.h to fix compiler warnings Add support for notself and other to CIL - - - --- 2023-04-12 James Carter bachradsusi Superseded
selinux: ensure av_permissions.h is built when needed selinux: ensure av_permissions.h is built when needed - - - --- 2023-04-12 Paul Moore pcmoore Superseded
selinux: fix Makefile dependencies of flask.h selinux: fix Makefile dependencies of flask.h 1 - - --- 2023-04-12 Ondrej Mosnacek pcmoore Accepted
Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook - - - --- 2023-04-11 Roberto Sassu pcmoore Handled Elsewhere
[v8,10/11] SELinux: Add selfattr hooks Untitled series #738829 - - - --- 2023-04-11 Casey Schaufler pcmoore Handled Elsewhere
selinux: stop returning node from avc_insert selinux: stop returning node from avc_insert - - - --- 2023-04-03 Stephen Smalley pcmoore Accepted
libsemanage: fix memory leak in semanage_user_roles libsemanage: fix memory leak in semanage_user_roles - - - --- 2023-04-01 Christian Göttsche bachradsusi Accepted
make avc audit line only have one space make avc audit line only have one space - - - --- 2023-04-01 Steven Moreland bachradsusi Rejected
[3/3] checkpolicy/dismod: misc improvements [1/3] checkpolicy: add option to skip checking neverallow rules - - - --- 2023-03-31 Christian Göttsche bachradsusi Changes Requested
[2/3] checkpolicy/dispol: add output functions [1/3] checkpolicy: add option to skip checking neverallow rules 1 - - --- 2023-03-31 Christian Göttsche bachradsusi Accepted
[1/3] checkpolicy: add option to skip checking neverallow rules [1/3] checkpolicy: add option to skip checking neverallow rules - - - --- 2023-03-31 Christian Göttsche bachradsusi Changes Requested
[v10,4/4] evm: Support multiple LSMs providing an xattr evm: Do HMAC of multiple per LSM xattrs for new inodes - 1 - --- 2023-03-31 Roberto Sassu Handled Elsewhere
[v10,3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-31 Roberto Sassu Handled Elsewhere
[v10,2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-31 Roberto Sassu Handled Elsewhere
[v10,1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write() evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-31 Roberto Sassu Handled Elsewhere
[v9,4/4] evm: Support multiple LSMs providing an xattr evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-29 Roberto Sassu pcmoore Handled Elsewhere
[v9,3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-29 Roberto Sassu pcmoore Handled Elsewhere
[v9,2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-29 Roberto Sassu pcmoore Handled Elsewhere
[v9,1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write() evm: Do HMAC of multiple per LSM xattrs for new inodes - - - --- 2023-03-29 Roberto Sassu pcmoore Handled Elsewhere
[v2] selinux: clean up dead code after removing runtime disable [v2] selinux: clean up dead code after removing runtime disable - - - --- 2023-03-24 Lukas Bulwahn pcmoore Accepted
selinux: clean up dead code after removing runtime disable selinux: clean up dead code after removing runtime disable - - - --- 2023-03-23 Lukas Bulwahn pcmoore Changes Requested
selinux: update the file list in MAINTAINERS selinux: update the file list in MAINTAINERS - - - --- 2023-03-21 Paul Moore pcmoore Accepted
[userspace] scripts/ci: install rdma-core-devel for selinux-testsuite [userspace] scripts/ci: install rdma-core-devel for selinux-testsuite 1 - - --- 2023-03-20 Ondrej Mosnacek omos Accepted
selinux: remove the runtime disable functionality selinux: remove the runtime disable functionality 1 1 - --- 2023-03-17 Paul Moore pcmoore Accepted
[v2] selinux: remove the 'checkreqprot' functionality [v2] selinux: remove the 'checkreqprot' functionality 1 - - --- 2023-03-16 Paul Moore pcmoore Accepted
selinux: remove the 'checkreqprot' functionality selinux: remove the 'checkreqprot' functionality 1 - - --- 2023-03-16 Paul Moore pcmoore Superseded
[v7,10/11] SELinux: Add selfattr hooks Untitled series #730534 - - - --- 2023-03-15 Casey Schaufler pcmoore Handled Elsewhere
[testsuite] tests/atsecure: avoid running bash under test domains [testsuite] tests/atsecure: avoid running bash under test domains - - - --- 2023-03-14 Ondrej Mosnacek omos Accepted
[RFC,v2] selinux: cache access vector decisions in the inode security blob [RFC,v2] selinux: cache access vector decisions in the inode security blob - - - --- 2023-03-14 Stephen Smalley pcmoore RFC
« 1 2 ... 15 16 1792 93 »