Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 9263 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
25
26
27
…
92
93
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v32,20/28] binder: Pass LSM identifier for confirmation
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,19/28] NET: Store LSM netlabel data in a lsmblob
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,18/28] LSM: security_secid_to_secctx in netlink netfilter
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,17/28] LSM: Use lsmcontext in security_inode_getsecctx
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,16/28] LSM: Use lsmcontext in security_secid_to_secctx
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,15/28] LSM: Ensure the correct LSM context releaser
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,14/28] LSM: Specify which LSM to display
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,13/28] LSM: Use lsmblob in security_cred_getsecid
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,12/28] LSM: Use lsmblob in security_inode_getsecid
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,11/28] LSM: Use lsmblob in security_current_getsecid
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,10/28] LSM: Use lsmblob in security_ipc_getsecid
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,09/28] LSM: Use lsmblob in security_secid_to_secctx
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,08/28] LSM: Use lsmblob in security_secctx_to_secid
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,07/28] LSM: Use lsmblob in security_kernel_act_as
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,06/28] LSM: Use lsmblob in security_audit_rule_match
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,05/28] IMA: avoid label collisions with stacked LSMs
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,04/28] LSM: provide lsm name and id slot mappings
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,03/28] LSM: Add the lsmblob data structure.
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- 1 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,02/28] LSM: Infrastructure management of the sock security
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
[v32,01/28] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-02-02
Casey Schaufler
pcmoore
Changes Requested
selinux: parse contexts for mount options early
selinux: parse contexts for mount options early
- - -
-
-
-
2022-02-02
Ondrej Mosnacek
pcmoore
Accepted
[v2] selinux: fix double free of cond_list on error paths
[v2] selinux: fix double free of cond_list on error paths
- - -
-
-
-
2022-02-02
Vratislav Bendel
pcmoore
Accepted
[v3,2/2] selinux: try to use preparsed sid before calling parse_sid()
selinux: parse sids earlier to avoid doing memory allocations under spinlock
- - -
-
-
-
2022-01-31
Scott Mayhew
pcmoore
Accepted
[v3,1/2] selinux: Fix selinux_sb_mnt_opts_compat()
selinux: parse sids earlier to avoid doing memory allocations under spinlock
- - -
-
-
-
2022-01-31
Scott Mayhew
pcmoore
Accepted
libsepol: do not add gaps to string list
libsepol: do not add gaps to string list
1 - -
-
-
-
2022-01-31
Christian Göttsche
Accepted
libsepol: Populate and use policy name
libsepol: Populate and use policy name
- - -
-
-
-
2022-01-31
Thiébaud Weksteen
Superseded
[3/3] selinux: remove duplicate cond_list clean up calls
selinux: Fix and clean policydb->cond_list error paths
- - -
-
-
-
2022-01-28
Vratislav Bendel
pcmoore
Rejected
[2/3] selinux: fix double free of cond_list on error paths
selinux: Fix and clean policydb->cond_list error paths
- - -
-
-
-
2022-01-28
Vratislav Bendel
pcmoore
Changes Requested
[1/3] selinux: consistently clear cond_list on error paths
selinux: Fix and clean policydb->cond_list error paths
- - -
-
-
-
2022-01-28
Vratislav Bendel
pcmoore
Changes Requested
[v2] selinux: various sparse fixes
[v2] selinux: various sparse fixes
- - -
-
-
-
2022-01-27
Paul Moore
pcmoore
Accepted
[v2] selinux: fix a type cast problem in cred_init_security()
[v2] selinux: fix a type cast problem in cred_init_security()
- - -
-
-
-
2022-01-27
Paul Moore
pcmoore
Accepted
selinux: various sparse fixes
selinux: various sparse fixes
- - -
-
-
-
2022-01-27
Paul Moore
pcmoore
Superseded
[v2] LSM: general protection fault in legacy_parse_param
[v2] LSM: general protection fault in legacy_parse_param
2 - -
-
-
-
2022-01-27
Casey Schaufler
pcmoore
Accepted
selinux: fix a type cast problem in cred_init_security()
selinux: fix a type cast problem in cred_init_security()
- - -
-
-
-
2022-01-27
Paul Moore
pcmoore
Superseded
policycoreutils: handle argument counter of zero
policycoreutils: handle argument counter of zero
1 - -
-
-
-
2022-01-26
Christian Göttsche
Accepted
SELinux: Always allow FIOCLEX and FIONCLEX
SELinux: Always allow FIOCLEX and FIONCLEX
- - -
-
-
-
2022-01-25
Demi Marie Obenour
pcmoore
Changes Requested
[RFC] selinux: split no transition execve check
[RFC] selinux: split no transition execve check
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Rejected
[RFC] mm: create security context for memfd_secret inodes
[RFC] mm: create security context for memfd_secret inodes
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[1/9] selinux: check return value of sel_make_avc_files
[1/9] selinux: check return value of sel_make_avc_files
- 1 -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[9/9] selinux: drop unused macro
[1/9] selinux: check return value of sel_make_avc_files
- 1 -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[8/9] selinux: simplify cred_init_security
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[7/9] selinux: do not discard const qualifier in cast
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[6/9] selinux: drop unused parameter of avtab_insert_node
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[5/9] selinux: drop cast to same type
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[4/9] selinux: enclose macro arguments in parenthesis
[1/9] selinux: check return value of sel_make_avc_files
- 1 -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[3/9] selinux: declare name parameter of hash_eval const
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
[2/9] selinux: declare path parameters of _genfs_sid const
[1/9] selinux: check return value of sel_make_avc_files
- - -
-
-
-
2022-01-25
Christian Göttsche
pcmoore
Accepted
libsepol: invert only valid range of role bitmap
libsepol: invert only valid range of role bitmap
1 - -
-
-
-
2022-01-25
Christian Göttsche
Accepted
[v3] libsepol: handle type gaps
[v3] libsepol: handle type gaps
1 - -
-
-
-
2022-01-25
Christian Göttsche
Accepted
[-next] selinux: access superblock_security_struct in LSM blob way
[-next] selinux: access superblock_security_struct in LSM blob way
- 1 -
-
-
-
2022-01-25
Gong Ruiqi
pcmoore
Accepted
libselinux: Cached security context not accurate
libselinux: Cached security context not accurate
- - -
-
-
-
2022-01-21
Johannes Segitz
Changes Requested
[RFC,v2,2/2] selinux: try to use preparsed sid before calling parse_sid()
selinux: parse sids earlier to avoid doing memory allocations under spinlock
- - -
-
-
-
2022-01-20
Scott Mayhew
pcmoore
Changes Requested
[RFC,v2,1/2] selinux: Fix selinux_sb_mnt_opts_compat()
selinux: parse sids earlier to avoid doing memory allocations under spinlock
- - -
-
-
-
2022-01-20
Scott Mayhew
pcmoore
Changes Requested
[4/4,v2] libsepol/cil: Limit the amount of reporting for context rule conflicts
libsepol/cil: Limit certain error and warning reports
- - -
-
-
-
2022-01-19
James Carter
Accepted
[3/4,v2] libsepol/cil: Limit the neverallow violations reported
libsepol/cil: Limit certain error and warning reports
- - -
-
-
-
2022-01-19
James Carter
Accepted
[2/4,v2] libsepol/cil: Provide more control over reporting bounds failures
libsepol/cil: Limit certain error and warning reports
- - -
-
-
-
2022-01-19
James Carter
Accepted
[1/4,v2] libsepol/cil: Add cil_get_log_level() function
libsepol/cil: Limit certain error and warning reports
- - -
-
-
-
2022-01-19
James Carter
Accepted
libsepol: drop trailing newlines in log messages
libsepol: drop trailing newlines in log messages
1 - -
-
-
-
2022-01-19
Christian Göttsche
Accepted
libsepol: return failure on saturated class name length
libsepol: return failure on saturated class name length
1 - -
-
-
-
2022-01-19
Christian Göttsche
Accepted
[RFC] selinux: Fix selinux_sb_mnt_opts_compat()
[RFC] selinux: Fix selinux_sb_mnt_opts_compat()
- - -
-
-
-
2022-01-18
Scott Mayhew
pcmoore
Superseded
libsepol: reject invalid roles before inverting
libsepol: reject invalid roles before inverting
- - -
-
-
-
2022-01-17
Christian Göttsche
Changes Requested
selinux: check the return value of audit_log_start()
selinux: check the return value of audit_log_start()
- - -
-
-
-
2022-01-15
Xiaoke Wang
pcmoore
Rejected
[2/2] libsepol/cil: Limit the amount of reporting for context rule conflicts
[1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- - -
-
-
-
2022-01-14
James Carter
Superseded
[1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
[1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- - -
-
-
-
2022-01-14
James Carter
Superseded
libselinux: Strip spaces before values in config
libselinux: Strip spaces before values in config
- - -
-
-
-
2022-01-13
Vit Mojzis
Superseded
libsepol/cil: Ensure that the class in a classcommon is a kernel class
libsepol/cil: Ensure that the class in a classcommon is a kernel class
- - -
-
-
-
2022-01-13
James Carter
Accepted
[RFC,userspace,5/5] semodule: add command-line option to detect module changes
Allow rebuilding policy store only if there were external changes to modules
- - -
-
-
-
2022-01-13
Ondrej Mosnacek
Superseded
[RFC,userspace,4/5] libsemanage: optionally rebuild policy when modules are changed externally
Allow rebuilding policy store only if there were external changes to modules
- - -
-
-
-
2022-01-13
Ondrej Mosnacek
Superseded
[RFC,userspace,3/5] libsemanage: move compressed file handling into a separate object
Allow rebuilding policy store only if there were external changes to modules
- - -
-
-
-
2022-01-13
Ondrej Mosnacek
Superseded
[RFC,userspace,2/5] semodule,libsemanage: move module hashing into libsemanage
Allow rebuilding policy store only if there were external changes to modules
- - -
-
-
-
2022-01-13
Ondrej Mosnacek
Superseded
[RFC,userspace,1/5] libsemanage: add missing include to boolean_record.c
Allow rebuilding policy store only if there were external changes to modules
- - -
-
-
-
2022-01-13
Ondrej Mosnacek
Superseded
[testsuite] tests/binder: Build only for 4.11 and later kernels
[testsuite] tests/binder: Build only for 4.11 and later kernels
- - -
-
-
-
2022-01-13
Gong Ruiqi
omos
Changes Requested
[16/16,v2] libsepol: Fix two problems with neverallowxperm reporting
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[15/16,v2] libsepol: Set args avtab pointer when reporting assertion violations
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[14/16,v2] libsepol: The src and tgt must be the same if neverallow uses self
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[13/16,v2] libsepol: Make return value clearer when reporting neverallowx errors
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[12/16,v2] libsepol: Refactor match_any_class_permissions() to be clearer
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[11/16,v2] libsepol: Make use of previously created ebitmap when checking self
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[10/16,v2] libsepol: Move assigning outer loop index out of inner loop
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[09/16,v2] libsepol: Remove unnessesary check for matching class
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[08/16,v2] libsepol: Use (rc < 0) instead of (rc) when calling ebitmap functions
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[07/16,v2] libsepol: Create function check_assertion_self_match() and use it
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[06/16,v2] libsepol: Move check of target types to before check for self
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[05/16,v2] libsepol: Use consistent return checking style
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[04/16,v2] libsepol: Check for error from check_assertion_extended_permissions()
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[03/16,v2] libsepol: Remove uneeded error messages in assertion checking
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[02/16,v2] libsepol: Change label in check_assertion_avtab_match()
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[01/16,v2] libsepol: Return an error if check_assertion() returns an error.
Refactor and fix assertion checking
- - -
-
-
-
2022-01-11
James Carter
Accepted
[GIT,PULL] SELinux patches for v5.17
[GIT,PULL] SELinux patches for v5.17
- - -
-
-
-
2022-01-10
Paul Moore
pcmoore
Accepted
policycoreutils: Improve error message when selabel_open fails
policycoreutils: Improve error message when selabel_open fails
1 - -
-
-
-
2022-01-10
Vit Mojzis
Accepted
libsepol: check for saturated class name length
libsepol: check for saturated class name length
1 - -
-
-
-
2022-01-06
Christian Göttsche
Accepted
[v2] libsepol: handle type gaps
[v2] libsepol: handle type gaps
- - -
-
-
-
2022-01-06
Christian Göttsche
Superseded
[3/3] libsepol/cil: Do not resolve names to declarations in abstract blocks
[1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- - -
-
-
-
2022-01-05
James Carter
Accepted
[2/3] libsepol/cil: Mark as abstract all sub-blocks of an abstract block
[1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- - -
-
-
-
2022-01-05
James Carter
Accepted
[1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
[1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- - -
-
-
-
2022-01-05
James Carter
Accepted
[GIT,PULL] SELinux fixes for v5.16 (#4)
[GIT,PULL] SELinux fixes for v5.16 (#4)
- - -
-
-
-
2021-12-28
Paul Moore
pcmoore
Accepted
selinux: initialize proto variable in selinux_ip_postroute_compat()
selinux: initialize proto variable in selinux_ip_postroute_compat()
- - -
-
-
-
2021-12-24
Tom Rix
pcmoore
Accepted
libsepol: handle type gaps when optimizing
libsepol: handle type gaps when optimizing
- - -
-
-
-
2021-12-23
Christian Göttsche
Superseded
[v2] libsepol: check for valid sensitivity before lookup
[v2] libsepol: check for valid sensitivity before lookup
1 - -
-
-
-
2021-12-23
Christian Göttsche
Accepted
libsepol: check for valid sensitivity before lookup
libsepol: check for valid sensitivity before lookup
- - -
-
-
-
2021-12-23
Christian Göttsche
Superseded
«
1
2
...
25
26
27
…
92
93
»