Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 9263 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
87
88
89
…
92
93
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[2/3] libsemanage/tests: do not force using gcc
- - -
-
-
-
2016-09-25
Nicolas Iooss
Not Applicable
[1/3] libselinux: silent -Wsign-compare warnings
- - -
-
-
-
2016-09-25
Nicolas Iooss
Not Applicable
libselinux: drop unused stdio_ext.h header file
- - -
-
-
-
2016-09-24
Roberts, William C
Not Applicable
[3/3] libsepol: fix unitialized variable 'nread' on mac build
- - -
-
-
-
2016-09-23
Roberts, William C
Not Applicable
[2/3] libsepol: fix unused variable 'len' on mac build
- - -
-
-
-
2016-09-23
Roberts, William C
Not Applicable
[1/3] libsepol: fix unused variable 'size' on mac build
- - -
-
-
-
2016-09-23
Roberts, William C
Not Applicable
libselinux: kill logging check for selinux_enabled()
- - -
-
-
-
2016-09-23
Roberts, William C
Not Applicable
libselinux: drop usage of _D_ALLOC_NAMLEN
- - -
-
-
-
2016-09-23
Roberts, William C
Not Applicable
[2/2] sandbox: create a new session for sandboxed processes
- - -
-
-
-
2016-09-23
Petr Lautrbach
Not Applicable
[1/2] sandbox: do not try setup directories without -X or -M
- - -
-
-
-
2016-09-23
Petr Lautrbach
Not Applicable
[1/1] genhomedircon: support policies using RBACSEP
- - -
-
-
-
2016-09-23
Gary Tierney
Not Applicable
libsemanage: use pp module headers as a source for a module name
- - -
-
-
-
2016-09-23
Petr Lautrbach
Not Applicable
[v2,7/7] sepolicy: update setup.py to remove C module
- - -
-
-
-
2016-09-23
Jason Zaman
Not Applicable
[2/2] Add libsepol and secil host and device targets
- - -
-
-
-
2016-09-22
Bowgo Tsai
Not Applicable
[1/2] libsepol, checkpolicy: Update Android.mk
- - -
-
-
-
2016-09-22
Bowgo Tsai
Not Applicable
[7/7] sepolicy: update setup.py to remove C module
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[6/7] sepolicy: make search() use setools4 api
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[5/7] sepolicy: make info() use setools4 api
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[4/7] sepolicy: info() and search() will return generators
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[3/7] sepolicy: update some users of search() to use setools directly
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[2/7] sepolicy: initialize setools4
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
[1/7] sepolicy: rearrange vars together at the top
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
libselinux: Add openrc_contexts functions
- - -
-
-
-
2016-09-22
Jason Zaman
Not Applicable
Fix redefinition of XATTR_NAME_SELINUX
- - -
-
-
-
2016-09-21
Roberts, William C
Not Applicable
[v2,1/1] genhomedircon: remove hardcoded refpolicy strings
- - -
-
-
-
2016-09-21
Gary Tierney
Not Applicable
sandbox: do not run xmodmap in a new X session
- - -
-
-
-
2016-09-21
Petr Lautrbach
Not Applicable
sandox -X not working with recent Xephyr
- - -
-
-
-
2016-09-20
Petr Lautrbach
Not Applicable
[RFC] mmap file_contexts and property_contexts:
- - -
-
-
-
2016-09-19
Roberts, William C
Not Applicable
sandox -X not working with recent Xephyr
- - -
-
-
-
2016-09-19
Petr Lautrbach
Not Applicable
[v2] sandbox: Use GObject introspection binding instead of pygtk2
- - -
-
-
-
2016-09-19
Laurent Bigonville
Not Applicable
sandbox: Use dbus-launch instead of dbus-run-session
- - -
-
-
-
2016-09-18
Laurent Bigonville
Not Applicable
sandbox: Use GObject introspection binding instead of pygtk2
- - -
-
-
-
2016-09-18
Laurent Bigonville
Not Applicable
[v5] libselinux: correct error path to always try text
- - -
-
-
-
2016-09-16
Roberts, William C
Not Applicable
[v4] libselinux: correct error path to always try text
- - -
-
-
-
2016-09-16
Roberts, William C
Not Applicable
sefcontext_compile: cleanup confusing usage message
- - -
-
-
-
2016-09-16
Janis Danisevskis
Not Applicable
Change semantic of -r in sefcontext_compile
- - -
-
-
-
2016-09-16
Janis Danisevskis
Not Applicable
[v3] libselinux: correct error path to always try text
- - -
-
-
-
2016-09-15
Roberts, William C
Not Applicable
[v2] libselinux: correct error path to always try text
- - -
-
-
-
2016-09-15
Roberts, William C
Not Applicable
libselinux: correct error path to always try text
- - -
-
-
-
2016-09-15
Roberts, William C
Not Applicable
libselinux: add support for pcre2
- - -
-
-
-
2016-09-15
Stephen Smalley
Not Applicable
libselinux: add support for pcre2
- - -
-
-
-
2016-09-15
Janis Danisevskis
Not Applicable
[3/3] sandbox: fix file labels on copied files
- - -
-
-
-
2016-09-15
Petr Lautrbach
Not Applicable
[2/3] sandbox: tests - close stdout of p1
- - -
-
-
-
2016-09-15
Petr Lautrbach
Not Applicable
[1/3] sandbox: tests - use sandbox from cwd
- - -
-
-
-
2016-09-15
Petr Lautrbach
Not Applicable
libselinux: add support for pcre2
- - -
-
-
-
2016-09-15
Janis Danisevskis
Not Applicable
selinux-testsuite: fix file/test failure
- - -
-
-
-
2016-09-13
Stephen Smalley
Not Applicable
[-next] SELinux: fix error return code in policydb_read()
- - -
-
-
-
2016-09-10
Wei Yongjun
Accepted
[v3] libselinux: clean up process file
- - -
-
-
-
2016-09-09
Roberts, William C
Not Applicable
[5/5] libsepol: cil: Add cil_constraint_expr_to_policy()
- - -
-
-
-
2016-09-08
Daniel Cashman
Not Applicable
[4/5] libsepol: cil: Fix CIL_OP data assignment.
- - -
-
-
-
2016-09-08
Daniel Cashman
Not Applicable
[3/5] libsepol: cil: Replace sensitivityorder statement.
- - -
-
-
-
2016-09-08
Daniel Cashman
Not Applicable
[2/5] libsepol: cil: Remove duplicate sid policy declaration.
- - -
-
-
-
2016-09-08
Daniel Cashman
Not Applicable
[1/5] libsepol: cil: Add userrole mapping to cil_gen_policy().
- - -
-
-
-
2016-09-08
Daniel Cashman
Not Applicable
libselinux: add support for pcre2
- - -
-
-
-
2016-09-08
Janis Danisevskis
Not Applicable
[2/2] libselinux: fix memory leak on pcre2
- - -
-
-
-
2016-09-07
Janis Danisevskis
Not Applicable
[1/2] libselinux: add support for pcre2
- - -
-
-
-
2016-09-07
Janis Danisevskis
Not Applicable
[v2] libselinux: clean up process file
- - -
-
-
-
2016-09-07
Roberts, William C
Not Applicable
libselinux: clean up process file
- - -
-
-
-
2016-09-06
Roberts, William C
Not Applicable
genhomedircon: remove hardcoded refpolicy strings
- - -
-
-
-
2016-09-06
Gary Tierney
Not Applicable
[RFC] nodups_specs: speedup
- - -
-
-
-
2016-08-31
Roberts, William C
Not Applicable
audit: consistently record PIDs with task_tgid_nr()
- - -
-
-
-
2016-08-30
Paul Moore
Accepted
[v2] selinux: fix overflow and 0 length allocations
- - -
-
-
-
2016-08-30
Roberts, William C
Accepted
[RFC] nodups_specs: speedup
- - -
-
-
-
2016-08-29
Roberts, William C
Not Applicable
libsepol: Produce more meaningful error messages for conflicting type rules
- - -
-
-
-
2016-08-27
Guido Trentalancia
Not Applicable
[3/3] libsepol: make "make test" fails when a CUnit test fails
- - -
-
-
-
2016-08-27
Nicolas Iooss
Not Applicable
[2/3] libsepol: tests: fix g_b_role_2 test
- - -
-
-
-
2016-08-27
Nicolas Iooss
Not Applicable
[1/3] checkpolicy: add types associated to a role in the current scope when parsing
- - -
-
-
-
2016-08-27
Nicolas Iooss
Not Applicable
libselinux: clean up process file
- - -
-
-
-
2016-08-26
Roberts, William C
Not Applicable
[v5] Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-26
Guido Trentalancia
Not Applicable
[v4] Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-26
Guido Trentalancia
Not Applicable
[v3] Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-26
Guido Trentalancia
Not Applicable
[v2] Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-24
Guido Trentalancia
Not Applicable
[v2] Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-24
Guido Trentalancia
Not Applicable
[2/2] policycoreutils: setfiles - Add option to ignore restorecon_last
- - -
-
-
-
2016-08-24
Richard Haines
Not Applicable
[1/2] libselinux: Ignore restorecon_last in selinux_restorecon(3)
- - -
-
-
-
2016-08-24
Richard Haines
Not Applicable
Build the SELinux testsuite on systems using the Reference Policy
- - -
-
-
-
2016-08-24
Guido Trentalancia
Not Applicable
[v5] Classify AF_ALG sockets
- - -
-
-
-
2016-08-23
Guido Trentalancia
Not Applicable
[3/3] selinux: fix overflow and 0 length allocations
- - -
-
-
-
2016-08-23
Roberts, William C
Changes Requested
[2/3] selinux: initialize structures
- - -
-
-
-
2016-08-23
Roberts, William C
Accepted
[1/3] selinux: detect invalid ebitmap
- - -
-
-
-
2016-08-23
Roberts, William C
Accepted
Update libsepol to support the policy capability for AF_ALG sockets
- - -
-
-
-
2016-08-23
Guido Trentalancia
Not Applicable
[v5] Classify AF_ALG sockets
- - -
-
-
-
2016-08-23
Guido Trentalancia
Changes Requested
[v4] Classify AF_ALG sockets
- - -
-
-
-
2016-08-22
Guido Trentalancia
Superseded
[v3,2/2] genhomedircon: add support for %group syntax
- - -
-
-
-
2016-08-22
Gary Tierney
Not Applicable
[v3,1/2] genhomedircon: generate contexts for logins mapped to the default user
- - -
-
-
-
2016-08-22
Gary Tierney
Not Applicable
[2/2] genhomedircon: add support for %group syntax
- - -
-
-
-
2016-08-22
Gary Tierney
Not Applicable
[1/2] genhomedircon: generate contexts for logins mapped to the default user
- - -
-
-
-
2016-08-22
Gary Tierney
Not Applicable
[v3] Classify AF_ALG sockets (was: Differentiate between Unix Stream Socket and Sequential Packet S…
- - -
-
-
-
2016-08-22
Guido Trentalancia
Superseded
[v2] Differentiate between Unix Stream Socket and Sequential Packet Socket
- - -
-
-
-
2016-08-21
Guido Trentalancia
Superseded
Differentiate between Unix Stream Socket and Sequential Packet Socket
- - -
-
-
-
2016-08-20
Guido Trentalancia
Superseded
[v2,2/2] libsepol: port str_read from kernel
- - -
-
-
-
2016-08-19
Roberts, William C
Not Applicable
[v2,1/2] libsepol: calloc all the *_to_val_structs
- - -
-
-
-
2016-08-19
Roberts, William C
Not Applicable
libsepol: Change which attributes CIL keeps in the binary policy
- - -
-
-
-
2016-08-19
James Carter
Not Applicable
[3/3] audit2allow: tests should use local copy not system
- - -
-
-
-
2016-08-19
Jason Zaman
Not Applicable
[2/3] audit2allow: fix audit2why import from seobject.
- - -
-
-
-
2016-08-19
Jason Zaman
Not Applicable
[1/3] audit2allow: remove audit2why so it gets symlinked
- - -
-
-
-
2016-08-19
Jason Zaman
Not Applicable
[2/2] libsepol: port str_read from kernel
- - -
-
-
-
2016-08-18
Roberts, William C
Not Applicable
[1/2] libsepol: calloc all the *_to_val_structs
- - -
-
-
-
2016-08-18
Roberts, William C
Not Applicable
semanage: Fix semanage fcontext -D
- - -
-
-
-
2016-08-18
Stephen Smalley
Not Applicable
semanage: fix error message for fcontext -m
- - -
-
-
-
2016-08-18
Miroslav Vadkerti
Not Applicable
«
1
2
...
87
88
89
…
92
93
»