Show patches with: Archived = No       |   9247 patches
« 1 2 ... 89 90 9192 93 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
libsepol: rewrite sepol_string_to_security_class to use hashtab_search - - - --- 2016-06-20 Stephen Smalley Not Applicable
[2/2] libselinux: man: Clarify is_selinux_mls_enabled() description - - - --- 2016-06-20 Petr Lautrbach Not Applicable
[1/2] libselinux: man: Explain how to free policy type from selinux_getpolicytype() - - - --- 2016-06-20 Petr Lautrbach Not Applicable
libselinux: compare absolute pathname in matchpathcon -V - - - --- 2016-06-20 Petr Lautrbach Not Applicable
[v4,19/19] netlabel: Implement CALIPSO config functions for SMACK. - - - --- 2016-06-20 Huw Davies Accepted
[v4,18/19] calipso: Add a label cache. - - - --- 2016-06-20 Huw Davies Accepted
[v4,17/19] calipso: Add validation of CALIPSO option. - - - --- 2016-06-20 Huw Davies Accepted
[v4,16/19] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - --- 2016-06-20 Huw Davies Accepted
[v4,15/19] calipso: Allow the lsm to label the skbuff directly. - - - --- 2016-06-20 Huw Davies Accepted
[v4,14/19] ipv6: constify the skb pointer of ipv6_find_tlv(). - - - --- 2016-06-20 Huw Davies Accepted
[v4,13/19] calipso: Allow request sockets to be relabelled by the lsm. - - - --- 2016-06-20 Huw Davies Accepted
[v4,12/19] ipv6: Allow request socks to contain IPv6 options. - - - --- 2016-06-20 Huw Davies Accepted
[v4,11/19] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - --- 2016-06-20 Huw Davies Accepted
[v4,10/19] calipso: Set the calipso socket label to match the secattr. - - - --- 2016-06-20 Huw Davies Accepted
[v4,09/19] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - --- 2016-06-20 Huw Davies Accepted
[v4,08/19] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - --- 2016-06-20 Huw Davies Accepted
[v4,07/19] netlabel: Add support for removing a CALIPSO DOI. - - - --- 2016-06-20 Huw Davies Accepted
[v4,06/19] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - --- 2016-06-20 Huw Davies Accepted
[v4,05/19] netlabel: Add support for enumerating the CALIPSO DOI list. - - - --- 2016-06-20 Huw Davies Accepted
[v4,04/19] netlabel: Add support for querying a CALIPSO DOI. - - - --- 2016-06-20 Huw Davies Accepted
[v4,03/19] netlabel: Initial support for the CALIPSO netlink protocol. - - - --- 2016-06-20 Huw Davies Accepted
[v4,02/19] netlabel: Add an address family to domain hash entries. - - - --- 2016-06-20 Huw Davies Accepted
[v4,01/19] netlabel: Mark rcu pointers with __rcu. - - - --- 2016-06-20 Huw Davies Accepted
checkpolicy: Fix typos in test/dispol - - - --- 2016-06-20 Petr Lautrbach Not Applicable
libselinux: add selinux_snapperd_contexts_path() - - - --- 2016-06-20 Petr Lautrbach Not Applicable
[V2,3/3] policycoreutils: setfiles - Modify to use selinux_restorecon - - - --- 2016-06-19 Richard Haines Not Applicable
[V2,2/3] libselinux: Add setfiles support to selinux_restorecon(3) - - - --- 2016-06-19 Richard Haines Not Applicable
[V2,1/3] libselinux: Evaluate inodes in selinux_restorecon(3) - - - --- 2016-06-19 Richard Haines Not Applicable
netlabel: handle sparse category maps in netlbl_catmap_getlong() - - - --- 2016-06-13 Paul Moore Accepted
selinux: import NetLabel category bitmaps correctly - - - --- 2016-06-13 Paul Moore Accepted
[1/1] selinuxfs: fix type mismatch - - - --- 2016-06-10 Heinrich Schuchardt Accepted
iucv: properly clone LSM attributes to newly created child sockets - - - --- 2016-06-09 Paul Moore Accepted
[04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps 1 - - --- 2016-06-09 Deepa Dinamani Deferred
netlabel: add address family checks to netlbl_{sock, req}_delattr() - - - --- 2016-06-06 Paul Moore Accepted
Correctly detect unknown classes in sepol_string_to_security_class - - - --- 2016-06-03 Joshua Brindle Not Applicable
[2/2] Correctly detect unknown classes in sepol_string_to_security_class - - - --- 2016-06-03 Joshua Brindle Not Applicable
[1/2] Modify audit2why analyze function to use loaded policy - - - --- 2016-06-03 Joshua Brindle Not Applicable
Modify audit2why analyze function to use loaded policy - - - --- 2016-06-03 Joshua Brindle Not Applicable
Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing") - - 2 --- 2016-06-02 Eric Dumazet Accepted
Sort object files for deterministic linking order - - - --- 2016-06-02 Laurent Bigonville Not Applicable
LSM: Reorder security_capset to do access checks properly - - - --- 2016-06-01 Casey Schaufler Rejected
Possible problem with e6afc8ac ("udp: remove headers from UDP packets before queueing") - - 2 --- 2016-06-01 Eric Dumazet Superseded
[RFC,2/2] overlayfs: Make getxattr work with inode only - - - --- 2016-05-30 Andreas Gruenbacher Not Applicable
[RFC,1/2] selinux: Stop looking up dentries from inodes - - - --- 2016-05-30 Andreas Gruenbacher Not Applicable
policycoreutils: fix typos in semanage manpages - - - --- 2016-05-27 Philipp Gesang Not Applicable
policycoreutils/semodule: Fix the documentation of -l,--list - - - --- 2016-05-24 Petr Lautrbach Not Applicable
[v4] selinux: Only apply bounds checking to source types - - - --- 2016-05-23 Stephen Smalley Accepted
Fix neverallowxperm checking on attributes - - - --- 2016-05-18 Jeffrey Vander Stoep Not Applicable
semodule: Fix the --list-modules=full example in the manpage - - - --- 2016-05-17 Laurent Bigonville Not Applicable
[v2] policycoreutils: Minor fix in a French translation - - - --- 2016-05-17 Laurent Bigonville Not Applicable
policycoreutils: Minor fix for in a French translation - - - --- 2016-05-17 Laurent Bigonville Not Applicable
checkpolicy: set flex as default lexer - - - --- 2016-05-16 Julien Pivotto Not Applicable
checkpolicy: Fix checkmodule output message - - - --- 2016-05-16 Petr Lautrbach Not Applicable
policycoreutils: fix the extract example in semodule.8 - - - --- 2016-05-16 Petr Lautrbach Not Applicable
Avoid mounting /proc outside of selinux_init_load_policy(). - - - --- 2016-05-13 Stephen Smalley Not Applicable
setools3: Allow to override PKG_CONFIG - - - --- 2016-05-12 Julien Pivotto Not Applicable
libqpol: Make Makefile AR overwritable - - - --- 2016-05-12 Julien Pivotto Not Applicable
libsemanage: Support overriding Makefile RANLIB - - - --- 2016-05-12 Julien Pivotto Not Applicable
[3/3] policycoreutils: setfiles - Modify to use selinux_restorecon - - - --- 2016-05-10 Richard Haines Not Applicable
[2/3] libselinux: Add setfiles support to selinux_restorecon(3) - - - --- 2016-05-10 Richard Haines Not Applicable
[1/3] libselinux: Evaluate inodes in selinux_restorecon(3) - - - --- 2016-05-10 Richard Haines Not Applicable
policycoreutils: fix the extract example in semodule.8 - - - --- 2016-05-10 Petr Lautrbach Not Applicable
policycoreutils: update sandbox.8 man page - - - --- 2016-05-10 Petr Lautrbach Not Applicable
policycoreutils: remove typos from chcat --help - - - --- 2016-05-10 Petr Lautrbach Not Applicable
libselinux, libsemanage: respect CC and PKG_CONFIG environment variable - - - --- 2016-05-08 Julien Pivotto Not Applicable
libsepol: Change which attributes CIL keeps in the binary policy - - - --- 2016-05-06 James Carter Not Applicable
[6/6,v3] libsepol: When generating CIL use HLL line mark for neverallows - - - --- 2016-05-05 James Carter Not Applicable
[5/6,v3] libsepol/cil: Remove path field from cil_tree_node struct - - - --- 2016-05-05 James Carter Not Applicable
[4/6,v3] libsepol/cil: Replace cil_log() calls with cil_tree_log() - - - --- 2016-05-05 James Carter Not Applicable
[3/6,v3] libsepol/cil: Add cil_tree_log() and supporting functions - - - --- 2016-05-05 James Carter Not Applicable
[2/6,v3] libsepol/cil: Store CIL filename in parse tree and AST - - - --- 2016-05-05 James Carter Not Applicable
[1/6,v3] libsepol/cil: Add high-level language line marking support - - - --- 2016-05-05 James Carter Not Applicable
[3/3] libsepol: remove libsepol.map when cleaning - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[2/3] sepolgen: remove additional files when cleaning - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[1/3] Update .gitignore files - - - --- 2016-05-05 Nicolas Iooss Not Applicable
[6/6,v2] libsepol: When generating CIL use HLL line mark for neverallows - - - --- 2016-05-04 James Carter Not Applicable
[5/6,v2] libsepol/cil: Remove path field from cil_tree_node struct - - - --- 2016-05-04 James Carter Not Applicable
[4/6,v2] libsepol/cil: Replace cil_log() calls with cil_tree_log() - - - --- 2016-05-04 James Carter Not Applicable
[3/6,v2] libsepol/cil: Add cil_tree_log() and supporting functions - - - --- 2016-05-04 James Carter Not Applicable
[2/6,v2] libsepol/cil: Store CIL filename in parse tree and AST - - - --- 2016-05-04 James Carter Not Applicable
[1/6,v2] libsepol/cil: Add high-level language line marking support - - - --- 2016-05-04 James Carter Not Applicable
libsepol: Change logic of bounds checking - - - --- 2016-05-03 James Carter Not Applicable
[v3] selinux: Only apply bounds checking to source types - - - --- 2016-05-03 Stephen Smalley Superseded
libsepol, checkpolicy, secilc: Replace #ifdef DARWIN with __APPLE__. - - - --- 2016-05-03 Stephen Smalley Not Applicable
Fix multiple spelling errors - - - --- 2016-05-01 Laurent Bigonville Not Applicable
[v4,7/7] genhomedircon: fix FALLBACK_NAME regex - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,6/7] genhomedircon: write contexts for username and userid - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,5/7] genhomedircon: make USERID, USERNAME context lists - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,4/7] genhomedircon: Add uid and gid to struct user_entry - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,3/7] genhomedircon: move fallback user to genhomedircon_user_entry_t - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,2/7] genhomedircon: rename FALLBACK #defines consistent with user struct - - - --- 2016-04-30 Jason Zaman Not Applicable
[v4,1/7] genhomedircon: factor out common replacement code - - - --- 2016-04-30 Jason Zaman Not Applicable
libsepol: Only apply bounds checking to source types in rules - - - --- 2016-04-29 James Carter Not Applicable
libsepol/cil: Do not add an attribute as a type in the attr_type_map - - - --- 2016-04-29 James Carter Not Applicable
[v2] selinux: Only apply bounds checking to source types - - - --- 2016-04-29 Stephen Smalley Superseded
[v3,5/8] genhomedircon: Add uid and gid to struct user_entry - - - --- 2016-04-29 Jason Zaman Superseded
selinux: Only apply bounds checking to source types - - - --- 2016-04-28 Stephen Smalley Superseded
[2/2] libsepol: fix type bounds checking for attributes - - - --- 2016-04-28 Stephen Smalley Not Applicable
[1/2] libsepol: Only apply bounds checking to source types in rules - - - --- 2016-04-28 Stephen Smalley Not Applicable
selinux: Build policy on systems not supporting DCCP protocol - - - --- 2016-04-24 Richard Haines Accepted
« 1 2 ... 89 90 9192 93 »