Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
James Carter
| Archived =
No
| 115 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
libsepol: Create the macro ebitmap_is_empty() and use it where needed
libsepol: Create the macro ebitmap_is_empty() and use it where needed
- - -
-
-
-
2020-02-19
James Carter
Changes Requested
libsepol: Use ebitmap_length() to check for an empty ebitmap
libsepol: Use ebitmap_length() to check for an empty ebitmap
- - -
-
-
-
2020-02-18
James Carter
Superseded
libsepol/cil: Rewrite verification of map classes and classpermissionsets
libsepol/cil: Rewrite verification of map classes and classpermissionsets
1 - -
-
-
-
2020-01-31
James Carter
Accepted
libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
libsepol/cil: Fix bug in cil_copy_avrule() in extended permission handling
1 - -
-
-
-
2020-01-23
James Carter
Accepted
libsepol/cil: Report disabling an optional block only at high verbose levels
libsepol/cil: Report disabling an optional block only at high verbose levels
1 - -
-
-
-
2019-11-01
James Carter
Accepted
libsepol: Further improve binary policy optimization
libsepol: Further improve binary policy optimization
- 1 -
-
-
-
2019-09-26
James Carter
Accepted
libsepol: Remove cil_mem_error_handler() function pointer
libsepol: Remove cil_mem_error_handler() function pointer
- - -
-
-
-
2019-09-13
James Carter
Accepted
libsepol: Make an unknown permission an error in CIL
libsepol: Make an unknown permission an error in CIL
- - -
-
-
-
2019-09-12
James Carter
Accepted
checkpolicy: Add option to optimize policydb when writing kernel policy
checkpolicy: Add option to optimize policydb when writing kernel policy
- - -
-
-
-
2019-05-24
James Carter
Superseded
libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
libsepol: Fix RESOURCE_LEAK defects reported by coverity scan
1 - -
-
-
-
2019-02-01
James Carter
Accepted
[4/4] libsepol: Add two new Xen initial SIDs
libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[3/4] libsepol: Check that initial sid indexes are within the valid range
libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[2/4] libsepol: Eliminate initial sid string definitions in module_to_cil.c
libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[1/4] libsepol: Rename kernel_to_common.c stack functions
libsepol: Cleanup initial sid handling when writing CIL and policy.conf files
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[2/2] checkpolicy: Add option to sort ocontexts when creating a binary policy
libsepol: Add ability to sort ocontexts in libsepol and add option to use it in checkpolicy
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[1/2] libsepol: Create policydb_sort_ocontexts()
libsepol: Add ability to sort ocontexts in libsepol and add option to use it in checkpolicy
- - -
-
-
-
2018-10-11
James Carter
Not Applicable
[1/1] libsepol/cil: Improve processing of context rules
1 - -
-
-
-
2018-03-29
James Carter
Not Applicable
libsepol: Prevent freeing unitialized value in ibendport handling
1 - -
-
-
-
2018-03-07
James Carter
Not Applicable
libsepol/cil: Create new keep field for type attribute sets
- - -
-
-
-
2017-11-17
James Carter
Not Applicable
libsepol/cil: Keep attributes used by generated attributes in neverallow rules
- - -
-
-
-
2017-08-30
James Carter
Not Applicable
Fixed bad reference in roleattribute
- - -
-
-
-
2017-08-17
James Carter
Not Applicable
[v2] libsepol/cil: Fix bugs when writing policy.conf rules
- - -
-
-
-
2017-06-14
James Carter
Not Applicable
libsepol/cil: Fix bugs when writing policy.conf rules
- - -
-
-
-
2017-06-14
James Carter
Not Applicable
[v2] libsepol: Fix neverallow bug when checking conditional policy
- - -
-
-
-
2017-06-12
James Carter
Not Applicable
libsepol: Fix neverallow bug when checking conditional policy
- - -
-
-
-
2017-06-09
James Carter
Not Applicable
[2/2,v2] libsepol: Fix module_to_cil's handling of type aliases
- - -
-
-
-
2017-05-31
James Carter
Not Applicable
[1/2,v2] libsepol: Clean up scope handling
- - -
-
-
-
2017-05-31
James Carter
Not Applicable
[2/2] libsepol: Fix module_to_cil's handling of type aliases
- - -
-
-
-
2017-05-30
James Carter
Not Applicable
[1/2] libsepol: Clean up scope handling
- - -
-
-
-
2017-05-30
James Carter
Not Applicable
[v2] libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- - -
-
-
-
2017-05-10
James Carter
Not Applicable
libsepol: Expand attributes with TYPE_FLAGS_EXPAND_ATTR_TRUE set
- - -
-
-
-
2017-05-09
James Carter
Not Applicable
[2/2,v2] secilc: Add options to control the expansion of attributes
- - -
-
-
-
2017-04-12
James Carter
Not Applicable
[1/2,v2] libsepol/cil: Add ability to expand some attributes in binary policy
- - -
-
-
-
2017-04-12
James Carter
Not Applicable
[2/2] secilc: Add options to control the expansion of attributes
- - -
-
-
-
2017-04-11
James Carter
Not Applicable
[1/2] libsepol/cil: Add ability to expand some attributes in binary policy
- - -
-
-
-
2017-04-11
James Carter
Not Applicable
[v2] libsepol: In module_to_cil create one attribute for each unique set
- - -
-
-
-
2017-03-29
James Carter
Not Applicable
libsepol: In module_to_cil create one attribute for each unique set
- - -
-
-
-
2017-03-28
James Carter
Not Applicable
[3/3,v3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- - -
-
-
-
2017-03-23
James Carter
Not Applicable
[2/3,v3] libsepol: Add ability to convert binary policy to policy.conf file
- - -
-
-
-
2017-03-23
James Carter
Not Applicable
[1/3,v3] libsepol: Add ability to convert binary policy to CIL
- - -
-
-
-
2017-03-23
James Carter
Not Applicable
libsepol/cil: Add hexadecimal support for Xen ioportcon statements
- - -
-
-
-
2017-03-22
James Carter
Not Applicable
[3/3,v2] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[2/3,v2] libsepol: Add ability to convert binary policy to policy.conf file
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[1/3,v2] libsepol: Add ability to convert binary policy to CIL
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[3/3] libsepol/cil: Use hexadecimal numbers when writing Xen rules
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[2/3] libsepol: Update module_to_cil to output hexadecimal for Xen rules
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[1/3] libsepol/cil: Allow hexadecimal numbers in Xen context rules
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
checkpolicy: Fix minor memory leak in checkpolicy
- - -
-
-
-
2017-03-20
James Carter
Not Applicable
[3/3] checkpolicy: Add options to convert binary policy to CIL or a policy.conf
- - -
-
-
-
2017-03-10
James Carter
Not Applicable
[2/3] libsepol: Add ability to convert binary policy to policy.conf file
- - -
-
-
-
2017-03-10
James Carter
Not Applicable
[1/3] libsepol: Add ability to convert binary policy to CIL
- - -
-
-
-
2017-03-10
James Carter
Not Applicable
libsepol/cil: Destroy cil_tree_node stacks when finished resolving AST
- - -
-
-
-
2017-02-08
James Carter
Not Applicable
[3/8] policycoreutils/semodule: hide -Wwrite-strings warnings
- - -
-
-
-
2017-02-06
James Carter
Not Applicable
[2/2] checkpolicy: Remove uneeded return check in require_symbol()
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[1/2] libsepol: Return +1 when declaration is followed by a require
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
checkpolicy: Improve check for identifier flavor mismatch
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[5/5] checkpolicy: Move common require and declare code into new function
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[4/5] checkpolicy: Cleanup error messages
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[3/5] checkpolicy: Create common function for user declares and requires
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[2/5] checkpolicy: Create common function for role declares and requires
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
[1/5] checkpolicy: Create common function for type declares and requires
- - -
-
-
-
2017-01-31
James Carter
Not Applicable
checkpolicy: Fix bug in handling type declaration in optional block.
- - -
-
-
-
2017-01-18
James Carter
Not Applicable
libsepol: Fix neverallow checking to also check the other types when self is included in a target t…
- - -
-
-
-
2016-11-29
James Carter
Not Applicable
[2/2,v2] secilc: Add secil2conf which creates a policy.conf from CIL policy
- - -
-
-
-
2016-11-29
James Carter
Not Applicable
[1/2,v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- - -
-
-
-
2016-11-29
James Carter
Not Applicable
[2/2,v2] secilc: Add secil2conf which creates a policy.conf from CIL policy
- - -
-
-
-
2016-11-22
James Carter
Not Applicable
[1/2,v2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- - -
-
-
-
2016-11-22
James Carter
Not Applicable
[2/2] policycoreutils: Add cil2conf which creates a policy.conf from CIL policy
- - -
-
-
-
2016-11-18
James Carter
Not Applicable
[1/2] libsepol/cil: Add ability to write policy.conf file from CIL AST
- - -
-
-
-
2016-11-18
James Carter
Not Applicable
libsepol/cil: Exit with an error for an unknown map permission
- - -
-
-
-
2016-11-02
James Carter
Not Applicable
[7/7] libsepol/cil: Verify neither child nor parent in a bounds is an attribute
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[6/7] libsepol/cil: Verify alias in aliasactual statement is really an alias
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[5/7] libsepol/cil: Check that permission is not an empty list
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[4/7] libsepol/cil: Check if identifier is NULL when verifying name
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[3/7] libsepol/cil: Use an empty list to represent an unknown permission
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[2/7] libsepol/cil: Use empty list for category expression evaluated as empty
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[1/7] libsepol/cil: Check for improper category range
- - -
-
-
-
2016-10-18
James Carter
Not Applicable
[V2] libsepol: Add support for converting extended permissions to CIL
- - -
-
-
-
2016-10-04
James Carter
Not Applicable
libsepol: Add support for converting extended permissions to CIL
- - -
-
-
-
2016-10-03
James Carter
Not Applicable
libsemanage: Fixes bug preventing the installation of base modules
- - -
-
-
-
2016-10-03
James Carter
Not Applicable
libsepol/cil: Check for too many permissions in classes and commons
- - -
-
-
-
2016-09-29
James Carter
Not Applicable
libsepol: Change which attributes CIL keeps in the binary policy
- - -
-
-
-
2016-08-19
James Carter
Not Applicable
libsepol/cil: Warn instead of fail if permission is not resolve
- - -
-
-
-
2016-07-28
James Carter
Not Applicable
libsepol: Change which attributes CIL keeps in the binary policy
- - -
-
-
-
2016-05-06
James Carter
Not Applicable
[6/6,v3] libsepol: When generating CIL use HLL line mark for neverallows
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[5/6,v3] libsepol/cil: Remove path field from cil_tree_node struct
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[4/6,v3] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[3/6,v3] libsepol/cil: Add cil_tree_log() and supporting functions
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[2/6,v3] libsepol/cil: Store CIL filename in parse tree and AST
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[1/6,v3] libsepol/cil: Add high-level language line marking support
- - -
-
-
-
2016-05-05
James Carter
Not Applicable
[6/6,v2] libsepol: When generating CIL use HLL line mark for neverallows
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
[5/6,v2] libsepol/cil: Remove path field from cil_tree_node struct
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
[4/6,v2] libsepol/cil: Replace cil_log() calls with cil_tree_log()
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
[3/6,v2] libsepol/cil: Add cil_tree_log() and supporting functions
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
[2/6,v2] libsepol/cil: Store CIL filename in parse tree and AST
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
[1/6,v2] libsepol/cil: Add high-level language line marking support
- - -
-
-
-
2016-05-04
James Carter
Not Applicable
libsepol: Change logic of bounds checking
- - -
-
-
-
2016-05-03
James Carter
Not Applicable
libsepol: Only apply bounds checking to source types in rules
- - -
-
-
-
2016-04-29
James Carter
Not Applicable
libsepol/cil: Do not add an attribute as a type in the attr_type_map
- - -
-
-
-
2016-04-29
James Carter
Not Applicable
[6/6] libsepol: When generating CIL use HLL line mark for neverallows
- - -
-
-
-
2016-04-19
James Carter
Rejected
«
1
2
»