Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12149 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
16
17
18
…
121
122
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[RFC,v2,9/9] Smack: Brutalist io_uring support with debug
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,8/9] selinux: add support for the io_uring access controls
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,7/9] lsm,io_uring: add LSM hooks to io_uring
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,6/9] io_uring: convert io_uring to the secure anon inode interface
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
Add LSM access controls and auditing to io_uring
1 - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,4/9] audit: add filtering for io_uring records
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,3/9] audit: dev/test patch to force io_uring auditing
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-08-11
Paul Moore
New
[RFC,v2,1/9] audit: prepare audit_context for use in calling contexts beyond syscalls
Add LSM access controls and auditing to io_uring
1 - -
-
-
-
2021-08-11
Paul Moore
New
[v4,2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
ibmvtpm: Avoid error message when process gets signal while waiting
1 - -
-
-
-
2021-08-09
Stefan Berger
New
[v4,1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
ibmvtpm: Avoid error message when process gets signal while waiting
- - 1
-
-
-
2021-08-09
Stefan Berger
New
[3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[2/3] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[1/3] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[v2] fscrypt: support trusted keys
[v2] fscrypt: support trusted keys
- - -
-
-
-
2021-08-06
Ahmad Fatoum
New
[3/3] kernel/auditsc: use correct blob for files in security_audit_rule_match call
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
[2/3] security/security: get rid of a duplicated condition
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
[v3,2/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
ibmvtpm: Avoid error message when process gets signal while waiting
- - -
-
-
-
2021-08-05
Stefan Berger
New
[v3,1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
ibmvtpm: Avoid error message when process gets signal while waiting
- - -
-
-
-
2021-08-05
Stefan Berger
New
[GIT,PULL] SELinux fixes for v5.14 (#1)
[GIT,PULL] SELinux fixes for v5.14 (#1)
- - -
-
-
-
2021-08-05
Paul Moore
New
[v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
[v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- - 1
-
-
-
2021-08-03
Stefan Berger
New
[v3,4/4] landlock_restrict_self.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-30
Mickaël Salaün
New
[v3,3/4] landlock_add_rule.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-30
Mickaël Salaün
New
[v3,2/4] landlock_create_ruleset.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-30
Mickaël Salaün
New
[v3,1/4] landlock.7: Add a new page to introduce Landlock
Add Landlock man pages
- - -
-
-
-
2021-07-30
Mickaël Salaün
New
apparmor: use per file locks for transactional queries
apparmor: use per file locks for transactional queries
1 - -
-
-
-
2021-07-30
Hamza Mahfooz
New
[v3] KEYS: trusted: Fix trusted key backends when building as module
[v3] KEYS: trusted: Fix trusted key backends when building as module
- 3 -
-
-
-
2021-07-30
Andreas Rammhold
New
[v2] KEYS: trusted: Fix trusted key backends when building as module
[v2] KEYS: trusted: Fix trusted key backends when building as module
- 1 -
-
-
-
2021-07-29
Andreas Rammhold
New
tpm: ibmvtpm: Avoid error message when process gets signal while waiting
tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- - 1
-
-
-
2021-07-29
Stefan Berger
New
[RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
[RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
1 - -
-
-
-
2021-07-27
Pavel Skripkin
New
[RFC,v1] fscrypt: support encrypted and trusted keys
[RFC,v1] fscrypt: support encrypted and trusted keys
- - -
-
-
-
2021-07-27
Ahmad Fatoum
New
[RFC,v2,12/12] integrity: store reference to mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,11/12] integrity: Do not allow mok keyring updates following init
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,09/12] KEYS: add a reference to mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,08/12] integrity: Suppress error message for keys added to the mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,07/12] integrity: add new keyring handler for mok keys
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,06/12] integrity: accessor function to get trust_moklist
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,04/12] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,03/12] integrity: Trust MOK keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,02/12] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-26
Eric Snowberg
New
[RFC,v2,12/12] diglim: Tests
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,11/12] diglim: Remote Attestation
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,10/12] diglim: Interfaces - digests_count
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,09/12] diglim: Interfaces - digest_query
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,08/12] diglim: Interfaces - digest_label
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,07/12] diglim: Interfaces - digest_lists_loaded
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,06/12] diglim: Interfaces - digest_list_add, digest_list_del
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,05/12] diglim: Parser
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,04/12] diglim: Methods
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,03/12] diglim: Objects
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,02/12] diglim: Basic definitions
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[RFC,v2,01/12] diglim: Overview
integrity: Introduce DIGLIM
- - -
-
-
-
2021-07-26
Roberto Sassu
New
[V2] security: keys: trusted: Fix memory leaks on allocated blob
[V2] security: keys: trusted: Fix memory leaks on allocated blob
1 - -
-
-
-
2021-07-26
Colin King
New
security: keys: trusted: Fix memory leaks on allocated blob
security: keys: trusted: Fix memory leaks on allocated blob
1 1 -
-
-
-
2021-07-23
Colin King
New
[v4,3/3] ima: Add digest and digest_len params to the functions to measure a buffer
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-23
Roberto Sassu
New
[v4,2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
1 1 -
-
-
-
2021-07-23
Roberto Sassu
New
[v4,1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-23
Roberto Sassu
New
[RFC,v1,4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,3/4] ubifs: auth: remove never hit key type error check
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,2/4] dm: crypt: use new key_extract_material helper
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[RFC,v1,1/4] keys: introduce key_extract_material helper
keys: introduce key_extract_material helper
- - -
-
-
-
2021-07-22
Ahmad Fatoum
New
[v28,25/25] AppArmor: Remove the exclusive flag
[v28,01/25] LSM: Infrastructure management of the sock security
2 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,24/25] LSM: Add /proc attr entry for full LSM context
[v28,01/25] LSM: Infrastructure management of the sock security
- 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,23/25] Audit: Add record for multiple object LSM attributes
[v28,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,22/25] Audit: Add record for multiple process LSM attributes
[v28,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,21/25] audit: support non-syscall auxiliary records
[v28,01/25] LSM: Infrastructure management of the sock security
1 - -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,20/25] LSM: Verify LSM display sanity in binder
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,19/25] NET: Store LSM netlabel data in a lsmblob
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,18/25] LSM: security_secid_to_secctx in netlink netfilter
[v28,01/25] LSM: Infrastructure management of the sock security
3 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,17/25] LSM: Use lsmcontext in security_inode_getsecctx
[v28,01/25] LSM: Infrastructure management of the sock security
3 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,16/25] LSM: Use lsmcontext in security_secid_to_secctx
[v28,01/25] LSM: Infrastructure management of the sock security
2 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,15/25] LSM: Ensure the correct LSM context releaser
[v28,01/25] LSM: Infrastructure management of the sock security
3 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,14/25] LSM: Specify which LSM to display
[v28,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,13/25] IMA: Change internal interfaces to use lsmblobs
[v28,01/25] LSM: Infrastructure management of the sock security
1 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,12/25] LSM: Use lsmblob in security_cred_getsecid
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,11/25] LSM: Use lsmblob in security_inode_getsecid
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,10/25] LSM: Use lsmblob in security_task_getsecid
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,09/25] LSM: Use lsmblob in security_ipc_getsecid
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,08/25] LSM: Use lsmblob in security_secid_to_secctx
[v28,01/25] LSM: Infrastructure management of the sock security
1 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,07/25] LSM: Use lsmblob in security_secctx_to_secid
[v28,01/25] LSM: Infrastructure management of the sock security
1 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,06/25] LSM: Use lsmblob in security_kernel_act_as
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,05/25] LSM: Use lsmblob in security_audit_rule_match
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,04/25] IMA: avoid label collisions with stacked LSMs
[v28,01/25] LSM: Infrastructure management of the sock security
- 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,03/25] LSM: provide lsm name and id slot mappings
[v28,01/25] LSM: Infrastructure management of the sock security
1 1 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,02/25] LSM: Add the lsmblob data structure.
[v28,01/25] LSM: Infrastructure management of the sock security
3 - -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,01/25] LSM: Infrastructure management of the sock security
[v28,01/25] LSM: Infrastructure management of the sock security
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[v28,01/25] LSM: Infrastructure management of the sock security
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-07-22
Casey Schaufler
New
[4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[3/4] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- 1 -
-
-
-
2021-07-21
Ahmad Fatoum
New
[2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
1 - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[1/4] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
1 - -
-
-
-
2021-07-21
Ahmad Fatoum
New
[RFC,9/9] sk_buff: access secmark via getter/setter
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[RFC,8/9] sk_buff: move vlan field after tail.
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[RFC,7/9] sk_buff: move inner header fields after tail
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[RFC,6/9] veth: use skb_prepare_for_gro()
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[RFC,5/9] skbuff: introduce has_sk state bit.
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
«
1
2
...
16
17
18
…
121
122
»