Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12147 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
17
18
19
…
121
122
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[RFC,2/9] sk_buff: track dst status in skb->_state
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[RFC,1/9] sk_buff: track nfct status in newly added skb->_state
sk_buff: optimize layout for GRO
- - -
-
-
-
2021-07-21
Paolo Abeni
New
[v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
[v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- 1 1
-
-
-
2021-07-21
Ahmad Fatoum
New
hardening: Clarify Kconfig text for auto-var-init
hardening: Clarify Kconfig text for auto-var-init
1 - -
-
-
-
2021-07-20
Kees Cook
New
KEYS: trusted: Fix trusted key backends when building as module
KEYS: trusted: Fix trusted key backends when building as module
- 1 -
-
-
-
2021-07-16
Andreas Rammhold
New
Smack: Fix wrong semantics in smk_access_entry()
Smack: Fix wrong semantics in smk_access_entry()
- - -
-
-
-
2021-07-15
tianjia.zhang
New
[v2] hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
[v2] hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
- - -
-
-
-
2021-07-14
Kees Cook
New
[v2] LSM: add NULL check for kcalloc()
[v2] LSM: add NULL check for kcalloc()
- - -
-
-
-
2021-07-14
Austin Kim
New
LSM: add NULL check for kcalloc()
LSM: add NULL check for kcalloc()
- - -
-
-
-
2021-07-12
Austin Kim
New
[v8,5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,4/5] certs: Factor out the blacklist hash creation
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,3/5] certs: Make blacklist_vet_description() more strict
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,2/5] certs: Check that builtin blacklist hashes are valid
Enable root to update the blacklist keyring
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v8,1/5] tools/certs: Add print-cert-tbs-hash.sh
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-07-12
Mickaël Salaün
New
tpm: ibmvtpm: Avoid error message when process gets signal while waiting
tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- - 1
-
-
-
2021-07-12
Stefan Berger
New
[v2,4/4] landlock_restrict_self.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v2,3/4] landlock_add_rule.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v2,2/4] landlock_create_ruleset.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[v2,1/4] landlock.7: Add a new page to introduce Landlock
Add Landlock man pages
- - -
-
-
-
2021-07-12
Mickaël Salaün
New
[2/2] net: cipso: fix memory leak in cipso_v4_doi_free
net: cipso: bug fixes
- - -
-
-
-
2021-07-10
Pavel Skripkin
New
[1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
net: cipso: bug fixes
1 - -
-
-
-
2021-07-10
Pavel Skripkin
New
[v2,1/1] xattr: Allow user.* xattr on symlink and special files
Relax restrictions on user.* xattr
1 - -
-
-
-
2021-07-08
Vivek Goyal
New
ima: check control characters in policy path
ima: check control characters in policy path
- - -
-
-
-
2021-07-07
Tianxing Zhang
New
[RFC,12/12] integrity: Suppress error message for keys added to the mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,11/12] integrity: move keys from the mok keyring into the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,10/12] integrity: add new keyring handler
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,09/12] integrity: accessor function to get trust_moklist
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,07/12] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,06/12] integrity: Trust mok keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,05/12] integrity: Introduce mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,04/12] integrity: add integrity_destroy_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,03/12] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[1/1] NAX LSM: Add initial support support
NAX (No Anonymous Execution) LSM
- - -
-
-
-
2021-07-07
Igor Zhbanov
New
[v1,4/4] landlock_restrict_self.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,3/4] landlock_add_rule.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,2/4] landlock_create_ruleset.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,1/4] landlock.7: Add a new page to introduce Landlock
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
ima: Support euid keyword for buffer measurement
ima: Support euid keyword for buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,3/3] ima: Add digest and digest_len params to the functions to measure a buffer
ima: Provide more info about buffer measurement
1 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,2/2] perf: Refactor permissions check into perf_check_permission()
[v3,1/2] perf: Fix required permissions if sigtrap is requested
- 1 -
-
-
-
2021-07-05
Marco Elver
New
[v3,1/2] perf: Fix required permissions if sigtrap is requested
[v3,1/2] perf: Fix required permissions if sigtrap is requested
1 - -
-
-
-
2021-07-05
Marco Elver
New
[v2,3/3] ima: Add digest and digest_len params to the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-07-01
Roberto Sassu
New
[v2,2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-07-01
Roberto Sassu
New
[v2,1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-01
Roberto Sassu
New
[v2] perf: Require CAP_KILL if sigtrap is requested
[v2] perf: Require CAP_KILL if sigtrap is requested
- - -
-
-
-
2021-07-01
Marco Elver
New
[v1,4/4] selftests/landlock: Check all possible intermediate directories
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,3/4] selftests/landlock: Work in a temporary directory
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,2/4] landlock: Add filesystem rule caching
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,1/4] fs,security: Add resolve_path_at() hook
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[GIT,PULL] SafeSetID changes for v5.14
[GIT,PULL] SafeSetID changes for v5.14
- - -
-
-
-
2021-06-30
Micah Morton
New
[3/3] ima: Add digest parameter to the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
[2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
[1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
perf: Require CAP_KILL if sigtrap is requested
perf: Require CAP_KILL if sigtrap is requested
- - -
-
-
-
2021-06-30
Marco Elver
New
[GIT,PULL] Smack patches for v5.14
[GIT,PULL] Smack patches for v5.14
- - -
-
-
-
2021-06-29
Casey Schaufler
New
[GIT,PULL] SELinux patches for v5.14
[GIT,PULL] SELinux patches for v5.14
- - -
-
-
-
2021-06-29
Paul Moore
New
[v8,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
[v8,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
IMA: remove -Wmissing-prototypes warning
IMA: remove -Wmissing-prototypes warning
- - -
-
-
-
2021-06-29
Austin Kim
New
smack: mark 'smack_enabled' global variable as __initdata
smack: mark 'smack_enabled' global variable as __initdata
- - -
-
-
-
2021-06-29
Austin Kim
New
[v7,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
[v7,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
[RFC,v2,3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,2/3] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,1/3] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,12/12] digest_lists: Tests
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,11/12] digest_lists: Interfaces - digests_count
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,10/12] digest_lists: Interfaces - digest_query
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,09/12] digest_lists: Interfaces - digest_label
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,08/12] digest_lists: Interfaces - digest_lists_loaded
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,06/12] digest_lists: Parser
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,05/12] digest_lists: Methods
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,04/12] digest_lists: Objects
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,03/12] digest_lists: Basic definitions
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,02/12] digest_lists: Overview
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
certs: Redirect openssl error message to null device
certs: Redirect openssl error message to null device
- - -
-
-
-
2021-06-25
Stefan Berger
New
[RFC] userfaultfd: open userfaultfds with O_RDONLY
[RFC] userfaultfd: open userfaultfds with O_RDONLY
- - -
-
-
-
2021-06-24
Ondrej Mosnacek
New
[v2,2/6] KEYS: trusted: Allow import from existing key material for development
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,5/6] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,3/6] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2] evm: Check xattr size discrepancy between kernel and user
[v2] evm: Check xattr size discrepancy between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
evm: Check xattr size misalignment between kernel and user
evm: Check xattr size misalignment between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
fs: Return raw xattr for security.* if there is size disagreement with LSMs
fs: Return raw xattr for security.* if there is size disagreement with LSMs
- - 1
-
-
-
2021-06-16
Roberto Sassu
New
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2 - -
-
-
-
2021-06-16
Ondrej Mosnacek
New
[v2,27/29] docs: userspace-api: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
1 - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[v2,24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
- - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
1 - -
-
-
-
2021-06-15
Liu Shixin
New
[3/3] doc: trusted-encrypted: add DCP as new trust source
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[1/3] crypto: mxs-dcp: Add support for hardware provided keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
«
1
2
...
17
18
19
…
121
122
»