Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12163 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
23
24
25
…
121
122
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v29,11/12] samples/landlock: Add a sandbox manager example
Landlock LSM
- 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,09/12] arch: Wire up Landlock syscalls
Landlock LSM
- - -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,08/12] landlock: Add syscall implementations
Landlock LSM
1 - -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,07/12] landlock: Support filesystem access-control
Landlock LSM
- - -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,06/12] fs,security: Add sb_delete hook
Landlock LSM
1 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,05/12] LSM: Infrastructure management of the superblock
Landlock LSM
1 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,04/12] landlock: Add ptrace restrictions
Landlock LSM
1 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,03/12] landlock: Set up the security framework and manage credentials
Landlock LSM
1 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,02/12] landlock: Add ruleset and domain management
Landlock LSM
1 - -
-
-
-
2021-02-25
Mickaël Salaün
New
[v29,01/12] landlock: Add object management
Landlock LSM
1 1 -
-
-
-
2021-02-25
Mickaël Salaün
New
perf/core: fix unconditional security_locked_down() call
perf/core: fix unconditional security_locked_down() call
- 1 -
-
-
-
2021-02-24
Ondrej Mosnacek
New
[v5] ARM: Implement SLS mitigation
[v5] ARM: Implement SLS mitigation
- 1 -
-
-
-
2021-02-23
Jian Cai
New
[v5] ARM: Implement SLS mitigation
[v5] ARM: Implement SLS mitigation
- 1 -
-
-
-
2021-02-23
Jian Cai
New
[v3,1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Automatic LSM stack ordering
- - -
-
-
-
2021-02-22
Mickaël Salaün
New
[v3,8/8] MAINTAINERS: Add a new entry for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,7/8] Documentation: Add documentation for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,6/8] selftests/brute: Add tests for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,5/8] security/brute: Mitigate a brute force attack
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,4/8] security/brute: Fine tuning the attack detection
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,3/8] securtiy/brute: Detect a brute force attack
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,2/8] security/brute: Define a LSM and manage statistical data
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[v3,1/8] security: Add LSM hook at the point where a task gets a fatal signal
Fork brute force attack mitigation
- - -
-
-
-
2021-02-21
John Wood
New
[RFC,4/4] apparmor: differentiate between subjective and objective task credentials
Split security_task_getsecid() into subj and obj variants
- - -
-
-
-
2021-02-19
Paul Moore
New
[RFC,3/4] smack: differentiate between subjective and objective task credentials
Split security_task_getsecid() into subj and obj variants
- 1 -
-
-
-
2021-02-19
Paul Moore
New
[RFC,2/4] selinux: clarify task subjective and objective credentials
Split security_task_getsecid() into subj and obj variants
- - -
-
-
-
2021-02-19
Paul Moore
New
[RFC,1/4] lsm: separate security_task_getsecid() into subjective and objective variants
Split security_task_getsecid() into subj and obj variants
1 2 -
-
-
-
2021-02-19
Paul Moore
New
[v4] ARM: Implement SLS mitigation
[v4] ARM: Implement SLS mitigation
- 1 -
-
-
-
2021-02-19
Jian Cai
New
[v3,3/3] NFSv4 account for selinux security context when deciding to share superblock
[v3,1/3,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-19
Olga Kornievskaia
New
[v3,2/3,NFS] cleanup: remove unneeded null check in nfs_fill_super()
[v3,1/3,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-19
Olga Kornievskaia
New
[v3,1/3,security] Add new hook to compare new mount to an existing mount
[v3,1/3,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-19
Olga Kornievskaia
New
[v3] ARM: Implement SLS mitigation
[v3] ARM: Implement SLS mitigation
- 1 -
-
-
-
2021-02-19
Jian Cai
New
[v3,2/2] NFSv4 account for selinux security context when deciding to share superblock
[v3,1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-19
Olga Kornievskaia
New
[v3,1/2,security] Add new hook to compare new mount to an existing mount
[v3,1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-19
Olga Kornievskaia
New
certs: Add support for using elliptic curve keys for signing modules
certs: Add support for using elliptic curve keys for signing modules
- 1 1
-
-
-
2021-02-19
Stefan Berger
New
ima: Replacing deprecated strlcpy with strscpy
ima: Replacing deprecated strlcpy with strscpy
- - -
-
-
-
2021-02-19
Palash Oswal
New
[v2,5/5] ima: enable loading of build time generated key on .ima keyring
ima: kernel build support for loading the kernel module signing key
- 2 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,4/5] keys: define build time generated ephemeral kernel CA key
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-18
Nayna Jain
New
[v2,3/5] ima: update kernel module signing process during build
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,2/5] keys: generate self-signed module signing key using CSR
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,1/5] keys: cleanup build time module signing keys
ima: kernel build support for loading the kernel module signing key
- 1 -
-
-
-
2021-02-18
Nayna Jain
New
[v2,2/2] NFSv4 account for selinux security context when deciding to share superblock
[v2,1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-18
Olga Kornievskaia
New
[v2,1/2,security] Add new hook to compare new mount to an existing mount
[v2,1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-18
Olga Kornievskaia
New
[GIT,PULL] Smack patches for v5.12
[GIT,PULL] Smack patches for v5.12
- - -
-
-
-
2021-02-16
Casey Schaufler
New
RTIC: selinux: ARM64: Move selinux_state to a separate page
RTIC: selinux: ARM64: Move selinux_state to a separate page
1 - -
-
-
-
2021-02-16
Preeti Nagar
New
[GIT,PULL] SELinux patches for v5.12
[GIT,PULL] SELinux patches for v5.12
- - -
-
-
-
2021-02-15
Paul Moore
New
[v2,3/3] security: Add LSMs dependencies to CONFIG_LSM
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
[v2,2/3] kconfig: Ask user if string needs to be changed when dependency changed
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
[v2,1/3] kconfig: Remove duplicate call to sym_get_string_value()
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
[v1,3/3] security: Add LSMs dependencies to CONFIG_LSM
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
[v1,2/3] kconfig: Ask user if string needs to be changed when dependency changed
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
[v1,1/3] kconfig: Remove duplicate call to sym_get_string_value()
Kconfig oldconfig string update
- - -
-
-
-
2021-02-15
Mickaël Salaün
New
integrity/ima: Provide Kconfig option for ima-modsig template
integrity/ima: Provide Kconfig option for ima-modsig template
- - -
-
-
-
2021-02-15
Michael Weiß
New
[GIT,PULL] tomoyo fixes for v5.12
[GIT,PULL] tomoyo fixes for v5.12
- - -
-
-
-
2021-02-15
Tetsuo Handa
New
[2/2] NFSv4 account for selinux security context when deciding to share superblock
[1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-12
Olga Kornievskaia
New
[1/2,security] Add new hook to compare new mount to an existing mount
[1/2,security] Add new hook to compare new mount to an existing mount
- - -
-
-
-
2021-02-12
Olga Kornievskaia
New
[v2] ARM: Implement Clang's SLS mitigation
[v2] ARM: Implement Clang's SLS mitigation
- - -
-
-
-
2021-02-12
Jian Cai
New
[v3] selinux: measure state and policy capabilities
[v3] selinux: measure state and policy capabilities
- - -
-
-
-
2021-02-12
Lakshmi Ramasubramanian
New
ARM: Implement Clang's SLS mitigation
ARM: Implement Clang's SLS mitigation
- - -
-
-
-
2021-02-12
Jian Cai
New
[5/5] ima: enable loading of build time generated key to .ima keyring
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[4/5] keys: define build time generated ephemeral kernel CA key
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[3/5] ima: update kernel module signing process during build
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[2/5] keys: generate self-signed module signing key using CSR
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[1/5] keys: cleanup build time module signing keys
ima: kernel build support for loading the kernel module signing key
- - -
-
-
-
2021-02-11
Nayna Jain
New
[GIT,PULL] Add EFI_CERT_X509_GUID support for dbx/mokx entries
[GIT,PULL] Add EFI_CERT_X509_GUID support for dbx/mokx entries
- - -
-
-
-
2021-02-10
David Howells
New
[GIT,PULL] keys: Collected minor fixes and cleanups
[GIT,PULL] keys: Collected minor fixes and cleanups
- - -
-
-
-
2021-02-10
David Howells
New
[no subject]
Untitled series #432931
- - -
-
-
-
2021-02-10
David Howells
New
[v6,5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Enable root to update the blacklist keyring
- - 1
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,4/5] certs: Factor out the blacklist hash creation
Enable root to update the blacklist keyring
- - -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,3/5] certs: Make blacklist_vet_description() more strict
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,2/5] certs: Check that builtin blacklist hashes are valid
Enable root to update the blacklist keyring
- - -
-
-
-
2021-02-10
Mickaël Salaün
New
[v6,1/5] tools/certs: Add print-cert-tbs-hash.sh
Enable root to update the blacklist keyring
- 1 -
-
-
-
2021-02-10
Mickaël Salaün
New
[-next] integrity: Make function integrity_add_key() static
[-next] integrity: Make function integrity_add_key() static
- 2 -
-
-
-
2021-02-10
Wei Yongjun
New
[-next] IMA: Make function ima_mok_init() static
[-next] IMA: Make function ima_mok_init() static
- - -
-
-
-
2021-02-10
Wei Yongjun
New
[v1] efi: Don't use knowledge about efi_guid_t internals
[v1] efi: Don't use knowledge about efi_guid_t internals
1 1 -
-
-
-
2021-02-09
Andy Shevchenko
New
[2/2] keys: Allow request_key upcalls from a container to be intercepted
keys: request_key() interception in containers
- - -
-
-
-
2021-02-04
David Howells
New
[1/2] Add namespace tags that can be used for matching without pinning a ns
keys: request_key() interception in containers
- - -
-
-
-
2021-02-04
David Howells
New
[RESEND,v5] proc: Allow pid_revalidate() during LOOKUP_RCU
[RESEND,v5] proc: Allow pid_revalidate() during LOOKUP_RCU
- - -
-
-
-
2021-02-04
Stephen Brennan
New
[v28,12/12] landlock: Add user and kernel documentation
Landlock LSM
- 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,11/12] samples/landlock: Add a sandbox manager example
Landlock LSM
- 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,09/12] arch: Wire up Landlock syscalls
Landlock LSM
- - -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,08/12] landlock: Add syscall implementations
Landlock LSM
1 - -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,07/12] landlock: Support filesystem access-control
Landlock LSM
- - -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,06/12] fs,security: Add sb_delete hook
Landlock LSM
1 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,05/12] LSM: Infrastructure management of the superblock
Landlock LSM
1 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,04/12] landlock: Add ptrace restrictions
Landlock LSM
1 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,03/12] landlock: Set up the security framework and manage credentials
Landlock LSM
1 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,02/12] landlock: Add ruleset and domain management
Landlock LSM
1 - -
-
-
-
2021-02-02
Mickaël Salaün
New
[v28,01/12] landlock: Add object management
Landlock LSM
1 1 -
-
-
-
2021-02-02
Mickaël Salaün
New
[v3,1/1] process_madvise.2: Add process_madvise man page
[v3,1/1] process_madvise.2: Add process_madvise man page
- 1 -
-
-
-
2021-02-02
Suren Baghdasaryan
New
[3/3] IMA: add support to measure duplicate buffer for critical data hook
support for duplicate measurement of integrity critical data
- - -
-
-
-
2021-01-30
Tushar Sugandhi
New
[2/3] IMA: update functions to read allow_dup policy condition
support for duplicate measurement of integrity critical data
- - -
-
-
-
2021-01-30
Tushar Sugandhi
New
[1/3] IMA: add policy condition to measure duplicate critical data
support for duplicate measurement of integrity critical data
- - -
-
-
-
2021-01-30
Tushar Sugandhi
New
[v2] selinux: measure state and policy capabilities
[v2] selinux: measure state and policy capabilities
- - -
-
-
-
2021-01-29
Lakshmi Ramasubramanian
New
[v2,1/1] process_madvise.2: Add process_madvise man page
[v2,1/1] process_madvise.2: Add process_madvise man page
- - -
-
-
-
2021-01-29
Suren Baghdasaryan
New
[v2] smackfs: restrict bytes count in smackfs write functions
[v2] smackfs: restrict bytes count in smackfs write functions
- - -
-
-
-
2021-01-28
Sabyrzhan Tasbolatov
New
[v24,25/25] AppArmor: Remove the exclusive flag
[v24,01/25] LSM: Infrastructure management of the sock security
2 1 -
-
-
-
2021-01-26
Casey Schaufler
New
[v24,24/25] LSM: Add /proc attr entry for full LSM context
[v24,01/25] LSM: Infrastructure management of the sock security
- 1 -
-
-
-
2021-01-26
Casey Schaufler
New
[v24,23/25] Audit: Add a new record for multiple object LSM attributes
[v24,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-01-26
Casey Schaufler
New
[v24,22/25] Audit: Add new record for multiple process LSM attributes
[v24,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-01-26
Casey Schaufler
New
[v24,21/25] audit: add support for non-syscall auxiliary records
[v24,01/25] LSM: Infrastructure management of the sock security
- - -
-
-
-
2021-01-26
Casey Schaufler
New
«
1
2
...
23
24
25
…
121
122
»