| Published | Title | Version | Author | Status |
|---|---|---|---|---|
| 2026-01-15 08:04 UTC | xfrm: XFRM_MSG_MIGRATE_STATE new netlink message | 2 | antony.antony@secunet.com | finished in 3h57m0s |
| 2025-12-05 12:10 UTC | ovl: pass original credentials, not mounter credentials during create | 1 | brauner@kernel.org | finished in 3h49m0s |
| 2025-12-04 12:59 UTC | bpf, arm64: Do not audit capability check in do_jit() | 1 | omosnace@redhat.com | finished in 48m0s |
| 2025-11-30 22:06 UTC | fuse: fix conversion of fuse_reverse_inval_entry() to start_removing() | 1 | neilb@ownmail.net | finished in 3h50m0s |
| 2025-11-13 00:18 UTC | Create and use APIs to centralise locking for directory ops. | 6 | neilb@ownmail.net | finished in 3h56m0s |
| 2025-11-06 00:50 UTC | Create and use APIs to centralise locking for directory ops. | 5 | neilb@ownmail.net |
finished
in 3h59m0s
[2 findings] |
| 2025-10-29 23:31 UTC | Create and use APIs to centralise locking for directory ops. | 4 | neilb@ownmail.net | finished in 3m0s |
| 2025-10-21 12:27 UTC | x86/bpf: do not audit capability check in do_jit() | 2 | omosnace@redhat.com | finished in 3h59m0s |
| 2025-10-10 08:09 UTC | nbd: override creds to kernel when calling sock_{send,recv}msg() | 2 | omosnace@redhat.com | finished in 4h1m0s |
| 2025-10-09 13:45 UTC | nbd: override creds to kernel when calling sock_{send,recv}msg() | 1 | omosnace@redhat.com | finished in 3h47m0s |
| 2025-08-14 13:25 UTC | SELinux namespace support | 7 | stephen.smalley.work@gmail.com | skipped |
| 2025-08-06 14:31 UTC | x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN) | 1 | omosnace@redhat.com | finished in 4h6m0s |