Show patches with: State = Action Required       |   5697 patches
« 1 2 ... 24 25 2656 57 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC,v5,05/12] __wr_after_init: x86_64: enable hardening: statically allocated protected memory - - - --- 2019-02-13 Igor Stoppa New
[RFC,v5,04/12] __wr_after_init: x86_64: randomize mapping offset hardening: statically allocated protected memory - - - --- 2019-02-13 Igor Stoppa New
[RFC,v5,03/12] __wr_after_init: Core and default arch hardening: statically allocated protected memory - - - --- 2019-02-13 Igor Stoppa New
[RFC,v5,02/12] __wr_after_init: linker section and attribute hardening: statically allocated protected memory - - - --- 2019-02-13 Igor Stoppa New
[2/2] lib: Introduce test_stackinit module gcc-plugins: structleak: Generalize to all variable types - - - --- 2019-02-12 Kees Cook New
[1/2] gcc-plugins: structleak: Generalize to all variable types gcc-plugins: structleak: Generalize to all variable types - - - --- 2019-02-12 Kees Cook New
[RFC,v4,12/12] IMA: turn ima_policy_flags into __wr_after_init hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,11/12] __wr_after_init: test write rare functionality hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,10/12] __wr_after_init: rodata_test: test __wr_after_init hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,09/12] __wr_after_init: rodata_test: refactor tests hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,08/12] __wr_after_init: lkdtm test hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,07/12] __wr_after_init: Documentation: self-protection hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,06/12] __wr_after_init: arm64: enable hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,05/12] __wr_after_init: arm64: memset_user() hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,04/12] __wr_after_init: x86_64: enable hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,03/12] __wr_after_init: x86_64: randomize mapping offset hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,02/12] __wr_after_init: x86_64: memset_user() hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[RFC,v4,01/12] __wr_after_init: Core and default arch hardening: statically allocated protected memory - - - --- 2019-02-11 Igor Stoppa New
[v3,4/4] perf-security: wrap paragraphs on 72 columns Untitled series #78339 - - - --- 2019-02-11 Alexey Budankov New
[v3,4/4] perf-security: wrap paragraphs on 72 columns admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-11 Alexey Budankov New
[v3,3/4] perf-security: elaborate on perf_events/Perf privileged users admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-11 Alexey Budankov New
[v3,2/4] perf-security: document collected perf_events/Perf data categories admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-11 Alexey Budankov New
[v3,1/4] perf-security: document perf_events/Perf resource control admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-11 Alexey Budankov New
[RFC] x86/entry/64: randomize kernel stack offset upon system call [RFC] x86/entry/64: randomize kernel stack offset upon system call - - - --- 2019-02-08 Reshetova, Elena New
[3/3] leaking_addresses: Expand tilde in output file name Minor bug fixes to leaking_addresses.pl - - - --- 2019-02-07 Tobin C. Harding New
[2/3] leaking_addresses: Completely remove --version flag Minor bug fixes to leaking_addresses.pl - - - --- 2019-02-07 Tobin C. Harding New
[1/3] leaking_addresses: Fix calls to dprint Minor bug fixes to leaking_addresses.pl - - - --- 2019-02-07 Tobin C. Harding New
[v2,4/4] perf-security: wrap paragraphs on 72 columns admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-07 Alexey Budankov New
[v2,3/4] perf-security: elaborate on perf_events/Perf privileged users admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-07 Alexey Budankov New
[v2,2/4] perf-security: document collected perf_events/Perf data categories admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-07 Alexey Budankov New
[v2,1/4] perf-security: document perf_events/Perf resource control admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-07 Alexey Budankov New
[v1,3/3] perf-security: document perf_events/Perf resource control admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-01 Alexey Budankov New
[v1,2/3] perf-security: document collected perf_events/Perf data categories admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-01 Alexey Budankov New
[v1,1/3] perf-security: document perf_events/Perf resource control admin-guide: extend perf-security with resource control, data categories and privileged users - - - --- 2019-02-01 Alexey Budankov New
[v6,27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,26/27] x86/relocs: Add option to generate 64-bit relocations x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,25/27] x86/pie: Add option to build the kernel as PIE x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,24/27] x86/mm: Make the x86 GOT read-only x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,23/27] x86/modules: Adapt module loading for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,22/27] x86/modules: Add option to start module section after kernel x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,21/27] x86/ftrace: Adapt function tracing for PIE support x86: PIE support and option to extend KASLR randomization - 1 - --- 2019-01-31 Thomas Garnier New
[v6,20/27] x86: Support global stack cookie x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,19/27] kvm: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,18/27] xen: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - 1 - --- 2019-01-31 Thomas Garnier New
[v6,17/27] x86/relocs: Handle PIE relocations x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,15/27] compiler: Option to default to hidden symbols x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,14/27] x86/percpu: Adapt percpu for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,12/27] x86/alternatives: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,11/27] x86/paravirt: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,10/27] x86/power/64: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization 2 - - --- 2019-01-31 Thomas Garnier New
[v6,09/27] x86/boot/64: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,08/27] x86/acpi: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization 2 - - --- 2019-01-31 Thomas Garnier New
[v6,07/27] x86/CPU: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,06/27] x86: pm-trace - Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,05/27] x86/entry/64: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,04/27] x86: relocate_kernel - Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,03/27] x86: Add macro to get symbol address for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,02/27] x86: Use symbol name in jump table for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
[v6,01/27] x86/crypto: Adapt assembly for PIE support x86: PIE support and option to extend KASLR randomization - - - --- 2019-01-31 Thomas Garnier New
ARM64 suggestion: reduce the compat address limit (currently 0x100000000)? ARM64 suggestion: reduce the compat address limit (currently 0x100000000)? - - - --- 2019-01-30 Jann Horn New
mm: Prevent mapping typed pages to userspace mm: Prevent mapping typed pages to userspace - 2 - --- 2019-01-29 Matthew Wilcox New
[v2,20/20] x86/alternative: comment about module removal races Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,19/20] x86/kprobes: Use vmalloc special flag Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,18/20] x86/ftrace: Use vmalloc special flag Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,17/20] bpf: Use vmalloc special flag Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,16/20] modules: Use vmalloc special flag Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,15/20] vmalloc: New flags for safe vfree on special perms Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,14/20] mm: Make hibernate handle unmapped pages Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,13/20] Add set_alias_ function and x86 implementation Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,12/20] x86/alternative: Remove the return value of text_poke_*() Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,11/20] x86/jump-label: remove support for custom poker Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,10/20] x86: avoid W^X being broken during modules loading Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,09/20] x86/kprobes: instruction pages initialization enhancements Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,08/20] x86/ftrace: set trampoline pages as executable Merge text_poke fixes and executable lockdowns - - - --- 2019-01-29 Rick Edgecombe New
[v2,07/20] x86/kgdb: avoid redundant comparison of patched code Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,06/20] x86/alternative: use temporary mm for text poking Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,05/20] x86/alternative: initializing temporary mm for patching Merge text_poke fixes and executable lockdowns 1 1 1 --- 2019-01-29 Rick Edgecombe New
[v2,04/20] fork: provide a function for copying init_mm Merge text_poke fixes and executable lockdowns 1 1 1 --- 2019-01-29 Rick Edgecombe New
[v2,03/20] x86/mm: temporary mm struct Merge text_poke fixes and executable lockdowns 1 1 1 --- 2019-01-29 Rick Edgecombe New
[v2,02/20] x86/jump_label: Use text_poke_early() during early init Merge text_poke fixes and executable lockdowns 1 - - --- 2019-01-29 Rick Edgecombe New
[v2,01/20] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()" Merge text_poke fixes and executable lockdowns 2 1 - --- 2019-01-29 Rick Edgecombe New
mm: Prevent mapping slab pages to userspace mm: Prevent mapping slab pages to userspace 1 1 - --- 2019-01-25 Matthew Wilcox New
[3/3] lib: Introduce test_stackinit module gcc-plugins: Introduce stackinit plugin - - - --- 2019-01-23 Kees Cook New
[2/3] gcc-plugins: Introduce stackinit plugin gcc-plugins: Introduce stackinit plugin - - - --- 2019-01-23 Kees Cook New
[1/3] treewide: Lift switch variables out of switches gcc-plugins: Introduce stackinit plugin 2 1 - --- 2019-01-23 Kees Cook New
tty: ldisc: add sysctl to prevent autoloading of ldiscs tty: ldisc: add sysctl to prevent autoloading of ldiscs - 1 - --- 2019-01-21 Greg KH New
[RFC] x86/speculation: add L1 Terminal Fault / Foreshadow demo [RFC] x86/speculation: add L1 Terminal Fault / Foreshadow demo - - - --- 2019-01-21 Julian Stecklina New
[v2] KVM: x86: Fix single-step debugging [v2] KVM: x86: Fix single-step debugging - - - --- 2019-01-21 Alexander Popov New
KVM: x86: Fix single-step debugging KVM: x86: Fix single-step debugging - - - --- 2019-01-21 Alexander Popov New
[RESEND,V8,11/11] KVM: ROE: Store protected chunks in red black tree [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,10/11] KVM: Log ROE violations in system log [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,09/11] KVM: Add new exit reason For ROE violations [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,08/11] KVM: X86: Port ROE_MPROTECT_CHUNK to x86 [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,07/11] KVM: Add support for byte granular memory ROE [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,06/11] KVM: X86: Enable ROE for x86 [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,05/11] KVM: Create architecture independent ROE skeleton [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,04/11] KVM: Document Memory ROE [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
[RESEND,V8,03/11] KVM: X86: Add helper function to convert SPTE to GFN [RESEND,V8,01/11] KVM: State whether memory should be freed in kvm_free_memslot - - - --- 2019-01-20 Ahmed Abd El Mawgood New
« 1 2 ... 24 25 2656 57 »