Show patches with: State = Action Required       |   5699 patches
« 1 2 ... 35 36 3756 57 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[4.15,43/60] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-05 Greg KH New
[4.15,42/60] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-05 Greg KH New
[4.15,41/60] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-05 Greg KH New
[4.15,40/60] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-05 Greg KH New
[4.15,39/60] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-05 Greg KH New
[4.15,38/60] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg KH New
[4.15,37/60] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-02-05 Greg KH New
[4.15,36/60] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg KH New
[4.15,35/60] x86: Introduce barrier_nospec - - - --- 2018-02-05 Greg KH New
[4.15,34/60] x86: Implement array_index_mask_nospec - - - --- 2018-02-05 Greg KH New
[4.14,47/64] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-05 Greg KH New
[4.15,33/60] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-05 Greg KH New
[4.14,46/64] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-05 Greg KH New
[4.15,32/60] Documentation: Document array_index_nospec - 1 - --- 2018-02-05 Greg KH New
[4.14,45/64] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-05 Greg KH New
[4.15,31/60] x86/asm: Move status from thread_struct to thread_info 1 1 - --- 2018-02-05 Greg KH New
[4.14,44/64] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-05 Greg KH New
[4.15,30/60] x86/entry/64: Push extra regs right away 1 - - --- 2018-02-05 Greg KH New
[4.14,43/64] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-05 Greg KH New
[4.15,29/60] x86/entry/64: Remove the SYSCALL64 fast path 1 - - --- 2018-02-05 Greg KH New
[4.14,42/64] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg KH New
[4.14,41/64] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-02-05 Greg KH New
[4.14,40/64] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg KH New
[4.14,39/64] x86: Introduce barrier_nospec - - - --- 2018-02-05 Greg KH New
[4.14,38/64] x86: Implement array_index_mask_nospec - - - --- 2018-02-05 Greg KH New
[4.14,37/64] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-05 Greg KH New
[4.14,36/64] Documentation: Document array_index_nospec - 1 - --- 2018-02-05 Greg KH New
[4.14,35/64] x86/asm: Move status from thread_struct to thread_info 1 1 - --- 2018-02-05 Greg KH New
[4.14,34/64] x86/entry/64: Push extra regs right away 1 - - --- 2018-02-05 Greg KH New
[4.14,33/64] x86/entry/64: Remove the SYSCALL64 fast path 1 - - --- 2018-02-05 Greg KH New
Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.15-stable tree 1 - - --- 2018-02-05 Greg KH New
Patch "x86/entry/64: Push extra regs right away" has been added to the 4.15-stable tree 1 - - --- 2018-02-05 Greg KH New
Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.15-stable … 1 1 - --- 2018-02-05 Greg KH New
Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.14-stable tree 1 - - --- 2018-02-05 Greg KH New
Patch "x86/entry/64: Push extra regs right away" has been added to the 4.14-stable tree 1 - - --- 2018-02-05 Greg KH New
Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.14-stable … 1 1 - --- 2018-02-05 Greg KH New
[2/2] GCC release 8 support for gcc-plugins - - - --- 2018-02-04 Valdis Klētnieks New
[1/2] GCC release 8 support for gcc-plugins - - - --- 2018-02-04 Valdis Klētnieks New
[6/6] Documentation for Pmalloc - - - --- 2018-02-04 Igor Stoppa New
[5/6] Pmalloc: self-test - - - --- 2018-02-04 Igor Stoppa New
[4/6] Protectable Memory - - - --- 2018-02-04 Igor Stoppa New
[3/6] struct page: add field for vm_struct - - - --- 2018-02-04 Igor Stoppa New
[2/6] genalloc: selftest - - - --- 2018-02-04 Igor Stoppa New
[1/6] genalloc: track beginning of allocations - - - --- 2018-02-04 Igor Stoppa New
[4/6] Protectable Memory - - - --- 2018-02-03 Igor Stoppa New
[3/6] struct page: add field for vm_struct - - - --- 2018-02-03 Igor Stoppa New
[2/6] genalloc: selftest - - - --- 2018-02-03 Igor Stoppa New
[1/6] genalloc: track beginning of allocations - - - --- 2018-02-03 Igor Stoppa New
kbuild/gcc-plugin: drop randomize_layout_hash.h from targets - - - --- 2018-01-31 Cao jin New
[6/6] Pmalloc: self-test - - - --- 2018-01-30 Igor Stoppa New
[5/6] Documentation for Pmalloc - - - --- 2018-01-30 Igor Stoppa New
[4/6] Protectable Memory - - - --- 2018-01-30 Igor Stoppa New
[3/6] struct page: add field for vm_struct - - - --- 2018-01-30 Igor Stoppa New
[2/6] genalloc: selftest - - - --- 2018-01-30 Igor Stoppa New
[1/6] genalloc: track beginning of allocations - - - --- 2018-01-30 Igor Stoppa New
[v6,13/13] x86/spectre: report get_user mitigation for spectre_v1 - - - --- 2018-01-30 Dan Williams New
[v6,12/13] nl80211: sanitize array index in parse_txq_params 1 - - --- 2018-01-30 Dan Williams New
[v6,11/13] kvm, x86: update spectre-v1 mitigation 1 - - --- 2018-01-30 Dan Williams New
[v6,10/13] vfs, fdtable: prevent bounds-check bypass via speculative execution - - - --- 2018-01-30 Dan Williams New
[v6,09/13] x86: sanitize syscall table de-references under speculation - - - --- 2018-01-30 Dan Williams New
[v6,08/13] x86, get_user: use pointer masking to limit speculation - - - --- 2018-01-30 Dan Williams New
[v6,07/13] x86, __get_user: use __uaccess_begin_nospec - - - --- 2018-01-30 Dan Williams New
[v6,06/13] x86, usercopy: replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-01-30 Dan Williams New
[v6,05/13] x86: introduce __uaccess_begin_nospec - - - --- 2018-01-30 Dan Williams New
[v6,04/13] x86: introduce barrier_nospec - - - --- 2018-01-30 Dan Williams New
[v6,03/13] x86: implement array_index_mask_nospec - - - --- 2018-01-30 Dan Williams New
[v6,02/13] array_index_nospec: sanitize speculative array de-references - - - --- 2018-01-30 Dan Williams New
[v6,01/13] Documentation: document array_index_nospec - 1 - --- 2018-01-30 Dan Williams New
leaking_addresses: add 32-bit support - - - --- 2018-01-29 Tobin Harding New
[3/3] syscalls: Add a bit of documentation to __SYSCALL_DEFINE - - - --- 2018-01-28 Andy Lutomirski New
[2/3] x86/asm: Move 'status' from thread_struct to thread_info - 1 - --- 2018-01-28 Andy Lutomirski New
[1/3] x86/entry/64: Remove the SYSCALL64 fast path - - - --- 2018-01-28 Andy Lutomirski New
[v5,12/12] x86/spectre: report get_user mitigation for spectre_v1 - - - --- 2018-01-27 Dan Williams New
[v5,11/12] nl80211: sanitize array index in parse_txq_params 1 - - --- 2018-01-27 Dan Williams New
[v5,10/12] kvm, x86: update spectre-v1 mitigation 1 - - --- 2018-01-27 Dan Williams New
[v5,09/12] vfs, fdtable: prevent bounds-check bypass via speculative execution - - - --- 2018-01-27 Dan Williams New
[v5,08/12] x86: sanitize sycall table de-references under speculation - - - --- 2018-01-27 Dan Williams New
[v5,07/12] x86: remove the syscall_64 fast-path 1 1 - --- 2018-01-27 Dan Williams New
[v5,06/12] x86, get_user: use pointer masking to limit speculation - - - --- 2018-01-27 Dan Williams New
[v5,05/12] x86, __get_user: use __uaccess_begin_nospec - - - --- 2018-01-27 Dan Williams New
[v5,04/12] x86: introduce __uaccess_begin_nospec and ifence - - - --- 2018-01-27 Dan Williams New
[v5,03/12] x86: implement array_idx_mask - - - --- 2018-01-27 Dan Williams New
[v5,02/12] array_idx: sanitize speculative array de-references - - - --- 2018-01-27 Dan Williams New
[v5,01/12] Documentation: document array_idx - 1 - --- 2018-01-27 Dan Williams New
[v2] cpu: do not leak vulnerabilities to unprivileged users - - - --- 2018-01-26 Jason A. Donenfeld New
Re: [PATCH] x86/retpoline/entry: Disable the entire SYSCALL64 fast path with retpolines on - - - --- 2018-01-25 Linus Torvalds New
cpu: do not leak vulnerabilities to unprivileged users - - - --- 2018-01-25 Jason A. Donenfeld New
[6/6] Pmalloc: self-test - - - --- 2018-01-24 Igor Stoppa New
[5/6] Documentation for Pmalloc - - - --- 2018-01-24 Igor Stoppa New
[4/6] Protectable Memory - - - --- 2018-01-24 Igor Stoppa New
[3/6] struct page: add field for vm_struct - - - --- 2018-01-24 Igor Stoppa New
[2/6] genalloc: selftest - - - --- 2018-01-24 Igor Stoppa New
[1/6] genalloc: track beginning of allocations - - - --- 2018-01-24 Igor Stoppa New
x86/retpoline/entry: Disable the entire SYSCALL64 fast path with retpolines on - - - --- 2018-01-22 Andy Lutomirski New
[v4.1,10/10] nl80211: sanitize array index in parse_txq_params - - - --- 2018-01-20 Dan Williams New
[v4.1,09/10] kvm, x86: update spectre-v1 mitigation 1 - - --- 2018-01-20 Dan Williams New
[v4.1,08/10] vfs, fdtable: prevent bounds-check bypass via speculative execution - - - --- 2018-01-20 Dan Williams New
[v4.1,07/10] x86: narrow out of bounds syscalls to sys_read under speculation - - - --- 2018-01-20 Dan Williams New
[v4.1,06/10] x86, get_user: use pointer masking to limit speculation - - - --- 2018-01-20 Dan Williams New
[v4.1,05/10] x86, __get_user: use __uaccess_begin_nospec - - - --- 2018-01-20 Dan Williams New
« 1 2 ... 35 36 3756 57 »