Toggle navigation
Patchwork
Linux Hardening
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 5692 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
53
54
55
…
56
57
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[RFC,1/8] thread_info: include <current.h> for THREAD_INFO_IN_TASK
- - -
-
-
-
2016-09-15
Mark Rutland
New
[RFC,v3,22/22] samples/landlock: Add sandbox example
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,21/22] bpf,landlock: Add optional skb pointer in the Landlock context
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,20/22] landlock: Add update and debug access flags
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,19/22] landlock: Add interrupted origin
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle unprivileged hooks
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,17/22] cgroup: Add access check for cgroup_get_from_fd()
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,15/22] bpf/cgroup: Move capability check
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,14/22] bpf/cgroup: Make cgroup_bpf_update() return an error code
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,13/22] bpf/cgroup: Replace struct bpf_prog with union bpf_object
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,12/22] bpf: Cosmetic change for bpf_prog_attach()
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,11/22] seccomp,landlock: Handle Landlock hooks per process hierarchy
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,10/22] seccomp: Split put_seccomp_filter() with put_seccomp()
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,09/22] seccomp: Move struct seccomp_filter in seccomp.h
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,08/22] seccomp: Fix documentation for struct seccomp_filter
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,07/22] landlock: Handle file comparisons
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,06/22] landlock: Add LSM hooks
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,05/22] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,04/22] bpf: Set register type according to is_valid_access()
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,03/22] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,02/22] bpf: Move u64_to_ptr() to BPF headers and inline it
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v3,01/22] landlock: Add Kconfig
- - -
-
-
-
2016-09-14
Mickaël Salaün
New
[RFC,v2,3/3] block: Always use a bounce buffer when XPFO is enabled
- - -
-
-
-
2016-09-14
Juerg Haefliger
New
[RFC,v2,2/3] xpfo: Only put previous userspace pages into the hot cache
- - -
-
-
-
2016-09-14
Juerg Haefliger
New
[RFC,v2,1/3] Add support for eXclusive Page Frame Ownership (XPFO)
- - -
-
-
-
2016-09-14
Juerg Haefliger
New
[v3,7/7] arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN
- - -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,6/7] arm64: xen: Enable user access before a privcmd hvc call
1 1 -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,5/7] arm64: Handle faults caused by inadvertent user access with PAN enabled
- - -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,4/7] arm64: Disable TTBR0_EL1 during normal kernel execution
- - -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,3/7] arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1
- - -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,2/7] arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro
- 1 -
-
-
-
2016-09-13
Catalin Marinas
New
[v3,1/7] arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
- 1 -
-
-
-
2016-09-13
Catalin Marinas
New
[v1] kexec/arch/i386: Add support for KASLR memory randomization
- - -
-
-
-
2016-09-13
Baoquan He
New
Re: [PATCH v1] kdump, vmcoreinfo: report memory sections virtual addresses
- - -
-
-
-
2016-09-13
Baoquan He
New
pty: make ptmx file ops read-only after init
- - -
-
-
-
2016-09-08
Kees Cook
New
[v2,7/7] arm64: Enable CONFIG_ARM64_TTBR0_PAN
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,6/7] arm64: xen: Enable user access before a privcmd hvc call
1 1 -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,5/7] arm64: Handle faults caused by inadvertent user access with PAN enabled
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,4/7] arm64: Disable TTBR0_EL1 during normal kernel execution
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,3/7] arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,2/7] arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[v2,1/7] arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
- - -
-
-
-
2016-09-02
Catalin Marinas
New
[RFC,v2,3/3] block: Always use a bounce buffer when XPFO is enabled
- - -
-
-
-
2016-09-02
Juerg Haefliger
New
[RFC,v2,2/3] xpfo: Only put previous userspace pages into the hot cache
- - -
-
-
-
2016-09-02
Juerg Haefliger
New
[RFC,v2,1/3] Add support for eXclusive Page Frame Ownership (XPFO)
- - -
-
-
-
2016-09-02
Juerg Haefliger
New
Re: [PATCH v1] kdump, vmcoreinfo: report memory sections virtual addresses
- - -
-
-
-
2016-08-29
Baoquan He
New
lib: harden strncpy_from_user
- - -
-
-
-
2016-08-26
Mark Rutland
New
[RFC,v2,10/10] samples/landlock: Add sandbox example
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,09/10] landlock: Handle cgroups
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,08/10] landlock: Handle file system comparisons
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,07/10] landlock: Add errno check
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,06/10] landlock: Add LSM hooks
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,05/10] seccomp: Handle Landlock
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,04/10] seccomp: Split put_seccomp_filter() with put_seccomp()
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,03/10] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,02/10] bpf: Move u64_to_ptr() to BPF headers and inline it
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[RFC,v2,01/10] landlock: Add Kconfig
- - -
-
-
-
2016-08-25
Mickaël Salaün
New
[v1] kdump, vmcoreinfo: report memory sections virtual addresses
2 - -
-
-
-
2016-08-18
Thomas Garnier
New
[v3,5/5] lkdtm: Add tests for struct list corruption
- - -
-
-
-
2016-08-17
Kees Cook
New
[v3,4/5] bug: Provide toggle for BUG on data corruption
- - -
-
-
-
2016-08-17
Kees Cook
New
[v3,3/5] list: Split list_del() debug checking into separate function
- - -
-
-
-
2016-08-17
Kees Cook
New
[v3,2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
- - -
-
-
-
2016-08-17
Kees Cook
New
[v3,1/5] list: Split list_add() debug checking into separate function
- - -
-
-
-
2016-08-17
Kees Cook
New
[v1] kexec/arch/i386: Add support for KASLR memory randomization
- - -
-
-
-
2016-08-17
Thomas Garnier
New
[v2,5/5] lkdtm: Add tests for struct list corruption
- - -
-
-
-
2016-08-17
Kees Cook
New
[v2,4/5] bug: Provide toggle for BUG on data corruption
- - -
-
-
-
2016-08-17
Kees Cook
New
[v2,3/5] list: Split list_del() debug checking into separate function
- - -
-
-
-
2016-08-17
Kees Cook
New
[v2,2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
- - -
-
-
-
2016-08-17
Kees Cook
New
[v2,1/5] list: Split list_add() debug checking into separate function
- - -
-
-
-
2016-08-17
Kees Cook
New
[5/5] lkdtm: Add tests for struct list corruption
- - -
-
-
-
2016-08-16
Kees Cook
New
[4/5] bug: Provide toggle for BUG on data corruption
- - -
-
-
-
2016-08-16
Kees Cook
New
[3/5] list: Split list_del() debug checking into separate function
- - -
-
-
-
2016-08-16
Kees Cook
New
[2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
- - -
-
-
-
2016-08-16
Kees Cook
New
[1/5] list: Split list_add() debug checking into separate function
- - -
-
-
-
2016-08-16
Kees Cook
New
[v2] x86/power/64: Restore processor state before using per-cpu variables
1 - 1
-
-
-
2016-08-12
Thomas Garnier
New
[7/7] arm64: Enable CONFIG_ARM64_TTBR0_PAN
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[6/7] arm64: xen: Enable user access before a privcmd hvc call
1 1 -
-
-
-
2016-08-12
Catalin Marinas
New
[5/7] arm64: Handle faults caused by inadvertent user access with PAN enabled
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[4/7] arm64: Disable TTBR0_EL1 during normal kernel execution
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[3/7] arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[2/7] arm64: Factor out TTBR0_EL1 setting into a specific asm macro
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[1/7] arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
- - -
-
-
-
2016-08-12
Catalin Marinas
New
[v1] x86/power/64: Restore processor state before using per-cpu variables
1 - -
-
-
-
2016-08-11
Thomas Garnier
New
Re: [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
- - -
-
-
-
2016-08-11
Thomas Garnier
New
Re: [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
- - -
-
-
-
2016-08-11
Rafael J. Wysocki
New
mm: Add the ram_latent_entropy kernel parameter
- - -
-
-
-
2016-08-10
Kees Cook
New
Re: [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
- - -
-
-
-
2016-08-10
Thomas Garnier
New
Re: [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
- - -
-
-
-
2016-08-10
Rafael J. Wysocki
New
Re: [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
- - -
-
-
-
2016-08-10
Rafael J. Wysocki
New
[v4,2/2] x86/KASLR: Increase BRK pages for KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v4,1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v3,2/2] x86/KASLR: Increase BRK pages for KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v3,1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v2,2/2] x86/KASLR: Increase BRK pages for KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v2,1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
- - -
-
-
-
2016-08-09
Thomas Garnier
New
[v1,2/2] x86/KASLR: Increase BRK pages for KASLR memory randomization
- - -
-
-
-
2016-08-08
Thomas Garnier
New
[v1,1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
- - -
-
-
-
2016-08-08
Thomas Garnier
New
[Resend] x86/power/64: Always create temporary identity mapping correctly
1 - -
-
-
-
2016-08-08
Rafael J. Wysocki
New
Re: [PATCH v2] x86/power/64: Support unaligned addresses for temporary mapping
- - -
-
-
-
2016-08-08
Yinghai Lu
New
«
1
2
...
53
54
55
…
56
57
»