Toggle navigation
Patchwork
Linux Hardening
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 5004 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
cel
Apply
«
1
2
...
47
48
49
…
50
51
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
net: dccp: Use memset_startat() for TP zeroing
net: dccp: Use memset_startat() for TP zeroing
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
ath11k: Use memset_startat() for clearing queue descriptors
ath11k: Use memset_startat() for clearing queue descriptors
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
iw_cxgb4: Use memset_startat() for cpl_t5_pass_accept_rpl
iw_cxgb4: Use memset_startat() for cpl_t5_pass_accept_rpl
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
tracing: Use memset_startat() to zero struct trace_iterator
tracing: Use memset_startat() to zero struct trace_iterator
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
IB/mthca: Use memset_startat() for clearing mpt_entry
IB/mthca: Use memset_startat() for clearing mpt_entry
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
media: omap3isp: Use struct_group() for memcpy() region
media: omap3isp: Use struct_group() for memcpy() region
- 1 -
-
-
-
2021-11-18
Kees Cook
Superseded
bnx2x: Use struct_group() for memcpy() region
bnx2x: Use struct_group() for memcpy() region
- 1 -
-
-
-
2021-11-18
Kees Cook
Mainlined
cxgb4: Use struct_group() for memcpy() region
cxgb4: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
intersil: Use struct_group() for memcpy() region
intersil: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Superseded
cxgb3: Use struct_group() for memcpy() region
cxgb3: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
libertas_tf: Use struct_group() for memcpy() region
libertas_tf: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
libertas: Use struct_group() for memcpy() region
libertas: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
sata_fsl: Use struct_group() for memcpy() region
sata_fsl: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
net/mlx5e: Use struct_group() for memcpy() region
net/mlx5e: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
thermal: intel: int340x_thermal: Use struct_group() for memcpy() region
thermal: intel: int340x_thermal: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Mainlined
mwl8k: Use struct_group() for memcpy() region
mwl8k: Use struct_group() for memcpy() region
- - -
-
-
-
2021-11-18
Kees Cook
Handled Elsewhere
skbuff: Switch structure bounds to struct_group()
skbuff: Switch structure bounds to struct_group()
- 2 -
-
-
-
2021-11-18
Kees Cook
Superseded
pstore/blk: Use "%lu" to format unsigned long
pstore/blk: Use "%lu" to format unsigned long
- 1 -
-
-
-
2021-11-18
Kees Cook
Mainlined
ipv6: check return value of ipv6_skip_exthdr
ipv6: check return value of ipv6_skip_exthdr
- - -
-
-
-
2021-11-17
Jordy Zomer
kees
Changes Requested
Revert "mark pstore-blk as broken"
Revert "mark pstore-blk as broken"
- - -
-
-
-
2021-11-16
Kees Cook
kees
Mainlined
kasan: test: Silence intentional read overflow warnings
kasan: test: Silence intentional read overflow warnings
1 1 -
-
-
-
2021-11-16
Kees Cook
kees
Mainlined
net/mlx5e: Avoid field-overflowing memcpy()
net/mlx5e: Avoid field-overflowing memcpy()
- - -
-
-
-
2021-11-15
Kees Cook
kees
Superseded
[v5,1/1,ARM] Add support for TLS register based stack protector canary access
implement TLS register based stack canary for ARM
- - -
-
-
-
2021-11-15
Ard Biesheuvel
kees
Not Applicable
[v3] kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
[v3] kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
- - -
-
-
-
2021-11-15
Gustavo A. R. Silva
Mainlined
[v2] kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
[v2] kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
- - -
-
-
-
2021-11-15
Gustavo A. R. Silva
Superseded
kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
kbuild: Fix -Wimplicit-fallthrough=5 error for GCC 5.x and 6.x
- - -
-
-
-
2021-11-15
Gustavo A. R. Silva
Superseded
kconfig: Add support for -Wimplicit-fallthrough
kconfig: Add support for -Wimplicit-fallthrough
- 1 1
-
-
-
2021-11-14
Gustavo A. R. Silva
Mainlined
[GIT,PULL] Enable -Wimplicit-fallthrough for Clang for 5.16-rc1
[GIT,PULL] Enable -Wimplicit-fallthrough for Clang for 5.16-rc1
- - -
-
-
-
2021-11-13
Gustavo A. R. Silva
GustavoARSilva
Rejected
[next] scsi: Replace one-element arrays with flexible-array members
[next] scsi: Replace one-element arrays with flexible-array members
- - -
-
-
-
2021-11-05
Gustavo A. R. Silva
kees
Changes Requested
[2/2] selftests/seccomp: Report event mismatches more clearly
selftests/seccomp: Report event mismatches more clearly
- - -
-
-
-
2021-11-03
Kees Cook
kees
Mainlined
[1/2] selftests/seccomp: Stop USER_NOTIF test if kcmp() fails
selftests/seccomp: Report event mismatches more clearly
- - -
-
-
-
2021-11-03
Kees Cook
kees
Mainlined
[RFC/RFT] AARCH64: Add gcc Shadow Call Stack support
[RFC/RFT] AARCH64: Add gcc Shadow Call Stack support
- - -
-
-
-
2021-11-02
Dan Li
kees
Changes Requested
[RFC,PR102768] aarch64: Add compiler support for Shadow Call Stack
[RFC,PR102768] aarch64: Add compiler support for Shadow Call Stack
- - -
-
-
-
2021-11-02
Dan Li
kees
Superseded
[GIT,PULL] fallthrough fixes for Clang for 5.16-rc1
[GIT,PULL] fallthrough fixes for Clang for 5.16-rc1
- - -
-
-
-
2021-11-01
Gustavo A. R. Silva
Mainlined
[GIT,PULL] Various hardening fixes and cleanups for 5.16-rc1
[GIT,PULL] Various hardening fixes and cleanups for 5.16-rc1
- - -
-
-
-
2021-11-01
Gustavo A. R. Silva
Mainlined
[GIT,PULL] overflow updates for v5.16-rc1
[GIT,PULL] overflow updates for v5.16-rc1
- - -
-
-
-
2021-11-01
Kees Cook
Awaiting Upstream
[GIT,PULL] hardening updates for v5.16-rc1
[GIT,PULL] hardening updates for v5.16-rc1
- - -
-
-
-
2021-11-01
Kees Cook
Awaiting Upstream
static_call,x86: Robustify trampoline patching
static_call,x86: Robustify trampoline patching
- - -
-
-
-
2021-10-30
Peter Zijlstra
kees
Mainlined
[v3,next] virt: acrn: Prefer array_size and struct_size over open coded arithmetic
[v3,next] virt: acrn: Prefer array_size and struct_size over open coded arithmetic
1 - -
-
-
-
2021-10-29
Len Baker
GustavoARSilva
Mainlined
signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed
signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed
- - 1
-
-
-
2021-10-29
Eric W. Biederman
Mainlined
[v4,1/1,ARM] Add support for TLS register based stack protector canary access
implement TLS register based stack canary for ARM
- - -
-
-
-
2021-10-28
Ard Biesheuvel
kees
Superseded
gcc-plugins: use swap() to make code cleaner
gcc-plugins: use swap() to make code cleaner
- - -
-
-
-
2021-10-28
CGEL
kees
Changes Requested
[v2,2/2] sysctl: introduce kernel.pkill_on_warn
[v2,1/2] bug: do refactoring allowing to add a warning handling action
- - -
-
-
-
2021-10-27
Alexander Popov
kees
Changes Requested
[v2,1/2] bug: do refactoring allowing to add a warning handling action
[v2,1/2] bug: do refactoring allowing to add a warning handling action
- - -
-
-
-
2021-10-27
Alexander Popov
kees
Changes Requested
[v2,0/2] Introduce the pkill_on_warn parameter
- - -
-
-
-
2021-10-27
Alexander Popov
kees
Changes Requested
[v3,1/1,ARM] Add support for TLS register based stack protector canary access
implement TLS register based stack canary for ARM
- - 1
-
-
-
2021-10-26
Ard Biesheuvel
kees
Superseded
[v2] fortify: Avoid shadowing previous locals
[v2] fortify: Avoid shadowing previous locals
- - -
-
-
-
2021-10-25
Qian Cai
kees
Mainlined
fortify: Avoid shadowing previous locals
fortify: Avoid shadowing previous locals
- - -
-
-
-
2021-10-25
Qian Cai
kees
Superseded
nvmet: prefer flex_array_size and struct_size over open coded arithmetic
nvmet: prefer flex_array_size and struct_size over open coded arithmetic
- 3 -
-
-
-
2021-10-24
Len Baker
Mainlined
[v2,next] sysctl: Avoid open coded arithmetic in memory allocator functions
[v2,next] sysctl: Avoid open coded arithmetic in memory allocator functions
- - -
-
-
-
2021-10-23
Len Baker
GustavoARSilva
Rejected
[v2,next] virt: acrn: Prefer array_size and struct_size over open coded arithmetic
[v2,next] virt: acrn: Prefer array_size and struct_size over open coded arithmetic
1 - -
-
-
-
2021-10-23
Len Baker
GustavoARSilva
Superseded
[2/2] lkdtm/bugs: Check that a per-task stack canary exists
lkdtm/bugs: Check that a per-task stack canary exists
- - -
-
-
-
2021-10-22
Kees Cook
Mainlined
[1/2] selftests/lkdtm: Add way to repeat a test
lkdtm/bugs: Check that a per-task stack canary exists
- - -
-
-
-
2021-10-22
Kees Cook
Mainlined
[RFC,v2,1/1,ARM] Add support for TLS register based stack protector canary access
implement TLS register based stack canary for ARM
- - -
-
-
-
2021-10-21
Ard Biesheuvel
kees
Superseded
mm/secretmem: Avoid letting secretmem_users drop to zero
mm/secretmem: Avoid letting secretmem_users drop to zero
- 3 -
-
-
-
2021-10-21
Kees Cook
kees
Rejected
[RFC,1/1,ARM] Add support for TLS register based stack protector canary access
implement TLS register based stack canary for ARM
- - -
-
-
-
2021-10-21
Ard Biesheuvel
Superseded
compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer
compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer
1 1 -
-
-
-
2021-10-20
Kees Cook
kees
Mainlined
kasan: test: Consolidate workarounds for unwanted __alloc_size() protection
kasan: test: Consolidate workarounds for unwanted __alloc_size() protection
1 - -
-
-
-
2021-10-20
Kees Cook
kees
Superseded
[2/2] gcc-plugins: Remove cyc_complexity
gcc-plugins: Explicitly document purpose and deprecation schedule
- 2 -
-
-
-
2021-10-20
Kees Cook
kees
Mainlined
[1/2] gcc-plugins: Explicitly document purpose and deprecation schedule
gcc-plugins: Explicitly document purpose and deprecation schedule
- 2 -
-
-
-
2021-10-20
Kees Cook
kees
Mainlined
[V1] gcc-plugins: remove duplicate include in gcc-common.h
[V1] gcc-plugins: remove duplicate include in gcc-common.h
- - -
-
-
-
2021-10-19
CGEL
kees
Mainlined
mm/list_lru.c: prefer struct_size over open coded arithmetic
mm/list_lru.c: prefer struct_size over open coded arithmetic
- - -
-
-
-
2021-10-17
Len Baker
GustavoARSilva
Mainlined
nvmet: prefer struct_size over open coded arithmetic
nvmet: prefer struct_size over open coded arithmetic
- - -
-
-
-
2021-10-17
Len Baker
GustavoARSilva
Changes Requested
sysctl: Avoid open coded arithmetic in memory allocator functions
sysctl: Avoid open coded arithmetic in memory allocator functions
- - -
-
-
-
2021-10-16
Len Baker
Superseded
[V5] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
[V5] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
1 - -
-
-
-
2021-10-15
Dan Li
Changes Requested
[next] powerpc/vas: Fix potential NULL pointer dereference
[next] powerpc/vas: Fix potential NULL pointer dereference
- 1 -
-
-
-
2021-10-15
Gustavo A. R. Silva
GustavoARSilva
Mainlined
video: omapfb: Fix fall-through warning for Clang
video: omapfb: Fix fall-through warning for Clang
- - -
-
-
-
2021-10-14
Gustavo A. R. Silva
Mainlined
[V4] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
[V4] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
1 - -
-
-
-
2021-10-13
Dan Li
Superseded
[v5,15/15] x86, build: Allow CONFIG_CFI_CLANG to be selected
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,14/15] x86, kprobes: Fix optprobe_template_func type mismatch
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,13/15] x86, cpu: Use LTO for cpu.c with CFI
x86: Add support for Clang CFI
- 2 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,12/15] x86, module: Ignore __typeid__ relocations
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,11/15] x86, relocs: Ignore __typeid__ relocations
x86: Add support for Clang CFI
- - 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,10/15] x86/purgatory: Disable CFI
x86: Add support for Clang CFI
- 2 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,09/15] x86: Use an opaque type for functions not callable from C
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,08/15] lkdtm: Use an opaque type for lkdtm_rodata_do_nothing
x86: Add support for Clang CFI
1 - 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,07/15] lkdtm: Disable UNSET_SMEP with CFI
x86: Add support for Clang CFI
1 - 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,06/15] ftrace: Use an opaque type for functions not callable from C
x86: Add support for Clang CFI
- 2 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,05/15] tracepoint: Exclude tp_stub_func from CFI checking
x86: Add support for Clang CFI
- 3 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,04/15] cfi: Add DEFINE_CFI_IMMEDIATE_RETURN_STUB
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,03/15] linkage: Add DECLARE_NOT_CALLED_FROM_C
x86: Add support for Clang CFI
- 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,02/15] objtool: Add ASM_STACK_FRAME_NON_STANDARD
x86: Add support for Clang CFI
1 1 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[v5,01/15] objtool: Add CONFIG_CFI_CLANG support
x86: Add support for Clang CFI
1 2 2
-
-
-
2021-10-13
Sami Tolvanen
Changes Requested
[V3] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
[V3] ARM64: SCS: Add gcc plugin to support Shadow Call Stack
- - -
-
-
-
2021-10-13
Dan Li
Superseded
[4/4] vmlinux.lds.h: Have ORC lookup cover entire _etext - _stext
x86: Various clean-ups in support of FGKASLR
1 2 1
-
-
-
2021-10-13
Kees Cook
Mainlined
[3/4] x86/boot/compressed: Avoid duplicate malloc() implementations
x86: Various clean-ups in support of FGKASLR
- - -
-
-
-
2021-10-13
Kees Cook
Mainlined
[2/4] x86/boot: Allow a "silent" kaslr random byte fetch
x86: Various clean-ups in support of FGKASLR
- 1 -
-
-
-
2021-10-13
Kees Cook
Mainlined
[1/4] x86/tools/relocs: Support >64K section headers
x86: Various clean-ups in support of FGKASLR
1 2 1
-
-
-
2021-10-13
Kees Cook
Mainlined
LSM: Avoid warnings about potentially unused hook variables
LSM: Avoid warnings about potentially unused hook variables
2 - -
-
-
-
2021-10-13
Kees Cook
Mainlined
[RFC,9/9] arm64: implement dynamic shadow call stack for GCC
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,8/9] arm64: unwind: add asynchronous unwind tables to the kernel proper
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,7/9] arm64: assembler: add unwind annotations to frame push/pop macros
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,6/9] arm64: smccc: create proper stack frames for HVC/SMC calls
arm64: use unwind data on GCC for shadow call stack
- 1 -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,5/9] arm64: chacha-neon: move frame pop forward
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,4/9] arm64: aes-neonbs: move frame pop to end of function
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,3/9] arm64: crypto: avoid overlapping linkage definitions for AES-CBC
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,2/9] arm64: cache: use ALIAS version of linkage macros for local aliases
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[RFC,1/9] arm64: assembler: enable PAC for non-leaf assembler routines
arm64: use unwind data on GCC for shadow call stack
- - -
-
-
-
2021-10-13
Ard Biesheuvel
RFC
[2/2] kasan: use fortified strings for hwaddress sanitizer
[1/2] kasan: test: use underlying string helpers
- - -
-
-
-
2021-10-13
Arnd Bergmann
Changes Requested
[1/2] kasan: test: use underlying string helpers
[1/2] kasan: test: use underlying string helpers
- 1 -
-
-
-
2021-10-13
Arnd Bergmann
Changes Requested
«
1
2
...
47
48
49
…
50
51
»