Toggle navigation
Patchwork
Linux Kernel Build mailing list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Kees Cook
| State =
Action Required
| 281 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[07/64] staging: rtl8192e: Use struct_group() for memcpy() region
Introduce strict memcpy() bounds checking
2 - 1
-
-
-
2021-07-27
Kees Cook
New
[06/64] bnxt_en: Use struct_group_attr() for memcpy() region
Introduce strict memcpy() bounds checking
- 2 -
-
-
-
2021-07-27
Kees Cook
New
[05/64] skbuff: Switch structure bounds to struct_group()
Introduce strict memcpy() bounds checking
- 1 -
-
-
-
2021-07-27
Kees Cook
New
[04/64] stddef: Introduce struct_group() helper macro
Introduce strict memcpy() bounds checking
1 - -
-
-
-
2021-07-27
Kees Cook
New
[03/64] rpmsg: glink: Replace strncpy() with strscpy_pad()
Introduce strict memcpy() bounds checking
- 1 -
-
-
-
2021-07-27
Kees Cook
New
[02/64] mac80211: Use flex-array for radiotap header bitmap
Introduce strict memcpy() bounds checking
- - -
-
-
-
2021-07-27
Kees Cook
New
[01/64] media: omap3isp: Extract struct group for memcpy() region
Introduce strict memcpy() bounds checking
- - -
-
-
-
2021-07-27
Kees Cook
New
Makefile: Introduce CONFIG_ZERO_CALL_USED_REGS
Makefile: Introduce CONFIG_ZERO_CALL_USED_REGS
- - -
-
-
-
2021-05-05
Kees Cook
New
[v2,7/7] ubsan: Expand tests and reporting
Clean up UBSAN Makefile
- - -
-
-
-
2020-12-03
Kees Cook
New
[v2,6/7] ubsan: Remove UBSAN_MISC in favor of individual options
Clean up UBSAN Makefile
- - -
-
-
-
2020-12-03
Kees Cook
New
[v2,5/7] ubsan: Enable for all*config builds
Clean up UBSAN Makefile
- - -
-
-
-
2020-12-03
Kees Cook
New
[v2,4/7] ubsan: Disable UBSAN_TRAP for all*config
Clean up UBSAN Makefile
- 1 -
-
-
-
2020-12-03
Kees Cook
New
[v2,3/7] ubsan: Disable object-size sanitizer under GCC
Clean up UBSAN Makefile
- 1 -
-
-
-
2020-12-03
Kees Cook
New
[v2,2/7] ubsan: Move cc-option tests into Kconfig
Clean up UBSAN Makefile
- 1 1
-
-
-
2020-12-03
Kees Cook
New
[v2,1/7] ubsan: Remove redundant -Wno-maybe-uninitialized
Clean up UBSAN Makefile
- - -
-
-
-
2020-12-03
Kees Cook
New
[4/4] ubsan: Disable UBSAN_TRAP for all*config
Clean up UBSAN Makefile
- 1 -
-
-
-
2020-10-02
Kees Cook
New
[3/4] ubsan: Force -Wno-maybe-uninitialized only for GCC
Clean up UBSAN Makefile
- - -
-
-
-
2020-10-02
Kees Cook
New
[2/4] ubsan: Disable object-size sanitizer under GCC
Clean up UBSAN Makefile
- 1 -
-
-
-
2020-10-02
Kees Cook
New
[1/4] ubsan: Move cc-option tests into Kconfig
Clean up UBSAN Makefile
- 1 1
-
-
-
2020-10-02
Kees Cook
New
kbuild: Provide way to actually disable stack protector
kbuild: Provide way to actually disable stack protector
- - -
-
-
-
2020-06-22
Kees Cook
New
kbuild: mkcompile_h: Include $LD version in /proc/version
kbuild: mkcompile_h: Include $LD version in /proc/version
- 4 3
-
-
-
2020-04-02
Kees Cook
New
[bpf-next,v2] kbuild: Remove debug info from kallsyms linking
[bpf-next,v2] kbuild: Remove debug info from kallsyms linking
1 - -
-
-
-
2020-03-04
Kees Cook
New
[9/9] arm/boot: Warn on orphan section placement
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[8/9] arm/build: Warn on orphan section placement
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[7/9] arm64/build: Warn on orphan section placement
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[6/9] arm64/build: Use common DISCARDS in linker script
Enable orphan section warning
1 - -
-
-
-
2020-02-28
Kees Cook
New
[5/9] Add RUNTIME_DISCARD_EXIT to generic DISCARDS
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[4/9] x86/boot: Warn on orphan section placement
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[3/9] x86/build: Warn on orphan section placement
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[2/9] vmlinux.lds.h: Add .gnu.version* to DISCARDS
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
[1/9] scripts/link-vmlinux.sh: Delay orphan handling warnings until final link
Enable orphan section warning
- - -
-
-
-
2020-02-28
Kees Cook
New
kbuild: Remove debug info from kallsyms linking
kbuild: Remove debug info from kallsyms linking
1 - -
-
-
-
2020-02-25
Kees Cook
New
[v2] kbuild: Parameterize kallsyms generation and correct reporting
[v2] kbuild: Parameterize kallsyms generation and correct reporting
- - -
-
-
-
2019-08-13
Kees Cook
New
kbuild: Parameterize kallsyms generation and correct reporting
kbuild: Parameterize kallsyms generation and correct reporting
- - -
-
-
-
2019-08-12
Kees Cook
New
[v3,3/3] security: Implement Clang's stack initialization
Refactor memory initialization hardening
- - -
-
-
-
2019-04-23
Kees Cook
New
[v3,2/3] security: Move stackleak config to Kconfig.hardening
Refactor memory initialization hardening
- - -
-
-
-
2019-04-23
Kees Cook
New
[v3,1/3] security: Create "kernel hardening" config area
Refactor memory initialization hardening
- - -
-
-
-
2019-04-23
Kees Cook
New
[v2,3/3] security: Implement Clang's stack initialization
Refactor memory initialization hardening
- - 1
-
-
-
2019-04-11
Kees Cook
New
[v2,2/3] security: Move stackleak config to Kconfig.hardening
Refactor memory initialization hardening
- - -
-
-
-
2019-04-11
Kees Cook
New
[v2,1/3] security: Create "kernel hardening" config area
Refactor memory initialization hardening
- - -
-
-
-
2019-04-11
Kees Cook
New
[3/3] kbuild: Implement Clang's stack initialization
Kconfig: Refactor memory initialization hardening
- - -
-
-
-
2019-04-10
Kees Cook
New
[2/3] kbuild: Move stackleak config to Kconfig.hardening
Kconfig: Refactor memory initialization hardening
- - -
-
-
-
2019-04-10
Kees Cook
New
[1/3] Kconfig: Create "kernel hardening" config area
Kconfig: Refactor memory initialization hardening
- - -
-
-
-
2019-04-10
Kees Cook
New
[3/3] lib: Introduce test_stackinit module
gcc-plugins: Introduce stackinit plugin
- - -
-
-
-
2019-01-23
Kees Cook
New
[2/3] gcc-plugins: Introduce stackinit plugin
gcc-plugins: Introduce stackinit plugin
- - -
-
-
-
2019-01-23
Kees Cook
New
[1/3] treewide: Lift switch variables out of switches
gcc-plugins: Introduce stackinit plugin
2 1 -
-
-
-
2019-01-23
Kees Cook
New
[GIT,PULL] VLA removal for v4.20-rc1
[GIT,PULL] VLA removal for v4.20-rc1
- - -
-
-
-
2018-10-28
Kees Cook
New
[RFC] Makefile: globally enable VLA warning
- - -
-
-
-
2018-06-26
Kees Cook
New
[v2,3/3] Makefile: Introduce CONFIG_CC_STACKPROTECTOR_AUTO
- - -
-
-
-
2017-11-07
Kees Cook
New
[v2,2/3] Makefile: Move stack-protector availability out of Kconfig
- - -
-
-
-
2017-11-07
Kees Cook
New
[v2,1/3] Makefile: Move stack-protector compiler breakage test earlier
- - -
-
-
-
2017-11-07
Kees Cook
New
[kernel-hardening] Re: [PATCH 2/3] Makefile: Move stackprotector availability out of Kconfig
- - -
-
-
-
2017-10-04
Kees Cook
New
Makefile: Fix CONFIG_CC_STACKPROTECTOR_AUTO to not enable SSP
- - -
-
-
-
2017-10-03
Kees Cook
New
[3/3] Makefile: Introduce CONFIG_CC_STACKPROTECTOR_AUTO
- - -
-
-
-
2017-10-02
Kees Cook
New
[2/3] Makefile: Move stackprotector availability out of Kconfig
- - -
-
-
-
2017-10-02
Kees Cook
New
[1/3] sh/boot: Add static stack-protector to pre-kernel
- - -
-
-
-
2017-10-02
Kees Cook
New
[v2] Kbuild: make designated_init attribute fatal
- - -
-
-
-
2017-03-21
Kees Cook
New
Kbuild: support designated_init attribute
- - -
-
-
-
2017-02-01
Kees Cook
New
[v4,0/4] Introduce the initify gcc plugin
- - -
-
-
-
2017-01-12
Kees Cook
New
[v4,4/4] initify: Mark functions with the __unverified_nocapture attribute
- - -
-
-
-
2016-12-16
Kees Cook
New
[v4,3/4] initify: Mark functions with the __nocapture attribute
- - -
-
-
-
2016-12-16
Kees Cook
New
[v4,2/4] util: Move type casts into is_kernel_rodata
- - -
-
-
-
2016-12-16
Kees Cook
New
[v4,1/4] gcc-plugins: Add the initify gcc plugin
- - -
-
-
-
2016-12-16
Kees Cook
New
builddeb: Skip gcc-plugins when not configured
- - 1
-
-
-
2016-08-15
Kees Cook
New
[4.8-rc1] make bindeb-pkg O= fails
- - -
-
-
-
2016-08-14
Kees Cook
New
[v2] kbuild: Abort build on bad stack protector flag
- - -
-
-
-
2016-07-26
Kees Cook
New
[RESEND] kbuild: Abort build on bad stack protector flag
- - -
-
-
-
2016-07-12
Kees Cook
New
[RFC] gcc-plugins: abort builds cleanly when not supported
- - -
-
-
-
2016-06-18
Kees Cook
New
kbuild: Abort build on bad stack protector flag
- - -
-
-
-
2016-06-18
Kees Cook
New
kbuild: disable Android-specific compiler features
- - -
-
-
-
2016-02-06
Kees Cook
New
kbuild: explain stack-protector-strong CONFIG logic
- - -
-
-
-
2014-07-03
Kees Cook
New
[v5,2/2] provide -fstack-protector-strong build option
- - -
-
-
-
2013-12-19
Kees Cook
New
[v5,1/2] create HAVE_CC_STACKPROTECTOR for centralized use
- - -
-
-
-
2013-12-19
Kees Cook
New
[v4,2/2] provide -fstack-protector-strong build option
- - -
-
-
-
2013-12-18
Kees Cook
New
[v4,1/2] create HAVE_CC_STACKPROTECTOR for centralized use
- - -
-
-
-
2013-12-18
Kees Cook
New
[v3,2/2] provide -fstack-protector-strong build option
- - -
-
-
-
2013-12-17
Kees Cook
New
[v3,1/2] create HAVE_CC_STACKPROTECTOR for centralized use
- - -
-
-
-
2013-12-17
Kees Cook
New
kbuild: replace unbounded sprintf call in modpost
- - -
-
-
-
2013-10-25
Kees Cook
New
[v2] kconfig: switch to "long long" for sanity
- - -
-
-
-
2013-07-18
Kees Cook
New
kconfig: switch to "long long" for sanity
- - -
-
-
-
2013-07-18
Kees Cook
New
kconfig: allow "hex" and "range" to support longs
- - -
-
-
-
2013-06-28
Kees Cook
New
«
1
2
3
»