Show patches with: Submitter = Kees Cook       |    State = Action Required       |    Archived = No       |   255 patches
« 1 2 3 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches Untitled series #118663 - - - 0 0 0 2019-05-17 Kees Cook New
[v3,3/3] security: Implement Clang's stack initialization Refactor memory initialization hardening - - - 0 0 0 2019-04-23 Kees Cook New
[v3,2/3] security: Move stackleak config to Kconfig.hardening Refactor memory initialization hardening - - - 0 0 0 2019-04-23 Kees Cook New
[v3,1/3] security: Create "kernel hardening" config area Refactor memory initialization hardening - - - 0 0 0 2019-04-23 Kees Cook New
[v2,3/3] security: Implement Clang's stack initialization Refactor memory initialization hardening - - 1 0 0 0 2019-04-11 Kees Cook New
[v2,2/3] security: Move stackleak config to Kconfig.hardening Refactor memory initialization hardening - - - 0 0 0 2019-04-11 Kees Cook New
[v2,1/3] security: Create "kernel hardening" config area Refactor memory initialization hardening - - - 0 0 0 2019-04-11 Kees Cook New
[3/3] kbuild: Implement Clang's stack initialization Kconfig: Refactor memory initialization hardening - - - 0 0 0 2019-04-10 Kees Cook New
[2/3] kbuild: Move stackleak config to Kconfig.hardening Kconfig: Refactor memory initialization hardening - - - 0 0 0 2019-04-10 Kees Cook New
[1/3] Kconfig: Create "kernel hardening" config area Kconfig: Refactor memory initialization hardening - - - 0 0 0 2019-04-10 Kees Cook New
apparmor: Restore Y/N in /sys for apparmor's "enabled" apparmor: Restore Y/N in /sys for apparmor's "enabled" - 1 - 0 0 0 2019-04-08 Kees Cook New
LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" 1 - - 0 0 0 2019-03-29 Kees Cook New
doc: security: Add kern-doc for lsm_hooks.h doc: security: Add kern-doc for lsm_hooks.h - - - 0 0 0 2019-02-17 Kees Cook New
[v2] LSM: Ignore "security=" when "lsm=" is specified [v2] LSM: Ignore "security=" when "lsm=" is specified 2 - - 0 0 0 2019-02-12 Kees Cook New
LSM: Ignore "security=" when "lsm=" is specified LSM: Ignore "security=" when "lsm=" is specified - - - 0 0 0 2019-02-11 Kees Cook New
[3/3] lib: Introduce test_stackinit module gcc-plugins: Introduce stackinit plugin - - - 0 0 0 2019-01-23 Kees Cook New
[2/3] gcc-plugins: Introduce stackinit plugin gcc-plugins: Introduce stackinit plugin - - - 0 0 0 2019-01-23 Kees Cook New
[1/3] treewide: Lift switch variables out of switches gcc-plugins: Introduce stackinit plugin 2 1 - 0 0 0 2019-01-23 Kees Cook New
Yama: Check for pid death before checking ancestry Yama: Check for pid death before checking ancestry - - - 0 0 0 2019-01-16 Kees Cook New
[GIT,PULL] blob-stacking updates for security-next [GIT,PULL] blob-stacking updates for security-next - - - 0 0 0 2019-01-08 Kees Cook New
[GIT,PULL] loadpin updates for security-next [GIT,PULL] loadpin updates for security-next - - - 0 0 0 2018-10-18 Kees Cook New
[security-next,v5,30/30] capability: Initialize as LSM_ORDER_FIRST LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,29/30] LSM: Introduce enum lsm_order LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,28/30] Yama: Initialize as ordered LSM LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,27/30] LoadPin: Initialize as ordered LSM LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,26/30] LSM: Split LSM preparation from initialization LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,25/30] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,24/30] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,23/30] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,22/30] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,21/30] LSM: Refactor "security=" in terms of enable/disable LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,20/30] LSM: Prepare for reorganizing "security=" logic LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,19/30] LSM: Tie enabling logic to presence in ordered list LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,18/30] LSM: Introduce "lsm=" for boottime LSM selection LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,17/30] LSM: Introduce CONFIG_LSM LSM: Explict ordering - - - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,16/30] LSM: Build ordered list of LSMs to initialize LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,15/30] LSM: Lift LSM selection out of individual LSMs LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,14/30] LSM: Plumb visibility into optional "enabled" state LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,13/30] LoadPin: Rename boot param "enabled" to "enforce" LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,12/30] LSM: Provide separate ordered initialization LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,10/30] LSM: Don't ignore initialization failures LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,09/30] LSM: Provide init debugging infrastructure LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,08/30] LSM: Record LSM name in struct lsm_info LSM: Explict ordering - 1 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,07/30] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,05/30] LSM: Convert from initcall to struct lsm_info LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,04/30] LSM: Remove initcall tracing LSM: Explict ordering - 2 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,03/30] LSM: Rename .security_initcall section to .lsm_info LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,02/30] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v5,01/30] LSM: Correctly announce start of LSM initialization LSM: Explict ordering - 3 - 0 0 0 2018-10-11 Kees Cook New
[security-next,v4,32/32] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,30/32] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,29/32] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,28/32] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,27/32] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,26/32] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,25/32] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,24/32] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,23/32] selinux: Remove boot parameter LSM: Explict LSM ordering - - - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,22/32] apparmor: Remove boot parameter LSM: Explict LSM ordering - - - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,21/32] LSM: Finalize centralized LSM enabling logic LSM: Explict LSM ordering - - - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,20/32] LSM: Refactor "security=" in terms of enable/disable LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,19/32] LSM: Prepare for reorganizing "security=" logic LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,18/32] LSM: Introduce lsm.enable= and lsm.disable= LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,17/32] LSM: Introduce CONFIG_LSM_ENABLE LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,16/32] LSM: Prepare for arbitrary LSM enabling LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,15/32] LSM: Lift LSM selection out of individual LSMs LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,14/32] LSM: Plumb visibility into optional "enabled" state LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,13/32] LoadPin: Rename "enable" to "enforce" LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,12/32] LSM: Provide separate ordered initialization LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,10/32] LSM: Don't ignore initialization failures LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,09/32] LSM: Provide init debugging infrastructure LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,08/32] LSM: Record LSM name in struct lsm_info LSM: Explict LSM ordering - 1 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,07/32] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,05/32] LSM: Convert from initcall to struct lsm_info LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,04/32] LSM: Remove initcall tracing LSM: Explict LSM ordering - 2 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,03/32] LSM: Rename .security_initcall section to .lsm_info LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,02/32] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v4,01/32] LSM: Correctly announce start of LSM initialization LSM: Explict LSM ordering - 3 - 0 0 0 2018-10-02 Kees Cook New
[security-next,v3,29/29] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,28/29] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,27/29] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,26/29] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,25/29] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,24/29] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,23/29] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,22/29] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,21/29] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,20/29] LSM: Refactor "security=" in terms of enable/disable LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,19/29] LSM: Prepare for reorganizing "security=" logic LSM: Explict LSM ordering - 1 - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,18/29] LSM: Introduce lsm.enable= and lsm.disable= LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,17/29] LSM: Introduce CONFIG_LSM_ENABLE LSM: Explict LSM ordering - - - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,16/29] LSM: Prepare for arbitrary LSM enabling LSM: Explict LSM ordering - 1 - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,15/29] LSM: Lift LSM selection out of individual LSMs LSM: Explict LSM ordering - 1 - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,14/29] LSM: Plumb visibility into optional "enabled" state LSM: Explict LSM ordering - 1 - 0 0 0 2018-09-25 Kees Cook New
[security-next,v3,13/29] LoadPin: Rename "enable" to "enforce" LSM: Explict LSM ordering - 1 - 0 0 0 2018-09-25 Kees Cook New
« 1 2 3 »