Show patches with: Submitter = Kees Cook       |    State = Action Required       |   394 patches
« 1 2 3 4 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v3,08/19] fs/kernel_read_file: Remove redundant size argument Introduce partial kernel_read_file() support 1 1 - --- 2020-07-24 Kees Cook New
[v3,07/19] fs/kernel_read_file: Split into separate source file Introduce partial kernel_read_file() support 1 1 - --- 2020-07-24 Kees Cook New
[v3,06/19] fs/kernel_read_file: Split into separate include file Introduce partial kernel_read_file() support 1 2 - --- 2020-07-24 Kees Cook New
[v3,05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum Introduce partial kernel_read_file() support 1 - - --- 2020-07-24 Kees Cook New
[v3,04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum Introduce partial kernel_read_file() support 1 1 - --- 2020-07-24 Kees Cook New
[v3,03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer Introduce partial kernel_read_file() support 1 - - --- 2020-07-24 Kees Cook New
[v3,02/19] selftest/firmware: Add selftest timeout in settings Introduce partial kernel_read_file() support 1 1 - --- 2020-07-24 Kees Cook New
[v3,01/19] test_firmware: Test platform fw loading on non-EFI systems Introduce partial kernel_read_file() support 1 - - --- 2020-07-24 Kees Cook New
[13/13] fs/kernel_file_read: Add "offset" arg for partial reads Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[12/13] LSM: Add "contents" flag to kernel_read_file hook Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[11/13] module: Call security_kernel_post_load_data() Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[10/13] firmware_loader: Use security_post_load_data() Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[09/13] LSM: Introduce kernel_post_load_data() hook Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[08/13] fs/kernel_read_file: Add file_size output argument Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[07/13] fs/kernel_read_file: Switch buffer size arg to size_t Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[06/13] fs/kernel_read_file: Remove redundant size argument Introduce partial kernel_read_file() support - - - --- 2020-07-17 Kees Cook New
[05/13] fs/kernel_read_file: Split into separate source file Introduce partial kernel_read_file() support 1 - - --- 2020-07-17 Kees Cook New
[04/13] fs/kernel_read_file: Split into separate include file Introduce partial kernel_read_file() support 1 1 - --- 2020-07-17 Kees Cook New
[03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum Introduce partial kernel_read_file() support 1 - - --- 2020-07-17 Kees Cook New
[02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum Introduce partial kernel_read_file() support 1 - - --- 2020-07-17 Kees Cook New
[01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer Introduce partial kernel_read_file() support 1 - - --- 2020-07-17 Kees Cook New
[4/4] module: Add hook for security_kernel_post_read_file() Fix misused kernel_read_file() enums - - - --- 2020-07-07 Kees Cook New
[3/4] fs: Remove FIRMWARE_EFI_EMBEDDED from kernel_read_file() enums Fix misused kernel_read_file() enums - - - --- 2020-07-07 Kees Cook New
[2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums Fix misused kernel_read_file() enums - - - --- 2020-07-07 Kees Cook New
[1/4] firmware_loader: EFI firmware loader must handle pre-allocated buffer Fix misused kernel_read_file() enums - - - --- 2020-07-07 Kees Cook New
[8/8,DEBUG] seccomp: Report bitmap coverage ranges seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[7/8] x86: Enable seccomp constant action bitmaps seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[6/8] x86: Provide API for local kernel TLB flushing seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[5/8] selftests/seccomp: Compare bitmap vs filter overhead seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[4/8] seccomp: Implement constant action bitmaps seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[2/8] seccomp: Use pr_fmt seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[1/8] selftests/seccomp: Improve calibration loop seccomp: Implement constant action bitmaps - - - --- 2020-06-16 Kees Cook New
[4/4] fs: Include FMODE_EXEC when converting flags to f_mode Relocate execve() sanity checks - - - --- 2020-05-18 Kees Cook New
[3/4] exec: Relocate path_noexec() check Relocate execve() sanity checks - - - --- 2020-05-18 Kees Cook New
[2/4] exec: Relocate S_ISREG() check Relocate execve() sanity checks - - - --- 2020-05-18 Kees Cook New
[1/4] exec: Change uselib(2) IS_SREG() failure to EACCES Relocate execve() sanity checks 1 - - --- 2020-05-18 Kees Cook New
securityfs: Add missing d_delete() call on removal securityfs: Add missing d_delete() call on removal - - - --- 2020-05-05 Kees Cook New
x86/mtrr: Require CAP_SYS_ADMIN for all access x86/mtrr: Require CAP_SYS_ADMIN for all access 1 1 - --- 2019-11-18 Kees Cook New
[5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches Untitled series #118663 - - - --- 2019-05-17 Kees Cook New
[v3,3/3] security: Implement Clang's stack initialization Refactor memory initialization hardening - - - --- 2019-04-23 Kees Cook New
[v3,2/3] security: Move stackleak config to Kconfig.hardening Refactor memory initialization hardening - - - --- 2019-04-23 Kees Cook New
[v3,1/3] security: Create "kernel hardening" config area Refactor memory initialization hardening - - - --- 2019-04-23 Kees Cook New
[v2,3/3] security: Implement Clang's stack initialization Refactor memory initialization hardening - - 1 --- 2019-04-11 Kees Cook New
[v2,2/3] security: Move stackleak config to Kconfig.hardening Refactor memory initialization hardening - - - --- 2019-04-11 Kees Cook New
[v2,1/3] security: Create "kernel hardening" config area Refactor memory initialization hardening - - - --- 2019-04-11 Kees Cook New
[3/3] kbuild: Implement Clang's stack initialization Kconfig: Refactor memory initialization hardening - - - --- 2019-04-10 Kees Cook New
[2/3] kbuild: Move stackleak config to Kconfig.hardening Kconfig: Refactor memory initialization hardening - - - --- 2019-04-10 Kees Cook New
[1/3] Kconfig: Create "kernel hardening" config area Kconfig: Refactor memory initialization hardening - - - --- 2019-04-10 Kees Cook New
apparmor: Restore Y/N in /sys for apparmor's "enabled" apparmor: Restore Y/N in /sys for apparmor's "enabled" - 1 - --- 2019-04-08 Kees Cook New
LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" 1 - - --- 2019-03-29 Kees Cook New
doc: security: Add kern-doc for lsm_hooks.h doc: security: Add kern-doc for lsm_hooks.h - - - --- 2019-02-17 Kees Cook New
[v2] LSM: Ignore "security=" when "lsm=" is specified [v2] LSM: Ignore "security=" when "lsm=" is specified 2 - - --- 2019-02-12 Kees Cook New
LSM: Ignore "security=" when "lsm=" is specified LSM: Ignore "security=" when "lsm=" is specified - - - --- 2019-02-11 Kees Cook New
[3/3] lib: Introduce test_stackinit module gcc-plugins: Introduce stackinit plugin - - - --- 2019-01-23 Kees Cook New
[2/3] gcc-plugins: Introduce stackinit plugin gcc-plugins: Introduce stackinit plugin - - - --- 2019-01-23 Kees Cook New
[1/3] treewide: Lift switch variables out of switches gcc-plugins: Introduce stackinit plugin 2 1 - --- 2019-01-23 Kees Cook New
Yama: Check for pid death before checking ancestry Yama: Check for pid death before checking ancestry - - - --- 2019-01-16 Kees Cook New
[GIT,PULL] blob-stacking updates for security-next [GIT,PULL] blob-stacking updates for security-next - - - --- 2019-01-08 Kees Cook New
[GIT,PULL] loadpin updates for security-next [GIT,PULL] loadpin updates for security-next - - - --- 2018-10-18 Kees Cook New
[security-next,v5,30/30] capability: Initialize as LSM_ORDER_FIRST LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,29/30] LSM: Introduce enum lsm_order LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,28/30] Yama: Initialize as ordered LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,27/30] LoadPin: Initialize as ordered LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,26/30] LSM: Split LSM preparation from initialization LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,25/30] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,24/30] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,23/30] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,22/30] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,21/30] LSM: Refactor "security=" in terms of enable/disable LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,20/30] LSM: Prepare for reorganizing "security=" logic LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,19/30] LSM: Tie enabling logic to presence in ordered list LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,18/30] LSM: Introduce "lsm=" for boottime LSM selection LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,17/30] LSM: Introduce CONFIG_LSM LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,16/30] LSM: Build ordered list of LSMs to initialize LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,15/30] LSM: Lift LSM selection out of individual LSMs LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,14/30] LSM: Plumb visibility into optional "enabled" state LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,13/30] LoadPin: Rename boot param "enabled" to "enforce" LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,12/30] LSM: Provide separate ordered initialization LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,10/30] LSM: Don't ignore initialization failures LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,09/30] LSM: Provide init debugging infrastructure LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,08/30] LSM: Record LSM name in struct lsm_info LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,07/30] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,05/30] LSM: Convert from initcall to struct lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,04/30] LSM: Remove initcall tracing LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,03/30] LSM: Rename .security_initcall section to .lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,02/30] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,01/30] LSM: Correctly announce start of LSM initialization LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v4,32/32] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,30/32] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,29/32] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,28/32] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,27/32] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,26/32] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,25/32] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,24/32] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,23/32] selinux: Remove boot parameter LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
« 1 2 3 4 »