Skip to content

Comments

Add support for Linux Kernel scanning#14

Open
Yan-Yan98 wants to merge 3 commits intogoogle:mainfrom
Yan-Yan98:adapt-for-linux-upstream
Open

Add support for Linux Kernel scanning#14
Yan-Yan98 wants to merge 3 commits intogoogle:mainfrom
Yan-Yan98:adapt-for-linux-upstream

Conversation

@Yan-Yan98
Copy link

Linux kernel scanning support
Add code extractor and tests for Linux kernel signature
generation.
Expand git_commit class to support fetching kernel sources.
Using the offline scanner and created signatures, one can
scan the kernel source tree.

Support for malformed cve files
In order to support osv.dev as vulnerability file source,
fix urls are added from the "References" field where the
vulnerability file does not offer this information in the
"Affected" OSV entry.

Fail_on_missing_field flag
Add flag "fail_on_missing_field" that controls behaviour
when encountering malformed vulnerabilities.
If set to false, the error is logged but does not abort the run.
This is helpful when running the signature generator for
many cves where we do not want to loose all progress.

Other small improvements (typo, more logs, memore usage).

@google-cla
Copy link

google-cla bot commented Dec 17, 2025

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

Add code extractor and tests for Linux kernel signature
generation.
Expand git_commit class to support fetching kernel sources.
Using the offline scanner and created signatures, one can
scan the kernel source tree.
@Yan-Yan98 Yan-Yan98 force-pushed the adapt-for-linux-upstream branch from 1c37c41 to 64a0432 Compare December 18, 2025 00:16
@doryiii doryiii self-assigned this Dec 18, 2025
@Yan-Yan98
Copy link
Author

Regarding the failing check: I requested access to our company internal Google CLA group. I will rerun the check once I got an answer regarding my request.

In order to support osv.dev as vulnerability file source,
fix urls are added from the "References" field where the
vulnerability file does not offer this information in the
"Affected" OSV entry.
Add flag "fail_on_missing_field" that controls behaviour
when encountering malformed vulnerabilities.
If set to false, the error is logged but does not abort the run.
This is helpful when running the signature generator for
many CVEs where we do not want to lose all progress.

Other small improvements (typo, more logs, memory usage).
@Yan-Yan98 Yan-Yan98 force-pushed the adapt-for-linux-upstream branch from 64a0432 to 2631611 Compare January 14, 2026 09:36
@doryiii
Copy link
Collaborator

doryiii commented Jan 16, 2026

Thanks. I'm taking care of some family emergency, but will take a look right when I get back.

@doryiii
Copy link
Collaborator

doryiii commented Feb 18, 2026

Regarding the failing check: I requested access to our company internal Google CLA group. I will rerun the check once I got an answer regarding my request.

Is there any update on the CLA?

@Yan-Yan98
Copy link
Author

Yan-Yan98 commented Feb 19, 2026

Regarding the failing check: I requested access to our company internal Google CLA group. I will rerun the check once I got an answer regarding my request.

Is there any update on the CLA?

First of all, I hope you and your family are doing well after that emergency!

We contacted Google a while ago but didn't get an answer yet. We will reach out again, but if this is blocking you in any way I can also sign a personal CLA agreement.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants