| Commit message (Expand) | Author | Age | Files | Lines |
* | hardening: Enable i386 FORTIFY_SOURCE on Clang 16+ | Kees Cook | 2025-03-08 | 1 | -1/+1 |
* | fortify: Move FORTIFY_SOURCE under 'Kernel hardening options' | Mel Gorman | 2025-02-28 | 1 | -0/+9 |
* | mm: security: Allow default HARDENED_USERCOPY to be set at compile time | Mel Gorman | 2025-02-28 | 1 | -0/+8 |
* | mm: security: Move hardened usercopy under 'Kernel hardening options' | Mel Gorman | 2025-02-28 | 1 | -0/+16 |
* | hardening: Document INIT_STACK_ALL_PATTERN behavior with GCC | Geert Uytterhoeven | 2025-01-08 | 1 | -0/+1 |
* | hardening: Adjust dependencies in selection of MODVERSIONS | Nathan Chancellor | 2024-09-28 | 1 | -2/+2 |
* | Revert "mm: init_mlocked_on_free_v3" | David Hildenbrand | 2024-06-15 | 1 | -15/+0 |
* | mm: init_mlocked_on_free_v3 | York Jasper Niebuhr | 2024-04-25 | 1 | -0/+15 |
* | hardening: Move BUG_ON_DATA_CORRUPTION to hardening options | Marco Elver | 2023-08-15 | 1 | -0/+10 |
* | list: Introduce CONFIG_LIST_HARDENED | Marco Elver | 2023-08-15 | 1 | -0/+13 |
* | randstruct: disable Clang 15 support | Eric Biggers | 2023-02-08 | 1 | -0/+3 |
* | security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 | Nathan Chancellor | 2022-12-14 | 1 | -0/+3 |
* | Merge tag 'mm-stable-2022-10-08' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 2022-10-10 | 1 | -0/+4 |
|\ |
|
| * | security: kmsan: fix interoperability with auto-initialization | Alexander Potapenko | 2022-10-03 | 1 | -0/+4 |
* | | hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero | Kees Cook | 2022-09-29 | 1 | -4/+10 |
|/ |
|
* | randstruct: Enable Clang support | Kees Cook | 2022-05-08 | 1 | -2/+12 |
* | randstruct: Move seed generation into scripts/basic/ | Kees Cook | 2022-05-08 | 1 | -4/+5 |
* | randstruct: Reorganize Kconfigs and attribute macros | Kees Cook | 2022-05-08 | 1 | -0/+62 |
* | gcc-plugins/stackleak: Provide verbose mode | Kees Cook | 2022-02-06 | 1 | -0/+10 |
* | gcc-plugins: Explicitly document purpose and deprecation schedule | Kees Cook | 2021-10-21 | 1 | -3/+6 |
* | hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO | Kees Cook | 2021-09-25 | 1 | -1/+4 |
* | hardening: Clarify Kconfig text for auto-var-init | Kees Cook | 2021-07-20 | 1 | -20/+32 |
* | hardening: Introduce CONFIG_ZERO_CALL_USED_REGS | Kees Cook | 2021-07-20 | 1 | -0/+19 |
* | kasan: remove redundant config option | Walter Wu | 2021-04-16 | 1 | -2/+2 |
* | security: allow using Clang's zero initialization for stack variables | glider@google.com | 2020-06-16 | 1 | -4/+25 |
* | Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git... | Linus Torvalds | 2019-07-28 | 1 | -0/+7 |
|\ |
|
| * | structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK | Arnd Bergmann | 2019-07-25 | 1 | -0/+7 |
* | | mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options | Alexander Potapenko | 2019-07-12 | 1 | -0/+29 |
|/ |
|
* | treewide: Add SPDX license identifier - Makefile/Kconfig | Thomas Gleixner | 2019-05-21 | 1 | -0/+1 |
* | security: Implement Clang's stack initialization | Kees Cook | 2019-04-24 | 1 | -0/+14 |
* | security: Move stackleak config to Kconfig.hardening | Kees Cook | 2019-04-24 | 1 | -0/+57 |
* | security: Create "kernel hardening" config area | Kees Cook | 2019-04-24 | 1 | -0/+93 |