summaryrefslogtreecommitdiffstats
path: root/security/Kconfig.hardening
Commit message (Expand)AuthorAgeFilesLines
* hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zeroKees Cook2022-10-121-4/+10
* randstruct: Enable Clang supportKees Cook2022-05-081-2/+12
* randstruct: Move seed generation into scripts/basic/Kees Cook2022-05-081-4/+5
* randstruct: Reorganize Kconfigs and attribute macrosKees Cook2022-05-081-0/+62
* gcc-plugins/stackleak: Provide verbose modeKees Cook2022-02-061-0/+10
* gcc-plugins: Explicitly document purpose and deprecation scheduleKees Cook2021-10-211-3/+6
* hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZEROKees Cook2021-09-251-1/+4
* hardening: Clarify Kconfig text for auto-var-initKees Cook2021-07-201-20/+32
* hardening: Introduce CONFIG_ZERO_CALL_USED_REGSKees Cook2021-07-201-0/+19
* kasan: remove redundant config optionWalter Wu2021-04-161-2/+2
* security: allow using Clang's zero initialization for stack variablesglider@google.com2020-06-161-4/+25
* Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-07-281-0/+7
|\
| * structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACKArnd Bergmann2019-07-251-0/+7
* | mm: security: introduce init_on_alloc=1 and init_on_free=1 boot optionsAlexander Potapenko2019-07-121-0/+29
|/
* treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner2019-05-211-0/+1
* security: Implement Clang's stack initializationKees Cook2019-04-241-0/+14
* security: Move stackleak config to Kconfig.hardeningKees Cook2019-04-241-0/+57
* security: Create "kernel hardening" config areaKees Cook2019-04-241-0/+93