index
:
~andi/linux
ccs-mode
drm-tip
vm-mmap
Andi's kernel stuff
UNKNOWN
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
Kconfig.hardening
Age
Commit message (
Expand
)
Author
Files
Lines
2022-12-14
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
Nathan Chancellor
1
-0
/
+3
2022-10-10
Merge tag 'mm-stable-2022-10-08' of git://git.kernel.org/pub/scm/linux/kernel...
Linus Torvalds
1
-0
/
+4
2022-10-03
security: kmsan: fix interoperability with auto-initialization
Alexander Potapenko
1
-0
/
+4
2022-09-29
hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero
Kees Cook
1
-4
/
+10
2022-05-08
randstruct: Enable Clang support
Kees Cook
1
-2
/
+12
2022-05-08
randstruct: Move seed generation into scripts/basic/
Kees Cook
1
-4
/
+5
2022-05-08
randstruct: Reorganize Kconfigs and attribute macros
Kees Cook
1
-0
/
+62
2022-02-06
gcc-plugins/stackleak: Provide verbose mode
Kees Cook
1
-0
/
+10
2021-10-21
gcc-plugins: Explicitly document purpose and deprecation schedule
Kees Cook
1
-3
/
+6
2021-09-25
hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO
Kees Cook
1
-1
/
+4
2021-07-20
hardening: Clarify Kconfig text for auto-var-init
Kees Cook
1
-20
/
+32
2021-07-20
hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
Kees Cook
1
-0
/
+19
2021-04-16
kasan: remove redundant config option
Walter Wu
1
-2
/
+2
2020-06-16
security: allow using Clang's zero initialization for stack variables
glider@google.com
1
-4
/
+25
2019-07-28
Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git...
Linus Torvalds
1
-0
/
+7
2019-07-25
structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK
Arnd Bergmann
1
-0
/
+7
2019-07-12
mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
1
-0
/
+29
2019-05-21
treewide: Add SPDX license identifier - Makefile/Kconfig
Thomas Gleixner
1
-0
/
+1
2019-04-24
security: Implement Clang's stack initialization
Kees Cook
1
-0
/
+14
2019-04-24
security: Move stackleak config to Kconfig.hardening
Kees Cook
1
-0
/
+57
2019-04-24
security: Create "kernel hardening" config area
Kees Cook
1
-0
/
+93