- aa9f10d hardening: Move BUG_ON_DATA_CORRUPTION to hardening options by Marco Elver · 1 year, 7 months ago
- aebc7b0 list: Introduce CONFIG_LIST_HARDENED by Marco Elver · 1 year, 7 months ago
- 78f7a3f randstruct: disable Clang 15 support by Eric Biggers · 2 years, 1 month ago
- d6a9fb8 security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 by Nathan Chancellor · 2 years, 3 months ago
- 27bc50f Merge tag 'mm-stable-2022-10-08' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm by Linus Torvalds · 2 years, 5 months ago
- 42eaa27 security: kmsan: fix interoperability with auto-initialization by Alexander Potapenko · 2 years, 6 months ago
- 607e57c hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero by Kees Cook · 2 years, 5 months ago
- 035f7f8 randstruct: Enable Clang support by Kees Cook · 2 years, 10 months ago
- be2b34f randstruct: Move seed generation into scripts/basic/ by Kees Cook · 2 years, 10 months ago
- 595b893 randstruct: Reorganize Kconfigs and attribute macros by Kees Cook · 2 years, 10 months ago
- f154066 gcc-plugins/stackleak: Provide verbose mode by Kees Cook · 3 years, 1 month ago
- 8bd51a2 gcc-plugins: Explicitly document purpose and deprecation schedule by Kees Cook · 3 years, 4 months ago
- f02003c hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO by Kees Cook · 3 years, 6 months ago
- dcb7c0b hardening: Clarify Kconfig text for auto-var-init by Kees Cook · 3 years, 8 months ago
- a82adfd hardening: Introduce CONFIG_ZERO_CALL_USED_REGS by Kees Cook · 3 years, 11 months ago
- 02c5877 kasan: remove redundant config option by Walter Wu · 3 years, 11 months ago
- f0fe00d security: allow using Clang's zero initialization for stack variables by glider@google.com · 4 years, 9 months ago
- c622fc5 Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux by Linus Torvalds · 6 years ago
- 173e6ee structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK by Arnd Bergmann · 6 years ago
- 6471384 mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options by Alexander Potapenko · 6 years ago
- ec8f24b treewide: Add SPDX license identifier - Makefile/Kconfig by Thomas Gleixner · 6 years ago
- 709a972 security: Implement Clang's stack initialization by Kees Cook · 6 years ago
- b6a6a37 security: Move stackleak config to Kconfig.hardening by Kees Cook · 6 years ago
- 9f671e5 security: Create "kernel hardening" config area by Kees Cook · 6 years ago