summaryrefslogtreecommitdiffstats
path: root/security/Kconfig.hardening
AgeCommit message (Expand)AuthorLines
2025-09-22rust: add bitmap API.Burak Emir-0/+10
2025-07-26kstack_erase: Support Clang stack depth trackingKees Cook-1/+4
2025-07-21stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depthKees Cook-2/+2
2025-07-21stackleak: Rename STACKLEAK to KSTACK_ERASEKees Cook-16/+20
2025-05-31Merge tag 'gcc-minimum-version-6.16' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds-76/+0
2025-05-08Revert "hardening: Disable GCC randstruct for COMPILE_TEST"Kees Cook-1/+1
2025-04-30Kbuild: remove structleak gcc pluginArnd Bergmann-76/+0
2025-04-15hardening: Disable GCC randstruct for COMPILE_TESTKees Cook-1/+1
2025-03-08hardening: Enable i386 FORTIFY_SOURCE on Clang 16+Kees Cook-1/+1
2025-02-28fortify: Move FORTIFY_SOURCE under 'Kernel hardening options'Mel Gorman-0/+9
2025-02-28mm: security: Allow default HARDENED_USERCOPY to be set at compile timeMel Gorman-0/+8
2025-02-28mm: security: Move hardened usercopy under 'Kernel hardening options'Mel Gorman-0/+16
2025-01-08hardening: Document INIT_STACK_ALL_PATTERN behavior with GCCGeert Uytterhoeven-0/+1
2024-09-28hardening: Adjust dependencies in selection of MODVERSIONSNathan Chancellor-2/+2
2024-06-15Revert "mm: init_mlocked_on_free_v3"David Hildenbrand-15/+0
2024-04-25mm: init_mlocked_on_free_v3York Jasper Niebuhr-0/+15
2023-08-15hardening: Move BUG_ON_DATA_CORRUPTION to hardening optionsMarco Elver-0/+10
2023-08-15list: Introduce CONFIG_LIST_HARDENEDMarco Elver-0/+13
2023-02-08randstruct: disable Clang 15 supportEric Biggers-0/+3
2022-12-14security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6Nathan Chancellor-0/+3
2022-10-10Merge tag 'mm-stable-2022-10-08' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds-0/+4
2022-10-03security: kmsan: fix interoperability with auto-initializationAlexander Potapenko-0/+4
2022-09-29hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zeroKees Cook-4/+10
2022-05-08randstruct: Enable Clang supportKees Cook-2/+12
2022-05-08randstruct: Move seed generation into scripts/basic/Kees Cook-4/+5
2022-05-08randstruct: Reorganize Kconfigs and attribute macrosKees Cook-0/+62
2022-02-06gcc-plugins/stackleak: Provide verbose modeKees Cook-0/+10
2021-10-21gcc-plugins: Explicitly document purpose and deprecation scheduleKees Cook-3/+6
2021-09-25hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZEROKees Cook-1/+4
2021-07-20hardening: Clarify Kconfig text for auto-var-initKees Cook-20/+32
2021-07-20hardening: Introduce CONFIG_ZERO_CALL_USED_REGSKees Cook-0/+19
2021-04-16kasan: remove redundant config optionWalter Wu-2/+2
2020-06-16security: allow using Clang's zero initialization for stack variablesglider@google.com-4/+25
2019-07-28Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds-0/+7
2019-07-25structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACKArnd Bergmann-0/+7
2019-07-12mm: security: introduce init_on_alloc=1 and init_on_free=1 boot optionsAlexander Potapenko-0/+29
2019-05-21treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner-0/+1
2019-04-24security: Implement Clang's stack initializationKees Cook-0/+14
2019-04-24security: Move stackleak config to Kconfig.hardeningKees Cook-0/+57
2019-04-24security: Create "kernel hardening" config areaKees Cook-0/+93