index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
Kconfig.hardening
Age
Commit message (
Expand
)
Author
Files
Lines
2021-10-21
gcc-plugins: Explicitly document purpose and deprecation schedule
Kees Cook
1
-3
/
+6
2021-09-25
hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO
Kees Cook
1
-1
/
+4
2021-07-21
hardening: Clarify Kconfig text for auto-var-init
Kees Cook
1
-20
/
+32
2021-07-21
hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
Kees Cook
1
-0
/
+19
2021-04-17
kasan: remove redundant config option
Walter Wu
1
-2
/
+2
2020-06-16
security: allow using Clang's zero initialization for stack variables
glider@google.com
1
-4
/
+25
2019-07-28
Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git...
Linus Torvalds
1
-0
/
+7
2019-07-26
structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK
Arnd Bergmann
1
-0
/
+7
2019-07-12
mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
1
-0
/
+29
2019-05-21
treewide: Add SPDX license identifier - Makefile/Kconfig
Thomas Gleixner
1
-0
/
+1
2019-04-25
security: Implement Clang's stack initialization
Kees Cook
1
-0
/
+14
2019-04-25
security: Move stackleak config to Kconfig.hardening
Kees Cook
1
-0
/
+57
2019-04-24
security: Create "kernel hardening" config area
Kees Cook
1
-0
/
+93