Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-04-24 | security: Move stackleak config to Kconfig.hardening | Kees Cook | |
This moves the stackleak plugin options to Kconfig.hardening's memory initialization menu. Signed-off-by: Kees Cook <keescook@chromium.org> Reviewed-by: Alexander Popov <alex.popov@linux.com> Acked-by: Masahiro Yamada <yamada.masahiro@socionext.com> | |||
2019-04-24 | security: Create "kernel hardening" config area | Kees Cook | |
Right now kernel hardening options are scattered around various Kconfig files. This can be a central place to collect these kinds of options going forward. This is initially populated with the memory initialization options from the gcc-plugins. Signed-off-by: Kees Cook <keescook@chromium.org> Acked-by: Masahiro Yamada <yamada.masahiro@socionext.com> |