1. 8bd51a2 gcc-plugins: Explicitly document purpose and deprecation schedule by Kees Cook · 3 years, 2 months ago
  2. f02003c hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO by Kees Cook · 3 years, 3 months ago
  3. dcb7c0b hardening: Clarify Kconfig text for auto-var-init by Kees Cook · 3 years, 5 months ago
  4. a82adfd hardening: Introduce CONFIG_ZERO_CALL_USED_REGS by Kees Cook · 3 years, 9 months ago
  5. 02c5877 kasan: remove redundant config option by Walter Wu · 3 years, 8 months ago
  6. f0fe00d security: allow using Clang's zero initialization for stack variables by glider@google.com · 4 years, 6 months ago
  7. c622fc5 Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux by Linus Torvalds · 5 years ago
  8. 173e6ee structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK by Arnd Bergmann · 5 years ago
  9. 6471384 mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options by Alexander Potapenko · 5 years ago
  10. ec8f24b treewide: Add SPDX license identifier - Makefile/Kconfig by Thomas Gleixner · 6 years ago
  11. 709a972 security: Implement Clang's stack initialization by Kees Cook · 6 years ago
  12. b6a6a37 security: Move stackleak config to Kconfig.hardening by Kees Cook · 6 years ago
  13. 9f671e5 security: Create "kernel hardening" config area by Kees Cook · 6 years ago