1. 8a423645 security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 by Nathan Chancellor · 2 years, 8 months ago
  2. 7434626 hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero by Kees Cook · 2 years, 10 months ago
  3. 0954938 hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO by Kees Cook · 3 years, 11 months ago
  4. dcb7c0b hardening: Clarify Kconfig text for auto-var-init by Kees Cook · 4 years ago
  5. a82adfd hardening: Introduce CONFIG_ZERO_CALL_USED_REGS by Kees Cook · 4 years, 4 months ago
  6. 02c5877 kasan: remove redundant config option by Walter Wu · 4 years, 4 months ago
  7. f0fe00d security: allow using Clang's zero initialization for stack variables by glider@google.com · 5 years ago
  8. c622fc5 Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux by Linus Torvalds · 6 years ago
  9. 173e6ee structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK by Arnd Bergmann · 6 years ago
  10. 6471384 mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options by Alexander Potapenko · 6 years ago
  11. ec8f24b treewide: Add SPDX license identifier - Makefile/Kconfig by Thomas Gleixner · 6 years ago
  12. 709a972 security: Implement Clang's stack initialization by Kees Cook · 6 years ago
  13. b6a6a37 security: Move stackleak config to Kconfig.hardening by Kees Cook · 6 years ago
  14. 9f671e5 security: Create "kernel hardening" config area by Kees Cook · 6 years ago