summaryrefslogtreecommitdiffstats
path: root/wiki/src/contribute/design/kernel_hardening.mdwn
Commit message (Expand)AuthorAgeFilesLines
* Enable all available mitigations for the MDS vulnerability and disable SMT on...intrigeri2019-05-181-0/+11
* fixing link in hardening design docmercedes5082017-10-141-1/+1
* Merge remote-tracking branch 'origin/devel' into feature/12732-linux-4.12intrigeri2017-08-211-0/+7
|\
| * Increase mmap randomization to the maximum supported value (refs: #11840).intrigeri2017-07-241-0/+7
* | Disable kexec, to make our attack surface a bit smaller.intrigeri2017-08-141-0/+4
* | Stop explicitly enabling kaslr: it's enabled by default in Debian, and this k...intrigeri2017-08-141-1/+5
|/
* Let's calm down with the funky word contractions. :)anonym2017-04-171-1/+1
* Enable slub/slab allocator free poisoning (refs: #12090).intrigeri2017-03-021-10/+3
* Enable the buddy page allocator free poisoning (refs: #12089).intrigeri2017-03-021-0/+8
* Enable kASLR.intrigeri2016-06-091-0/+7
* Document motivation for not exposing kernel memory addresses.anonym2016-05-151-5/+16
* Add design doc for kernel hardening options.intrigeri2016-04-291-0/+76