GrapheneOS/linux-hardened
Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than multiarch arm64 / x86_64 aren't in scope. Only tags have stable history. Shared IRC channel with KSPP: irc.freenode.net ##linux-hardened. Currently maintained at https://github.com/anthraxx/linux-hardened.
CNOASSERTION
Issues
- 1
- 0
type-based CFI for indirect calls
#65 opened by thestinger - 0
- 1
Why is AppArmor not enabled?
#67 opened by francoism90 - 3
zfs load-keys results in KP
#68 opened by francoism90 - 4
invalid opcode. list_del_entry_valid
#69 opened by alexminder - 6
- 12
CVE-2017-5753 - Spectre Variant 1
#71 opened by ralaud - 11
detected buffer overflow in strlen
#72 opened by Bernhard40 - 11
- 0
SROP mitigation with SipHash-generated cookies
#74 opened by thestinger - 0
[PATCH] remove unused softirq_action callback parameter - causes build failure on 4.17
#76 opened by Bernhard40 - 2
4.16.13, 4.14.45, 4.14.46, 4.14.47
#82 opened by NeQuissimus - 1
- 16
MPROTECT
#42 opened by thestinger - 0
STACKLEAK plugin
#43 opened by thestinger - 0
- 0
RANDKSTACK for arm64
#45 opened by thestinger - 1
Build Failure w/ 4.12.a Patch
#46 opened by githububub - 1
denyusb implementation
#47 opened by osteichthyes - 1
Longterm releases?
#48 opened by nullchinchilla - 0
port in-scope GCC plugins to Clang
#49 opened by thestinger - 2
- 4
- 8
- 3
- 2
A question about Emutramp
#54 opened by Kalle72 - 2
- 0
STACKLEAK for Clang
#60 opened by thestinger - 1
figure out how serious Google is about implementing SafeStack + CFI for the kernel and a rough timeline as it can aid an alternate CFI implementation
#61 opened by thestinger - 0
type-based (or finer-grained) CFI for the kernel with Clang (indirect calls and returns)
#56 opened by thestinger - 0
struct layout randomization for Clang
#57 opened by thestinger - 1
[Request] Add TCP Stealth system to protect unadvertised servers from port scanning
#62 opened by Megver83 - 1
refcount_t: saturated; leaking memory
#63 opened by michabuntu - 0
stack clearing
#64 opened by thestinger - 0
type-based CFI for returns
#66 opened by thestinger - 1
deny new usb peripherals
#26 opened by thestinger - 0
- 1
mark __supported_pte_mask as __ro_after_init
#29 opened by thestinger - 0
- 0
- 0
- 7
trusted path execution
#33 opened by thestinger - 52
- 0
improve the robustness of slub page freelists
#36 opened by thestinger - 0
improve slub canary generation
#37 opened by thestinger - 4
Enable TOMOYO by default
#39 opened by x4rxes - 6
- 1
mitigate device timing side channels
#25 opened by thestinger - 15