Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
K
kernel-hardening-checker
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
kernel-hardening-checker
Graph
0b8e9770752eda8135cdce1a73530f1b57ea6553
Switch branch/tag
You can move around the graph by using the arrow keys.
Begin with the selected commit
Created with Raphaël 2.2.0
22
Apr
20
9
8
7
28
Mar
27
21
19
15
14
13
5
15
Feb
14
12
11
23
Jan
22
21
24
Dec
5
21
Nov
9
23
Sep
22
21
16
11
10
30
Aug
29
20
19
14
9
8
2
Jul
19
Jun
18
30
Oct
29
23
22
21
19
16
14
16
Jul
15
13
10
9
7
3
30
May
7
5
9
Apr
8
6
3
31
Mar
30
29
27
26
24
23
22
20
18
17
9
8
7
5
4
27
Feb
26
24
14
Jan
11
10
2
Dec
29
Nov
28
23
Aug
22
8
Jul
7
24
Jun
5
4
3
1
27
May
17
12
20
Mar
13
12
11
4
24
Jan
23
22
21
15
21
Dec
13
7
6
8
Aug
30
Jul
28
25
24
20
14
5
4
3
22
Jun
21
20
Disabling X86_MSR is recommended by KSPP
Fix the bug in the verdict description for ComplexOptCheck
Additional check for TYPES_OF_CHECKS
Drop PresenceCheck; OptCheck without 'expected' parameter can do the job
Update the KSPP recommendations in the config_files
Add the KSPP recommendation of SCHED_CORE
Add the KSPP recommendation of IOMMU_DEFAULT_DMA_STRICT
Add the KSPP recommendation of WERROR
Add the KSPP recommendation of KFENCE
No need in BPF_UNPRIV_DEFAULT_OFF if BPF_SYSCALL is disabled
Merge branch 'from-martin-rowe'
Add defconfigs for Linux v5.17
Drop unneeded return values (refactoring)
UBSAN_SANITIZE_ALL not available on ARM
Add HARDEN_BRANCH_HISTORY for arm
Add MITIGATE_SPECTRE_BRANCH_HISTORY for arm64
THREAD_INFO_IN_TASK is available for ARM since v5.16
Merge branch 'from-martin-rowe'
EFI mitigations can't be enabled if EFI is not set
Fix the BPF_UNPRIV_DEFAULT_OFF check (it is enabled by default)
Add CONFIG_SLS vs CVE-2021-26341 in Straight-Line-Speculation
Add the comment that l1d_flush is a part of the l1tf option
Add BPF_UNPRIV_DEFAULT_OFF to cut_attack_surface
Use the option type instead of calling hasattr()
Merge branch 'refactoring'
Introduce the json_dump() class method
Improve 'type' for ComplexOptCheck and PresenceCheck classes
Make populate_with_data() aware of data type
Add 'type' for PresenceCheck and VersionCheck
Rename VerCheck to VersionCheck
Add more ComplexOptCheck validation
Improve print_unknown_options()
Remove 'CONFIG_' hardcoding
Merge branch 'refactoring'
Refactor the OR logic code
Rename config to kconfig where needed (part II)
Extract populate_with_data() from perform_checks()
Rename config to kconfig where needed
Print the type of a check in the json mode
ComplexOptCheck type has the type of the first opt in it