forked from GrapheneOS/linux-hardened
-
Notifications
You must be signed in to change notification settings - Fork 56
Issues: anthraxx/linux-hardened
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Disable io_uring
accepted
Patch accepted and pending to be applied
enhancement
New feature or request
#84
opened Jun 16, 2023 by
prettySongbird
use 48-bit address space via 4 level page tables on arm64 by default
#82
opened Apr 22, 2023 by
thestinger
Exposed unhashed kernel memory addresses with slub_debug kernel parameter
#73
opened Jul 1, 2022 by
nbouchinet-anssi
Programs compiled with "-fsanitize=address" crashes with: "Shadow memory range interleaves with an existing memory mapping. ASan cannot proceed correctly. ABORTING."
upstream
Bug is caused by upstream problems
#69
opened May 12, 2022 by
Stephen-Seo
Question regarding sysctl network parameters
question
Further information is requested
#55
opened Dec 30, 2020 by
Utini2000
Backporting security features to LTS kernels
question
Further information is requested
#30
opened Mar 16, 2020 by
madaidan
Manage kernel configuration hardening in a separate repository
#28
opened Mar 12, 2020 by
tsautereau-anssi
Suggestion: default to lockdown=confidentiality in kernel 5.4+
kconfig
Changes related to kconfig options
#14
opened Nov 3, 2019 by
hugecheese
Previous Next
ProTip!
Updated in the last three days: updated:>2024-11-30.