GrapheneOS / linux-hardened

Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than multiarch arm64 / x86_64 aren't in scope. Only tags have stable history. Shared IRC channel with KSPP: irc.freenode.net ##linux-hardened. Currently maintained at https://github.com/anthraxx/linux-hardened.
https://grapheneos.org/
Other
397 stars 105 forks source link

figure out how serious Google is about implementing SafeStack + CFI for the kernel and a rough timeline as it can aid an alternate CFI implementation #61

Closed thestinger closed 6 years ago

thestinger commented 6 years ago

If they worked on Clang CFI, they would end up resolving the incorrectly typed function pointers so it would help an effort to use a stronger CFI implementation.

thestinger commented 6 years ago

This is indeed happening for real.