Active Projects

From Linux Kernel Security Subsystem
Revision as of 22:46, 4 November 2015 by KeesCook (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The Linux Security Workgroup has put together this page in an effort to bring the Linux security community together in hardening the Linux Kernel and to help prevent duplication of efforts. There are a number of active Linux Kernel hardening projects and this page gives details on some of them.


Static Analysis


Coccinelle is a tool for matching and fixing source code for C, C++, and other languages.

Run by:

  • Fengguang Wu - Running against what trees?
  • Artem Bityutskiy - Running against what trees?


Coverity provides static analysis tools for C, C++, and other languages. Red Hat's Coverity license allows results to be shared with upstream projects.

Run by: Paul Moore at Red Hat against what trees?


Smatch is a static analysis tool for C.

Run by:

  • Dan Carpenter - Running against linux-next x86_64 allmodconfig
  • Fengguang Wu - Running against what trees?

Dynamic Analysis

kmemcheck, kmemleak

Linux Kernel debugging features for detecting memory issues.

Run by: ?


KEDR provides runtime analysis of Linux kernel modules including device drivers, file system modules, etc.

Run by: ?

Fuzz Testing


Trinity is a Linux system call fuzzer.

Run by: Dave Jones and Fengguang Wu


Metasploit software is used for identifying security issues. It includes many capabilities, including fuzzer support.

Run by: ?


ASLR for kernel code

Kernel text and module base address now randomized on x86. Next will be arm64 and arm.

Project Owner: Google, Linaro

Personal tools