summaryrefslogtreecommitdiffstats
path: root/security/Kconfig
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-031-0/+14
|\
| * usercopy: Allow strict enforcement of whitelistsKees Cook2018-01-151-0/+14
* | Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-011-0/+1
|\ \
| * \ Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman2018-01-021-0/+10
| |\ \
| * | | /dev/mem: Add bounce buffer for copy-outKees Cook2017-12-181-0/+1
| | |/ | |/|
* | | security/Kconfig: Correct the Documentation reference for PTIW. Trevor King2018-01-141-1/+1
* | | x86/pti: Enable PTI by defaultThomas Gleixner2018-01-031-0/+1
| |/ |/|
* | x86/mm/pti: Add KconfigDave Hansen2017-12-231-0/+10
|/
* include/linux/string.h: add the option of fortified string.h functionsDaniel Micay2017-07-121-0/+7
* IB/core: Enforce PKey security on QPsDaniel Jurgens2017-05-231-0/+9
* Sync to mainline for security submaintainers to work againstJames Morris2017-05-221-9/+0
|\
| * Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-05-031-0/+5
| |\
| * | HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro2017-04-261-9/+0
* | | security: Grammar s/allocates/allocated/Geert Uytterhoeven2017-05-151-1/+1
| |/ |/|
* | security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris2017-03-061-0/+5
|/
* Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman2017-01-191-0/+35
* Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2016-09-071-0/+11
|\
| * usercopy: remove page-spanning test for nowKees Cook2016-09-071-0/+11
|/
* Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds2016-08-191-0/+1
* mm: Hardened usercopyKees Cook2016-07-261-0/+28
* LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+1
* Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook2015-07-281-5/+0
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-0/+1
* security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross2014-02-051-1/+1
* KEYS: Move the key config into security/keys/KconfigDavid Howells2012-05-111-67/+1
* security: Yama LSMKees Cook2012-02-101-0/+6
* encrypted-keys: remove trusted-keys dependencyMimi Zohar2011-09-141-1/+3
* integrity: move ima inode integrity data managementMimi Zohar2011-07-181-1/+1
* security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker2011-03-221-0/+1
* keys: add new key-type encryptedMimi Zohar2010-11-291-0/+16
* keys: add new trusted key-typeMimi Zohar2010-11-291-0/+15
* Restrict unprivileged access to kernel syslogDan Rosenberg2010-11-121-0/+12
* AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen2010-08-021-0/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-9/+0
* Config option to set a default LSMJohn Johansen2009-11-091-0/+32
* security: remove root_plugJames Morris2009-10-201-13/+0
* Merge commit 'v2.6.31-rc8' into x86/txtIngo Molnar2009-09-021-0/+16
|\
| * security: Fix prompt for LSM_MMAP_MIN_ADDRAndreas Schwab2009-08-191-1/+1
| * security: Make LSM_MMAP_MIN_ADDR default match its help text.Dave Jones2009-08-191-1/+1
| * Security/SELinux: seperate lsm specific mmap_min_addrEric Paris2009-08-171-0/+16
* | x86, intel_txt: clean up the impact on generic code, unbreak non-x86Shane Wang2009-09-011-1/+1
* | x86, intel_txt: Fix typos in Kconfig helpArnaldo Carvalho de Melo2009-08-141-2/+2
* | x86, intel_txt: Intel TXT boot supportJoseph Cihula2009-07-211-0/+30
|/
* security: use mmap_min_addr indepedently of security modelsChristoph Lameter2009-06-041-21/+1
* Kconfig and MakefileKentaro Takeda2009-02-121-0/+1
* Merge branch 'master' into nextJames Morris2009-02-061-0/+9
|\
| * introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+9
* | integrity: IMA as an integrity service providerMimi Zohar2009-02-061-1/+4
|/
* securityfs: do not depend on CONFIG_SECURITYEric Paris2008-08-281-0/+8
* security: filesystem capabilities no longer experimentalAndrew G. Morgan2008-07-241-2/+1
OpenPOWER on IntegriCloud