summaryrefslogtreecommitdiffstats
path: root/security/Kconfig
Commit message (Expand)AuthorAgeFilesLines
* include/linux/string.h: add the option of fortified string.h functionsDaniel Micay2017-07-121-0/+7
* IB/core: Enforce PKey security on QPsDaniel Jurgens2017-05-231-0/+9
* Sync to mainline for security submaintainers to work againstJames Morris2017-05-221-9/+0
|\
| * Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-05-031-0/+5
| |\
| * | HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro2017-04-261-9/+0
* | | security: Grammar s/allocates/allocated/Geert Uytterhoeven2017-05-151-1/+1
| |/ |/|
* | security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris2017-03-061-0/+5
|/
* Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman2017-01-191-0/+35
* Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2016-09-071-0/+11
|\
| * usercopy: remove page-spanning test for nowKees Cook2016-09-071-0/+11
|/
* Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds2016-08-191-0/+1
* mm: Hardened usercopyKees Cook2016-07-261-0/+28
* LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+1
* Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook2015-07-281-5/+0
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-0/+1
* security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross2014-02-051-1/+1
* KEYS: Move the key config into security/keys/KconfigDavid Howells2012-05-111-67/+1
* security: Yama LSMKees Cook2012-02-101-0/+6
* encrypted-keys: remove trusted-keys dependencyMimi Zohar2011-09-141-1/+3
* integrity: move ima inode integrity data managementMimi Zohar2011-07-181-1/+1
* security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker2011-03-221-0/+1
* keys: add new key-type encryptedMimi Zohar2010-11-291-0/+16
* keys: add new trusted key-typeMimi Zohar2010-11-291-0/+15
* Restrict unprivileged access to kernel syslogDan Rosenberg2010-11-121-0/+12
* AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen2010-08-021-0/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-9/+0
* Config option to set a default LSMJohn Johansen2009-11-091-0/+32
* security: remove root_plugJames Morris2009-10-201-13/+0
* Merge commit 'v2.6.31-rc8' into x86/txtIngo Molnar2009-09-021-0/+16
|\
| * security: Fix prompt for LSM_MMAP_MIN_ADDRAndreas Schwab2009-08-191-1/+1
| * security: Make LSM_MMAP_MIN_ADDR default match its help text.Dave Jones2009-08-191-1/+1
| * Security/SELinux: seperate lsm specific mmap_min_addrEric Paris2009-08-171-0/+16
* | x86, intel_txt: clean up the impact on generic code, unbreak non-x86Shane Wang2009-09-011-1/+1
* | x86, intel_txt: Fix typos in Kconfig helpArnaldo Carvalho de Melo2009-08-141-2/+2
* | x86, intel_txt: Intel TXT boot supportJoseph Cihula2009-07-211-0/+30
|/
* security: use mmap_min_addr indepedently of security modelsChristoph Lameter2009-06-041-21/+1
* Kconfig and MakefileKentaro Takeda2009-02-121-0/+1
* Merge branch 'master' into nextJames Morris2009-02-061-0/+9
|\
| * introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+9
* | integrity: IMA as an integrity service providerMimi Zohar2009-02-061-1/+4
|/
* securityfs: do not depend on CONFIG_SECURITYEric Paris2008-08-281-0/+8
* security: filesystem capabilities no longer experimentalAndrew G. Morgan2008-07-241-2/+1
* security: remove dummy module fixMiklos Szeredi2008-07-141-1/+1
* security: remove dummy moduleMiklos Szeredi2008-07-141-9/+1
* security: enhance DEFAULT_MMAP_MIN_ADDR descriptionmaximilian attems2008-04-181-4/+6
* security: allow Kconfig to set default mmap_min_addr protectionEric Paris2008-02-061-0/+18
* Smack: Simplified Mandatory Access Control KernelCasey Schaufler2008-02-051-0/+1
* security: compile capabilities by defaultsergeh@us.ibm.com2008-01-301-0/+1
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-0/+10
* security: Convert LSM into a static interfaceJames Morris2007-10-171-3/+3
OpenPOWER on IntegriCloud