summaryrefslogtreecommitdiff
path: root/security/Kconfig
Commit message (Expand)AuthorAgeFilesLines
* treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner2019-05-211-0/+1
* Merge tag 'meminit-v5.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-05-071-0/+2
|\
| * security: Create "kernel hardening" config areaKees Cook2019-04-241-0/+2
* | LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig"Kees Cook2019-03-291-0/+38
|/
* LSM: Update list of SECURITYFS users in KconfigPetr Vorel2019-03-011-2/+1
* LSM: add SafeSetID module that gates setid callsMicah Morton2019-01-251-1/+2
* Yama: Initialize as ordered LSMKees Cook2019-01-081-1/+1
* LoadPin: Initialize as ordered LSMKees Cook2019-01-081-38/+1
* LSM: Introduce "lsm=" for boottime LSM selectionKees Cook2019-01-081-1/+2
* LSM: Introduce CONFIG_LSMKees Cook2019-01-081-0/+9
* treewide: surround Kconfig file paths with double quotesMasahiro Yamada2018-12-221-8/+8
* Revert "x86/mm/legacy: Populate the user page-table with user pgd's"Joerg Roedel2018-09-141-1/+1
* Merge tag 'hardened-usercopy-v4.19-rc1' of git://git.kernel.org/pub/scm/linux...Linus Torvalds2018-08-151-1/+0
|\
| * usercopy: Do not select BUG with HARDENED_USERCOPYKamal Mostafa2018-07-021-1/+0
* | x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel2018-07-201-1/+1
|/
* Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-031-0/+14
|\
| * usercopy: Allow strict enforcement of whitelistsKees Cook2018-01-151-0/+14
* | Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-011-0/+1
|\ \
| * \ Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman2018-01-021-0/+10
| |\ \
| * | | /dev/mem: Add bounce buffer for copy-outKees Cook2017-12-181-0/+1
| | |/ | |/|
* | | security/Kconfig: Correct the Documentation reference for PTIW. Trevor King2018-01-141-1/+1
* | | x86/pti: Enable PTI by defaultThomas Gleixner2018-01-031-0/+1
| |/ |/|
* | x86/mm/pti: Add KconfigDave Hansen2017-12-231-0/+10
|/
* include/linux/string.h: add the option of fortified string.h functionsDaniel Micay2017-07-121-0/+7
* IB/core: Enforce PKey security on QPsDaniel Jurgens2017-05-231-0/+9
* Sync to mainline for security submaintainers to work againstJames Morris2017-05-221-9/+0
|\
| * Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-05-031-0/+5
| |\
| * | HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro2017-04-261-9/+0
* | | security: Grammar s/allocates/allocated/Geert Uytterhoeven2017-05-151-1/+1
| |/ |/|
* | security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris2017-03-061-0/+5
|/
* Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman2017-01-191-0/+35
* Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2016-09-071-0/+11
|\
| * usercopy: remove page-spanning test for nowKees Cook2016-09-071-0/+11
|/
* Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds2016-08-191-0/+1
* mm: Hardened usercopyKees Cook2016-07-261-0/+28
* LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+1
* Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook2015-07-281-5/+0
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-0/+1
* security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross2014-02-051-1/+1
* KEYS: Move the key config into security/keys/KconfigDavid Howells2012-05-111-67/+1
* security: Yama LSMKees Cook2012-02-101-0/+6
* encrypted-keys: remove trusted-keys dependencyMimi Zohar2011-09-141-1/+3
* integrity: move ima inode integrity data managementMimi Zohar2011-07-181-1/+1
* security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker2011-03-221-0/+1
* keys: add new key-type encryptedMimi Zohar2010-11-291-0/+16
* keys: add new trusted key-typeMimi Zohar2010-11-291-0/+15
* Restrict unprivileged access to kernel syslogDan Rosenberg2010-11-121-0/+12
* AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen2010-08-021-0/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-9/+0
* Config option to set a default LSMJohn Johansen2009-11-091-0/+32