summaryrefslogtreecommitdiff
path: root/security/Kconfig
AgeCommit message (Expand)AuthorFilesLines
2018-08-15Merge tag 'hardened-usercopy-v4.19-rc1' of git://git.kernel.org/pub/scm/linux...Linus Torvalds1-1/+0
2018-07-20x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel1-1/+1
2018-07-03usercopy: Do not select BUG with HARDENED_USERCOPYKamal Mostafa1-1/+0
2018-02-04Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+14
2018-02-01Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+1
2018-01-15usercopy: Allow strict enforcement of whitelistsKees Cook1-0/+14
2018-01-14security/Kconfig: Correct the Documentation reference for PTIW. Trevor King1-1/+1
2018-01-03x86/pti: Enable PTI by defaultThomas Gleixner1-0/+1
2018-01-02Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman1-0/+10
2017-12-23x86/mm/pti: Add KconfigDave Hansen1-0/+10
2017-12-18/dev/mem: Add bounce buffer for copy-outKees Cook1-0/+1
2017-07-13include/linux/string.h: add the option of fortified string.h functionsDaniel Micay1-0/+7
2017-05-23IB/core: Enforce PKey security on QPsDaniel Jurgens1-0/+9
2017-05-22Sync to mainline for security submaintainers to work againstJames Morris1-9/+0
2017-05-15security: Grammar s/allocates/allocated/Geert Uytterhoeven1-1/+1
2017-05-03Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-0/+5
2017-04-26HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro1-9/+0
2017-03-06security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris1-0/+5
2017-01-19Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman1-0/+35
2016-09-08Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds1-0/+11
2016-09-07usercopy: remove page-spanning test for nowKees Cook1-0/+11
2016-08-19Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds1-0/+1
2016-07-27mm: Hardened usercopyKees Cook1-0/+28
2016-04-21LSM: LoadPin for kernel file loading restrictionsKees Cook1-0/+1
2015-07-28Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook1-5/+0
2015-04-16kernel: conditionally support non-root users, groups and capabilitiesIulia Manda1-0/+1
2014-02-05security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross1-1/+1
2012-05-11KEYS: Move the key config into security/keys/KconfigDavid Howells1-67/+1
2012-02-10security: Yama LSMKees Cook1-0/+6
2011-09-14encrypted-keys: remove trusted-keys dependencyMimi Zohar1-1/+3
2011-07-18integrity: move ima inode integrity data managementMimi Zohar1-1/+1
2011-03-22security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker1-0/+1
2010-11-29keys: add new key-type encryptedMimi Zohar1-0/+16
2010-11-29keys: add new trusted key-typeMimi Zohar1-0/+15
2010-11-12Restrict unprivileged access to kernel syslogDan Rosenberg1-0/+12
2010-08-02AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen1-0/+6
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn1-9/+0
2009-11-09Config option to set a default LSMJohn Johansen1-0/+32
2009-10-20security: remove root_plugJames Morris1-13/+0
2009-09-02Merge commit 'v2.6.31-rc8' into x86/txtIngo Molnar1-0/+16
2009-09-02x86, intel_txt: clean up the impact on generic code, unbreak non-x86Shane Wang1-1/+1
2009-08-19security: Fix prompt for LSM_MMAP_MIN_ADDRAndreas Schwab1-1/+1
2009-08-19security: Make LSM_MMAP_MIN_ADDR default match its help text.Dave Jones1-1/+1
2009-08-17Security/SELinux: seperate lsm specific mmap_min_addrEric Paris1-0/+16
2009-08-15x86, intel_txt: Fix typos in Kconfig helpArnaldo Carvalho de Melo1-2/+2
2009-07-21x86, intel_txt: Intel TXT boot supportJoseph Cihula1-0/+30
2009-06-04security: use mmap_min_addr indepedently of security modelsChristoph Lameter1-21/+1
2009-02-12Kconfig and MakefileKentaro Takeda1-0/+1
2009-02-06Merge branch 'master' into nextJames Morris1-0/+9
2009-02-06integrity: IMA as an integrity service providerMimi Zohar1-1/+4