summaryrefslogtreecommitdiffstats
path: root/security/Kconfig
AgeCommit message (Expand)AuthorFilesLines
2019-08-19security: Add a static lockdown policy LSMMatthew Garrett1-5/+6
2019-05-21treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner1-0/+1
2019-05-07Merge tag 'meminit-v5.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-0/+2
2019-04-24security: Create "kernel hardening" config areaKees Cook1-0/+2
2019-03-29LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig"Kees Cook1-0/+38
2019-03-01LSM: Update list of SECURITYFS users in KconfigPetr Vorel1-2/+1
2019-01-25LSM: add SafeSetID module that gates setid callsMicah Morton1-1/+2
2019-01-08Yama: Initialize as ordered LSMKees Cook1-1/+1
2019-01-08LoadPin: Initialize as ordered LSMKees Cook1-38/+1
2019-01-08LSM: Introduce "lsm=" for boottime LSM selectionKees Cook1-1/+2
2019-01-08LSM: Introduce CONFIG_LSMKees Cook1-0/+9
2018-12-22treewide: surround Kconfig file paths with double quotesMasahiro Yamada1-8/+8
2018-09-14Revert "x86/mm/legacy: Populate the user page-table with user pgd's"Joerg Roedel1-1/+1
2018-08-15Merge tag 'hardened-usercopy-v4.19-rc1' of git://git.kernel.org/pub/scm/linux...Linus Torvalds1-1/+0
2018-07-20x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel1-1/+1
2018-07-02usercopy: Do not select BUG with HARDENED_USERCOPYKamal Mostafa1-1/+0
2018-02-03Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+14
2018-02-01Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+1
2018-01-15usercopy: Allow strict enforcement of whitelistsKees Cook1-0/+14
2018-01-14security/Kconfig: Correct the Documentation reference for PTIW. Trevor King1-1/+1
2018-01-03x86/pti: Enable PTI by defaultThomas Gleixner1-0/+1
2018-01-02Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman1-0/+10
2017-12-23x86/mm/pti: Add KconfigDave Hansen1-0/+10
2017-12-18/dev/mem: Add bounce buffer for copy-outKees Cook1-0/+1
2017-07-12include/linux/string.h: add the option of fortified string.h functionsDaniel Micay1-0/+7
2017-05-23IB/core: Enforce PKey security on QPsDaniel Jurgens1-0/+9
2017-05-22Sync to mainline for security submaintainers to work againstJames Morris1-9/+0
2017-05-15security: Grammar s/allocates/allocated/Geert Uytterhoeven1-1/+1
2017-05-03Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-0/+5
2017-04-26HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro1-9/+0
2017-03-06security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris1-0/+5
2017-01-19Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman1-0/+35
2016-09-07Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds1-0/+11
2016-09-07usercopy: remove page-spanning test for nowKees Cook1-0/+11
2016-08-19Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds1-0/+1
2016-07-26mm: Hardened usercopyKees Cook1-0/+28
2016-04-21LSM: LoadPin for kernel file loading restrictionsKees Cook1-0/+1
2015-07-28Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook1-5/+0
2015-04-15kernel: conditionally support non-root users, groups and capabilitiesIulia Manda1-0/+1
2014-02-05security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross1-1/+1
2012-05-11KEYS: Move the key config into security/keys/KconfigDavid Howells1-67/+1
2012-02-10security: Yama LSMKees Cook1-0/+6
2011-09-14encrypted-keys: remove trusted-keys dependencyMimi Zohar1-1/+3
2011-07-18integrity: move ima inode integrity data managementMimi Zohar1-1/+1
2011-03-22security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker1-0/+1
2010-11-29keys: add new key-type encryptedMimi Zohar1-0/+16
2010-11-29keys: add new trusted key-typeMimi Zohar1-0/+15
2010-11-12Restrict unprivileged access to kernel syslogDan Rosenberg1-0/+12
2010-08-02AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen1-0/+6
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn1-9/+0