summaryrefslogtreecommitdiff
path: root/security/Kconfig
Commit message (Expand)AuthorAgeFilesLines
* fortify: Explicitly disable Clang supportKees Cook2021-08-221-0/+3
* landlock: Set up the security framework and manage credentialsMickaël Salaün2021-04-221-5/+5
* landlock: Add object managementMickaël Salaün2021-04-221-0/+1
* Replace HTTP links with HTTPS ones: securityAlexander A. Klimov2020-08-061-1/+1
* bpf: lsm: Initialize the BPF LSM hooksKP Singh2020-03-301-5/+5
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-281-5/+6
|\
| * security: Add a static lockdown policy LSMMatthew Garrett2019-08-191-5/+6
* | docs: x86: move two x86-specific files to x86 arch dirMauro Carvalho Chehab2019-07-151-1/+1
* | Merge tag 'v5.2-rc4' into mauroJonathan Corbet2019-06-141-0/+1
|\ \ | |/
| * treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner2019-05-211-0/+1
* | docs: fix broken documentation linksMauro Carvalho Chehab2019-06-081-1/+1
|/
* Merge tag 'meminit-v5.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-05-071-0/+2
|\
| * security: Create "kernel hardening" config areaKees Cook2019-04-241-0/+2
* | LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig"Kees Cook2019-03-291-0/+38
|/
* LSM: Update list of SECURITYFS users in KconfigPetr Vorel2019-03-011-2/+1
* LSM: add SafeSetID module that gates setid callsMicah Morton2019-01-251-1/+2
* Yama: Initialize as ordered LSMKees Cook2019-01-081-1/+1
* LoadPin: Initialize as ordered LSMKees Cook2019-01-081-38/+1
* LSM: Introduce "lsm=" for boottime LSM selectionKees Cook2019-01-081-1/+2
* LSM: Introduce CONFIG_LSMKees Cook2019-01-081-0/+9
* treewide: surround Kconfig file paths with double quotesMasahiro Yamada2018-12-221-8/+8
* Revert "x86/mm/legacy: Populate the user page-table with user pgd's"Joerg Roedel2018-09-141-1/+1
* Merge tag 'hardened-usercopy-v4.19-rc1' of git://git.kernel.org/pub/scm/linux...Linus Torvalds2018-08-151-1/+0
|\
| * usercopy: Do not select BUG with HARDENED_USERCOPYKamal Mostafa2018-07-021-1/+0
* | x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel2018-07-201-1/+1
|/
* Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-031-0/+14
|\
| * usercopy: Allow strict enforcement of whitelistsKees Cook2018-01-151-0/+14
* | Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2018-02-011-0/+1
|\ \
| * \ Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman2018-01-021-0/+10
| |\ \
| * | | /dev/mem: Add bounce buffer for copy-outKees Cook2017-12-181-0/+1
| | |/ | |/|
* | | security/Kconfig: Correct the Documentation reference for PTIW. Trevor King2018-01-141-1/+1
* | | x86/pti: Enable PTI by defaultThomas Gleixner2018-01-031-0/+1
| |/ |/|
* | x86/mm/pti: Add KconfigDave Hansen2017-12-231-0/+10
|/
* include/linux/string.h: add the option of fortified string.h functionsDaniel Micay2017-07-121-0/+7
* IB/core: Enforce PKey security on QPsDaniel Jurgens2017-05-231-0/+9
* Sync to mainline for security submaintainers to work againstJames Morris2017-05-221-9/+0
|\
| * Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-05-031-0/+5
| |\
| * | HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro2017-04-261-9/+0
* | | security: Grammar s/allocates/allocated/Geert Uytterhoeven2017-05-151-1/+1
| |/ |/|
* | security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris2017-03-061-0/+5
|/
* Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman2017-01-191-0/+35
* Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2016-09-071-0/+11
|\
| * usercopy: remove page-spanning test for nowKees Cook2016-09-071-0/+11
|/
* Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds2016-08-191-0/+1
* mm: Hardened usercopyKees Cook2016-07-261-0/+28
* LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+1
* Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook2015-07-281-5/+0
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-0/+1
* security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross2014-02-051-1/+1
* KEYS: Move the key config into security/keys/KconfigDavid Howells2012-05-111-67/+1