summaryrefslogtreecommitdiffstats
path: root/security/Kconfig (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-05-031-0/+5
|\
| * security: introduce CONFIG_SECURITY_WRITABLE_HOOKSJames Morris2017-03-061-0/+5
* | HAVE_ARCH_HARDENED_USERCOPY is unconditional nowAl Viro2017-04-261-9/+0
|/
* Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()Greg Kroah-Hartman2017-01-191-0/+35
* Merge tag 'usercopy-v4.8-rc6-part2' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2016-09-071-0/+11
|\
| * usercopy: remove page-spanning test for nowKees Cook2016-09-071-0/+11
|/
* Make the hardened user-copy code depend on having a hardened allocatorLinus Torvalds2016-08-191-0/+1
* mm: Hardened usercopyKees Cook2016-07-261-0/+28
* LSM: LoadPin for kernel file loading restrictionsKees Cook2016-04-211-0/+1
* Yama: remove needless CONFIG_SECURITY_YAMA_STACKEDKees Cook2015-07-281-5/+0
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-161-0/+1
* security: select correct default LSM_MMAP_MIN_ADDR on arm on arm64Colin Cross2014-02-051-1/+1
* KEYS: Move the key config into security/keys/KconfigDavid Howells2012-05-111-67/+1
* security: Yama LSMKees Cook2012-02-091-0/+6
* encrypted-keys: remove trusted-keys dependencyMimi Zohar2011-09-141-1/+3
* integrity: move ima inode integrity data managementMimi Zohar2011-07-181-1/+1
* security: select correct default LSM_MMAP_MIN_ADDR on ARM.Paul Gortmaker2011-03-211-0/+1
* keys: add new key-type encryptedMimi Zohar2010-11-281-0/+16
* keys: add new trusted key-typeMimi Zohar2010-11-281-0/+15
* Restrict unprivileged access to kernel syslogDan Rosenberg2010-11-121-0/+12
* AppArmor: Enable configuring and building of the AppArmor security moduleJohn Johansen2010-08-021-0/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-9/+0
* Config option to set a default LSMJohn Johansen2009-11-081-0/+32
* security: remove root_plugJames Morris2009-10-201-13/+0
* Merge commit 'v2.6.31-rc8' into x86/txtIngo Molnar2009-09-021-0/+16
|\
| * security: Fix prompt for LSM_MMAP_MIN_ADDRAndreas Schwab2009-08-191-1/+1
| * security: Make LSM_MMAP_MIN_ADDR default match its help text.Dave Jones2009-08-191-1/+1
| * Security/SELinux: seperate lsm specific mmap_min_addrEric Paris2009-08-171-0/+16
* | x86, intel_txt: clean up the impact on generic code, unbreak non-x86Shane Wang2009-09-021-1/+1
* | x86, intel_txt: Fix typos in Kconfig helpArnaldo Carvalho de Melo2009-08-151-2/+2
* | x86, intel_txt: Intel TXT boot supportJoseph Cihula2009-07-211-0/+30
|/
* security: use mmap_min_addr indepedently of security modelsChristoph Lameter2009-06-041-21/+1
* Kconfig and MakefileKentaro Takeda2009-02-121-0/+1
* Merge branch 'master' into nextJames Morris2009-02-061-0/+9
|\
| * introduce new LSM hooks where vfsmount is available.Kentaro Takeda2009-01-011-0/+9
* | integrity: IMA as an integrity service providerMimi Zohar2009-02-051-1/+4
|/
* securityfs: do not depend on CONFIG_SECURITYEric Paris2008-08-281-0/+8
* security: filesystem capabilities no longer experimentalAndrew G. Morgan2008-07-241-2/+1
* security: remove dummy module fixMiklos Szeredi2008-07-141-1/+1
* security: remove dummy moduleMiklos Szeredi2008-07-141-9/+1
* security: enhance DEFAULT_MMAP_MIN_ADDR descriptionmaximilian attems2008-04-181-4/+6
* security: allow Kconfig to set default mmap_min_addr protectionEric Paris2008-02-061-0/+18
* Smack: Simplified Mandatory Access Control KernelCasey Schaufler2008-02-051-0/+1
* security: compile capabilities by defaultsergeh@us.ibm.com2008-01-291-0/+1
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-0/+10
* security: Convert LSM into a static interfaceJames Morris2007-10-171-3/+3
* [PATCH] LSM: remove BSD secure level security moduleChris Wright2006-09-291-12/+0
* [PATCH] keys: restrict contents of /proc/keys to Viewable keysMichael LeMay2006-06-261-7/+13
* [LSM-IPSec]: Security association restriction.Trent Jaeger2006-01-031-0/+13
* [PATCH] SECURITY must depend on SYSFSAdrian Bunk2005-08-221-0/+1