summaryrefslogtreecommitdiff
path: root/security/Kconfig
AgeCommit message (Expand)AuthorFilesLines
2023-05-24mm/slab: remove HAVE_HARDENED_USERCOPY_ALLOCATORVlastimil Babka1-8/+0
2023-04-24Merge tag 'docs-6.4' of git://git.lwn.net/linuxLinus Torvalds1-1/+1
2023-04-24Merge tag 'lsm-pr-20230420' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-7/+9
2023-03-30docs: move x86 documentation into Documentation/arch/Jonathan Corbet1-1/+1
2023-03-20selinux: remove the runtime disable functionalityPaul Moore1-5/+0
2023-03-11security: Remove integrity from the LSM list in KconfigRoberto Sassu1-7/+9
2022-06-29x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra1-11/+0
2022-04-13usercopy: Remove HARDENED_USERCOPY_PAGESPANMatthew Wilcox (Oracle)1-12/+1
2022-03-31Merge tag 'hardening-v5.18-rc1-fix1' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds1-1/+1
2022-03-25usercopy: Disable CONFIG_HARDENED_USERCOPY_PAGESPANKees Cook1-1/+1
2022-02-14fortify: Add Clang supportKees Cook1-2/+3
2021-11-07Merge branch 'akpm' (patches from Andrew)Linus Torvalds1-14/+0
2021-11-06mm: remove HARDENED_USERCOPY_FALLBACKStephen Kitt1-14/+0
2021-09-25fortify: Explicitly disable Clang supportKees Cook1-0/+3
2021-04-22landlock: Set up the security framework and manage credentialsMickaël Salaün1-5/+5
2021-04-22landlock: Add object managementMickaël Salaün1-0/+1
2020-08-06Replace HTTP links with HTTPS ones: securityAlexander A. Klimov1-1/+1
2020-03-30bpf: lsm: Initialize the BPF LSM hooksKP Singh1-5/+5
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-5/+6
2019-08-20security: Add a static lockdown policy LSMMatthew Garrett1-5/+6
2019-07-15docs: x86: move two x86-specific files to x86 arch dirMauro Carvalho Chehab1-1/+1
2019-06-14Merge tag 'v5.2-rc4' into mauroJonathan Corbet1-0/+1
2019-06-08docs: fix broken documentation linksMauro Carvalho Chehab1-1/+1
2019-05-21treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner1-0/+1
2019-05-07Merge tag 'meminit-v5.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-0/+2
2019-04-24security: Create "kernel hardening" config areaKees Cook1-0/+2
2019-03-30LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig"Kees Cook1-0/+38
2019-03-01LSM: Update list of SECURITYFS users in KconfigPetr Vorel1-2/+1
2019-01-25LSM: add SafeSetID module that gates setid callsMicah Morton1-1/+2
2019-01-09Yama: Initialize as ordered LSMKees Cook1-1/+1
2019-01-09LoadPin: Initialize as ordered LSMKees Cook1-38/+1
2019-01-09LSM: Introduce "lsm=" for boottime LSM selectionKees Cook1-1/+2
2019-01-09LSM: Introduce CONFIG_LSMKees Cook1-0/+9
2018-12-21treewide: surround Kconfig file paths with double quotesMasahiro Yamada1-8/+8
2018-09-14Revert "x86/mm/legacy: Populate the user page-table with user pgd's"Joerg Roedel1-1/+1
2018-08-15Merge tag 'hardened-usercopy-v4.19-rc1' of git://git.kernel.org/pub/scm/linux...Linus Torvalds1-1/+0
2018-07-20x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel1-1/+1
2018-07-03usercopy: Do not select BUG with HARDENED_USERCOPYKamal Mostafa1-1/+0
2018-02-04Merge tag 'usercopy-v4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+14
2018-02-01Merge tag 'char-misc-4.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-0/+1
2018-01-15usercopy: Allow strict enforcement of whitelistsKees Cook1-0/+14
2018-01-14security/Kconfig: Correct the Documentation reference for PTIW. Trevor King1-1/+1
2018-01-03x86/pti: Enable PTI by defaultThomas Gleixner1-0/+1
2018-01-02Merge 4.15-rc6 into char-misc-nextGreg Kroah-Hartman1-0/+10
2017-12-23x86/mm/pti: Add KconfigDave Hansen1-0/+10
2017-12-18/dev/mem: Add bounce buffer for copy-outKees Cook1-0/+1
2017-07-13include/linux/string.h: add the option of fortified string.h functionsDaniel Micay1-0/+7
2017-05-23IB/core: Enforce PKey security on QPsDaniel Jurgens1-0/+9
2017-05-22Sync to mainline for security submaintainers to work againstJames Morris1-9/+0
2017-05-15security: Grammar s/allocates/allocated/Geert Uytterhoeven1-1/+1