index
:
profile/common/kernel-common
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0_common
accepted/tizen_4.0_unified
accepted/tizen_common
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_wearable
sandbox/dkson95/gcc6
sandbox/jaehun77/hardfp
sandbox/jkozerski/ima-evm
sandbox/jobol/upstream
sandbox/jobol/v3.19.1
sandbox/jobol/v4.0
sandbox/lstelmach/memfd
sandbox/mwereski/kdbus-integration
sandbox/mwereski/memfd
sandbox/pcoval/devel-sdk
sandbox/pcoval/efi
sandbox/pcoval/ivi-devel
sandbox/pcoval/latest
sandbox/pcoval/rcar-m2
sandbox/pcoval/snapshot
sandbox/pcoval/tizen
sandbox/pcoval/tizen_common
sandbox/sdx/displaylink
sandbox/zjasinski/ima-evm
sandbox/zjasinski/ima-evm2
tizen
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m2
tizen_3.14.14
tizen_3.14.19
tizen_3.14.4
tizen_4.0
tizen_common
tizen_common_3.14.20
tizen_common_3.14.25
upstream
Domain: SCM / Uncategorized;
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
Kconfig
Age
Commit message (
Expand
)
Author
Files
Lines
2011-09-14
encrypted-keys: remove trusted-keys dependency
Mimi Zohar
1
-1
/
+3
2011-07-18
integrity: move ima inode integrity data management
Mimi Zohar
1
-1
/
+1
2011-03-22
security: select correct default LSM_MMAP_MIN_ADDR on ARM.
Paul Gortmaker
1
-0
/
+1
2010-11-29
keys: add new key-type encrypted
Mimi Zohar
1
-0
/
+16
2010-11-29
keys: add new trusted key-type
Mimi Zohar
1
-0
/
+15
2010-11-12
Restrict unprivileged access to kernel syslog
Dan Rosenberg
1
-0
/
+12
2010-08-02
AppArmor: Enable configuring and building of the AppArmor security module
John Johansen
1
-0
/
+6
2009-11-24
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
Serge E. Hallyn
1
-9
/
+0
2009-11-09
Config option to set a default LSM
John Johansen
1
-0
/
+32
2009-10-20
security: remove root_plug
James Morris
1
-13
/
+0
2009-09-02
Merge commit 'v2.6.31-rc8' into x86/txt
Ingo Molnar
1
-0
/
+16
2009-09-01
x86, intel_txt: clean up the impact on generic code, unbreak non-x86
Shane Wang
1
-1
/
+1
2009-08-19
security: Fix prompt for LSM_MMAP_MIN_ADDR
Andreas Schwab
1
-1
/
+1
2009-08-19
security: Make LSM_MMAP_MIN_ADDR default match its help text.
Dave Jones
1
-1
/
+1
2009-08-17
Security/SELinux: seperate lsm specific mmap_min_addr
Eric Paris
1
-0
/
+16
2009-08-14
x86, intel_txt: Fix typos in Kconfig help
Arnaldo Carvalho de Melo
1
-2
/
+2
2009-07-21
x86, intel_txt: Intel TXT boot support
Joseph Cihula
1
-0
/
+30
2009-06-04
security: use mmap_min_addr indepedently of security models
Christoph Lameter
1
-21
/
+1
2009-02-12
Kconfig and Makefile
Kentaro Takeda
1
-0
/
+1
2009-02-06
Merge branch 'master' into next
James Morris
1
-0
/
+9
2009-02-06
integrity: IMA as an integrity service provider
Mimi Zohar
1
-1
/
+4
2008-12-31
introduce new LSM hooks where vfsmount is available.
Kentaro Takeda
1
-0
/
+9
2008-08-28
securityfs: do not depend on CONFIG_SECURITY
Eric Paris
1
-0
/
+8
2008-07-24
security: filesystem capabilities no longer experimental
Andrew G. Morgan
1
-2
/
+1
2008-07-14
security: remove dummy module fix
Miklos Szeredi
1
-1
/
+1
2008-07-14
security: remove dummy module
Miklos Szeredi
1
-9
/
+1
2008-04-18
security: enhance DEFAULT_MMAP_MIN_ADDR description
maximilian attems
1
-4
/
+6
2008-02-06
security: allow Kconfig to set default mmap_min_addr protection
Eric Paris
1
-0
/
+18
2008-02-05
Smack: Simplified Mandatory Access Control Kernel
Casey Schaufler
1
-0
/
+1
2008-01-30
security: compile capabilities by default
sergeh@us.ibm.com
1
-0
/
+1
2007-10-17
Implement file posix capabilities
Serge E. Hallyn
1
-0
/
+10
2007-10-17
security: Convert LSM into a static interface
James Morris
1
-3
/
+3
2006-09-29
[PATCH] LSM: remove BSD secure level security module
Chris Wright
1
-12
/
+0
2006-06-26
[PATCH] keys: restrict contents of /proc/keys to Viewable keys
Michael LeMay
1
-7
/
+13
2006-01-03
[LSM-IPSec]: Security association restriction.
Trent Jaeger
1
-0
/
+13
2005-08-22
[PATCH] SECURITY must depend on SYSFS
Adrian Bunk
1
-0
/
+1
2005-04-16
Linux-2.6.12-rc2
v2.6.12-rc2
Linus Torvalds
1
-0
/
+91