summaryrefslogtreecommitdiffstats
path: root/security/apparmor (follow)
Commit message (Expand)AuthorAgeFilesLines
* apparmorfs: replace CURRENT_TIME with current_time()Deepa Dinamani2017-05-091-1/+1
* mm: introduce kv[mz]alloc helpersMichal Hocko2017-05-095-44/+3
* apparmor: Make path_max parameter readonlyJohn Johansen2017-04-071-1/+1
* apparmor: fix parameters so that the permission test is bypassed at bootJohn Johansen2017-04-072-26/+23
* apparmor: fix invalid reference to index variable of iterator line 836John Johansen2017-04-071-2/+4
* apparmor: use SHASH_DESC_ON_STACKNicolas Iooss2017-04-071-19/+13
* security/apparmor/lsm.c: set debug messagesValentin Rothberg2017-04-071-1/+1
* apparmor: fix boolreturn.cocci warningskbuild test robot2017-04-071-2/+2
* security: mark LSM hooks as __ro_after_initJames Morris2017-03-061-1/+1
* sched/headers: Prepare to use <linux/rcuupdate.h> instead of <linux/rculist.h...Ingo Molnar2017-03-021-0/+1
* sched/headers: Prepare to remove <linux/cred.h> inclusion from <linux/sched.h>Ingo Molnar2017-03-021-0/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2017-02-241-1/+1
|\
| * exec: Remove LSM_UNSAFE_PTRACE_CAPEric W. Biederman2017-01-241-1/+1
* | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-02-2135-1521/+2794
|\ \
| * \ Merge branch 'stable-4.11' of git://git.infradead.org/users/pcmoore/selinux i...James Morris2017-02-101-5/+2
| |\ \
| | * | proc,security: move restriction on writing /proc/pid/attr nodes to procStephen Smalley2017-01-091-5/+2
| | |/
| * | LSM: Add /sys/kernel/security/lsmCasey Schaufler2017-01-191-1/+2
| * | apparmor: fix undefined reference to `aa_g_hash_policy'John Johansen2017-01-161-1/+1
| * | apparmor: replace remaining BUG_ON() asserts with AA_BUG()John Johansen2017-01-164-5/+5
| * | apparmor: fix restricted endian type warnings for policy unpackJohn Johansen2017-01-161-6/+6
| * | apparmor: fix restricted endian type warnings for dfa unpackJohn Johansen2017-01-162-12/+12
| * | apparmor: add check for apparmor enabled in module parameters missing itJohn Johansen2017-01-161-0/+10
| * | apparmor: add per cpu work buffers to avoid allocating buffers at every hookJohn Johansen2017-01-162-1/+103
| * | apparmor: sysctl to enable unprivileged user ns AppArmor policy loadingTyler Hicks2017-01-162-1/+47
| * | apparmor: support querying extended trusted helper extra dataWilliam Hua2017-01-165-0/+245
| * | apparmor: update cap audit to check SECURITY_CAP_NOAUDITJohn Johansen2017-01-161-6/+10
| * | apparmor: make computing policy hashes conditional on kernel parameterJohn Johansen2017-01-162-29/+32
| * | apparmor: convert change_profile to use fqname later to give better controlJohn Johansen2017-01-165-66/+28
| * | apparmor: fix change_hat debug outputJohn Johansen2017-01-161-4/+5
| * | apparmor: remove unused op parameter from simple_write_to_buffer()John Johansen2017-01-161-6/+3
| * | apparmor: change aad apparmor_audit_data macro to a fn macroJohn Johansen2017-01-1612-161/+155
| * | apparmor: change op from int to const char *John Johansen2017-01-1610-134/+84
| * | apparmor: rename context abreviation cxt to the more standard ctxJohn Johansen2017-01-165-144/+150
| * | apparmor: fail task profile update if current_cred isn't real_credJohn Johansen2017-01-161-0/+3
| * | apparmor: add per policy ns .load, .replace, .remove interface filesJohn Johansen2017-01-162-22/+130
| * | apparmor: pass the subject profile into profile replace/removeJohn Johansen2017-01-163-16/+21
| * | apparmor: audit policy ns specified in policy loadJohn Johansen2017-01-163-24/+77
| * | apparmor: allow introspecting the loaded policy pre internal transformJohn Johansen2017-01-168-58/+278
| * | apparmor: add ns name to the audit data for policy loadsJohn Johansen2017-01-162-10/+25
| * | apparmor: add profile and ns params to aa_may_manage_policy()John Johansen2017-01-163-14/+12
| * | apparmor: add ns being viewed as a param to policy_admin_capable()John Johansen2017-01-163-10/+16
| * | apparmor: add ns being viewed as a param to policy_view_capable()John Johansen2017-01-164-8/+35
| * | apparmor: allow specifying the profile doing the managementJohn Johansen2017-01-161-11/+21
| * | apparmor: allow introspecting the policy namespace nameJohn Johansen2017-01-161-0/+24
| * | apparmor: Make aa_remove_profile() callable from a different viewJohn Johansen2017-01-163-5/+7
| * | apparmor: track ns level so it can be used to help in view checksJohn Johansen2017-01-161-0/+1
| * | apparmor: add special .null file used to "close" fds at execJohn Johansen2017-01-163-1/+81
| * | apparmor: provide userspace flag indicating binfmt_elf_mmap changeJohn Johansen2017-01-161-0/+1
| * | apparmor: add a default null dfaJohn Johansen2017-01-166-2/+46
| * | apparmor: allow policydb to be used as the file dfaJohn Johansen2017-01-161-4/+8