summaryrefslogtreecommitdiffstats
path: root/security/security.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'v5.0-rc3' into next-generalJames Morris2019-01-221-0/+7
|\
| * LSM: Check for NULL cred-security on freeJames Morris2019-01-171-0/+7
* | LSM: Make some functions staticWei Yongjun2019-01-181-3/+3
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-16/+11
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-9/+5
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-4/+87
* | LSM: Infrastructure management of the task securityCasey Schaufler2019-01-081-1/+53
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-2/+62
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-3/+51
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-2/+87
* | procfs: add smack subdir to attrsCasey Schaufler2019-01-081-4/+20
* | capability: Initialize as LSM_ORDER_FIRSTKees Cook2019-01-081-5/+0
* | LSM: Introduce enum lsm_orderKees Cook2019-01-081-1/+8
* | Yama: Initialize as ordered LSMKees Cook2019-01-081-1/+0
* | LoadPin: Initialize as ordered LSMKees Cook2019-01-081-1/+0
* | LSM: Split LSM preparation from initializationKees Cook2019-01-081-6/+15
* | LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler2019-01-081-25/+20
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-0/+12
* | LSM: Refactor "security=" in terms of enable/disableKees Cook2019-01-081-8/+20
* | LSM: Prepare for reorganizing "security=" logicKees Cook2019-01-081-9/+8
* | LSM: Tie enabling logic to presence in ordered listKees Cook2019-01-081-3/+11
* | LSM: Introduce "lsm=" for boottime LSM selectionKees Cook2019-01-081-1/+13
* | LSM: Introduce CONFIG_LSMKees Cook2019-01-081-5/+22
* | LSM: Build ordered list of LSMs to initializeKees Cook2019-01-081-5/+53
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-31/+71
* | LSM: Provide separate ordered initializationKees Cook2019-01-081-0/+21
|/
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-051-13/+26
|\
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-3/+5
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-9/+18
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-211-10/+1
| * btrfs: sanitize security_mnt_opts useAl Viro2018-12-211-0/+1
| * LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-211-3/+2
| * new helper: security_sb_eat_lsm_opts()Al Viro2018-12-211-3/+12
| * LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro2018-12-211-2/+3
| * LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro2018-12-211-2/+3
* | security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
|/
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-241-16/+27
|\
| * LSM: Don't ignore initialization failuresKees Cook2018-10-111-1/+3
| * LSM: Provide init debugging infrastructureKees Cook2018-10-111-0/+18
| * LSM: Convert from initcall to struct lsm_infoKees Cook2018-10-111-9/+5
| * LSM: Remove initcall tracingKees Cook2018-10-111-7/+1
| * LSM: Rename .security_initcall section to .lsm_infoKees Cook2018-10-111-2/+2
| * LSM: Correctly announce start of LSM initializationKees Cook2018-10-111-1/+2
* | signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman2018-10-031-1/+1
|/
* init: allow initcall tables to be emitted using relative referencesArd Biesheuvel2018-08-221-7/+10
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-08-161-1/+6
|\
| * integrity: prevent deadlock during digsig verification.Mikhail Kurinnoi2018-07-181-1/+6
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-0/+13
|\|
| * security: check for kstrdup() failure in lsm_append()Eric Biggers2018-07-181-0/+2
| * security: export security_kernel_load_data functionArnd Bergmann2018-07-181-0/+1