summaryrefslogtreecommitdiffstats
path: root/security (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | selinux: never allow relabeling on context mountsOndrej Mosnacek2019-01-111-9/+31
| * | | | | selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_linkStephen Smalley2019-01-113-30/+4
| * | | | | selinux: avoid silent denials in permissive mode under RCU walkStephen Smalley2019-01-113-3/+25
| |/ / / /
* | | | | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2019-03-0758-965/+2018
|\ \ \ \ \
| * | | | | keys: fix missing __user in KEYCTL_PKEY_QUERYBen Dooks2019-03-051-1/+1
| * | | | | LSM: Update list of SECURITYFS users in KconfigPetr Vorel2019-03-011-2/+1
| * | | | | LSM: Ignore "security=" when "lsm=" is specifiedKees Cook2019-02-261-2/+6
| * | | | | LSM: Update function documentation for cap_capableMicah Morton2019-02-261-1/+1
| * | | | | security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-225-3/+8
| * | | | | tomoyo: Bump version.Tetsuo Handa2019-02-192-8/+13
| | |/ / / | |/| | |
| * | | | LSM: fix return value check in safesetid_init_securityfs()Wei Yongjun2019-02-121-1/+1
| | |/ / | |/| |
| * | | LSM: SafeSetID: remove unused includeMicah Morton2019-01-301-1/+0
| * | | LSM: SafeSetID: 'depend' on CONFIG_SECURITYMicah Morton2019-01-291-0/+2
| * | | LSM: Add 'name' field for SafeSetID in DEFINE_LSMMicah Morton2019-01-281-0/+1
| * | | LSM: add SafeSetID module that gates setid callsMicah Morton2019-01-257-1/+526
| * | | tomoyo: Allow multiple use_group lines.Tetsuo Handa2019-01-243-22/+42
| * | | tomoyo: Coding style fix.Tetsuo Handa2019-01-2415-105/+309
| * | | tomoyo: Swicth from cred->security to task_struct->security.Tetsuo Handa2019-01-235-122/+108
| * | | security: keys: annotate implicit fall throughsMathieu Malaterre2019-01-231-0/+4
| * | | security: keys: annotate implicit fall throughsMathieu Malaterre2019-01-231-0/+3
| * | | security: keys: annotate implicit fall throughMathieu Malaterre2019-01-231-0/+1
| * | | apparmor: Adjust offset when accessing task blob.Tetsuo Handa2019-01-221-1/+1
| * | | Merge tag 'v5.0-rc3' into next-generalJames Morris2019-01-223-2/+12
| |\ \ \
| * | | | LSM: Make some functions staticWei Yongjun2019-01-181-3/+3
| * | | | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-185-22/+11
| * | | | LSM: generalize flag passing to security_capableMicah Morton2019-01-109-39/+37
| * | | | TOMOYO: Update LSM flags to no longer be exclusiveKees Cook2019-01-081-1/+1
| * | | | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-085-121/+108
| * | | | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-082-5/+20
| * | | | SELinux: Abstract use of ipc security blobsCasey Schaufler2019-01-082-9/+22
| * | | | LSM: Infrastructure management of the task securityCasey Schaufler2019-01-083-27/+60
| * | | | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-085-98/+90
| * | | | Smack: Abstract use of inode security blobCasey Schaufler2019-01-082-18/+23
| * | | | SELinux: Abstract use of inode security blobCasey Schaufler2019-01-083-15/+21
| * | | | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-087-51/+71
| * | | | Smack: Abstract use of file security blobCasey Schaufler2019-01-082-4/+13
| * | | | SELinux: Abstract use of file security blobCasey Schaufler2019-01-082-9/+14
| * | | | Infrastructure management of the cred security blobCasey Schaufler2019-01-0810-102/+150
| * | | | TOMOYO: Abstract use of cred security blobCasey Schaufler2019-01-084-16/+64
| * | | | AppArmor: Abstract use of cred security blobCasey Schaufler2019-01-084-10/+24
| * | | | SELinux: Remove unused selinux_is_enabledCasey Schaufler2019-01-085-29/+1
| * | | | SELinux: Remove cred security blob poisoningCasey Schaufler2019-01-081-6/+0
| * | | | SELinux: Abstract use of cred security blobCasey Schaufler2019-01-083-29/+34
| * | | | Smack: Abstract use of cred security blobCasey Schaufler2019-01-084-43/+53
| * | | | procfs: add smack subdir to attrsCasey Schaufler2019-01-081-4/+20
| * | | | capability: Initialize as LSM_ORDER_FIRSTKees Cook2019-01-082-6/+8
| * | | | LSM: Introduce enum lsm_orderKees Cook2019-01-081-1/+8
| * | | | Yama: Initialize as ordered LSMKees Cook2019-01-083-3/+8
| * | | | LoadPin: Initialize as ordered LSMKees Cook2019-01-083-40/+8
| * | | | LSM: Split LSM preparation from initializationKees Cook2019-01-081-6/+15