index
:
linux
master
linux
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
security
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
...
|
*
|
|
LSM: SafeSetID: 'depend' on CONFIG_SECURITY
Micah Morton
2019-01-29
1
-0
/
+2
|
*
|
|
LSM: Add 'name' field for SafeSetID in DEFINE_LSM
Micah Morton
2019-01-28
1
-0
/
+1
|
*
|
|
LSM: add SafeSetID module that gates setid calls
Micah Morton
2019-01-25
7
-1
/
+526
|
*
|
|
tomoyo: Allow multiple use_group lines.
Tetsuo Handa
2019-01-24
3
-22
/
+42
|
*
|
|
tomoyo: Coding style fix.
Tetsuo Handa
2019-01-24
15
-105
/
+309
|
*
|
|
tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
2019-01-23
5
-122
/
+108
|
*
|
|
security: keys: annotate implicit fall throughs
Mathieu Malaterre
2019-01-23
1
-0
/
+4
|
*
|
|
security: keys: annotate implicit fall throughs
Mathieu Malaterre
2019-01-23
1
-0
/
+3
|
*
|
|
security: keys: annotate implicit fall through
Mathieu Malaterre
2019-01-23
1
-0
/
+1
|
*
|
|
apparmor: Adjust offset when accessing task blob.
Tetsuo Handa
2019-01-22
1
-1
/
+1
|
*
|
|
Merge tag 'v5.0-rc3' into next-general
James Morris
2019-01-22
3
-2
/
+12
|
|
\
\
\
|
*
|
|
|
LSM: Make some functions static
Wei Yongjun
2019-01-18
1
-3
/
+3
|
*
|
|
|
LSM: Make lsm_early_cred() and lsm_early_task() local functions.
Tetsuo Handa
2019-01-18
5
-22
/
+11
|
*
|
|
|
LSM: generalize flag passing to security_capable
Micah Morton
2019-01-10
9
-39
/
+37
|
*
|
|
|
TOMOYO: Update LSM flags to no longer be exclusive
Kees Cook
2019-01-08
1
-1
/
+1
|
*
|
|
|
LSM: Infrastructure management of the ipc security blob
Casey Schaufler
2019-01-08
5
-121
/
+108
|
*
|
|
|
Smack: Abstract use of ipc security blobs
Casey Schaufler
2019-01-08
2
-5
/
+20
|
*
|
|
|
SELinux: Abstract use of ipc security blobs
Casey Schaufler
2019-01-08
2
-9
/
+22
|
*
|
|
|
LSM: Infrastructure management of the task security
Casey Schaufler
2019-01-08
3
-27
/
+60
|
*
|
|
|
LSM: Infrastructure management of the inode security
Casey Schaufler
2019-01-08
5
-98
/
+90
|
*
|
|
|
Smack: Abstract use of inode security blob
Casey Schaufler
2019-01-08
2
-18
/
+23
|
*
|
|
|
SELinux: Abstract use of inode security blob
Casey Schaufler
2019-01-08
3
-15
/
+21
|
*
|
|
|
LSM: Infrastructure management of the file security
Casey Schaufler
2019-01-08
7
-51
/
+71
|
*
|
|
|
Smack: Abstract use of file security blob
Casey Schaufler
2019-01-08
2
-4
/
+13
|
*
|
|
|
SELinux: Abstract use of file security blob
Casey Schaufler
2019-01-08
2
-9
/
+14
|
*
|
|
|
Infrastructure management of the cred security blob
Casey Schaufler
2019-01-08
10
-102
/
+150
|
*
|
|
|
TOMOYO: Abstract use of cred security blob
Casey Schaufler
2019-01-08
4
-16
/
+64
|
*
|
|
|
AppArmor: Abstract use of cred security blob
Casey Schaufler
2019-01-08
4
-10
/
+24
|
*
|
|
|
SELinux: Remove unused selinux_is_enabled
Casey Schaufler
2019-01-08
5
-29
/
+1
|
*
|
|
|
SELinux: Remove cred security blob poisoning
Casey Schaufler
2019-01-08
1
-6
/
+0
|
*
|
|
|
SELinux: Abstract use of cred security blob
Casey Schaufler
2019-01-08
3
-29
/
+34
|
*
|
|
|
Smack: Abstract use of cred security blob
Casey Schaufler
2019-01-08
4
-43
/
+53
|
*
|
|
|
procfs: add smack subdir to attrs
Casey Schaufler
2019-01-08
1
-4
/
+20
|
*
|
|
|
capability: Initialize as LSM_ORDER_FIRST
Kees Cook
2019-01-08
2
-6
/
+8
|
*
|
|
|
LSM: Introduce enum lsm_order
Kees Cook
2019-01-08
1
-1
/
+8
|
*
|
|
|
Yama: Initialize as ordered LSM
Kees Cook
2019-01-08
3
-3
/
+8
|
*
|
|
|
LoadPin: Initialize as ordered LSM
Kees Cook
2019-01-08
3
-40
/
+8
|
*
|
|
|
LSM: Split LSM preparation from initialization
Kees Cook
2019-01-08
1
-6
/
+15
|
*
|
|
|
LSM: Add all exclusive LSMs to ordered initialization
Casey Schaufler
2019-01-08
1
-25
/
+20
|
*
|
|
|
selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
Kees Cook
2019-01-08
2
-19
/
+1
|
*
|
|
|
apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
Kees Cook
2019-01-08
2
-17
/
+1
|
*
|
|
|
LSM: Separate idea of "major" LSM from "exclusive" LSM
Kees Cook
2019-01-08
5
-4
/
+16
|
*
|
|
|
LSM: Refactor "security=" in terms of enable/disable
Kees Cook
2019-01-08
1
-8
/
+20
|
*
|
|
|
LSM: Prepare for reorganizing "security=" logic
Kees Cook
2019-01-08
1
-9
/
+8
|
*
|
|
|
LSM: Tie enabling logic to presence in ordered list
Kees Cook
2019-01-08
1
-3
/
+11
|
*
|
|
|
LSM: Introduce "lsm=" for boottime LSM selection
Kees Cook
2019-01-08
2
-2
/
+15
|
*
|
|
|
LSM: Introduce CONFIG_LSM
Kees Cook
2019-01-08
2
-5
/
+31
|
*
|
|
|
LSM: Build ordered list of LSMs to initialize
Kees Cook
2019-01-08
1
-5
/
+53
|
*
|
|
|
LSM: Lift LSM selection out of individual LSMs
Kees Cook
2019-01-08
5
-52
/
+71
|
*
|
|
|
LSM: Plumb visibility into optional "enabled" state
Kees Cook
2019-01-08
2
-2
/
+4
[prev]
[next]