summaryrefslogtreecommitdiffstats
path: root/security (follow)
Commit message (Expand)AuthorAgeFilesLines
* Smack: Abstract use of inode security blobCasey Schaufler2019-01-082-18/+23
* SELinux: Abstract use of inode security blobCasey Schaufler2019-01-083-15/+21
* LSM: Infrastructure management of the file securityCasey Schaufler2019-01-087-51/+71
* Smack: Abstract use of file security blobCasey Schaufler2019-01-082-4/+13
* SELinux: Abstract use of file security blobCasey Schaufler2019-01-082-9/+14
* Infrastructure management of the cred security blobCasey Schaufler2019-01-0810-102/+150
* TOMOYO: Abstract use of cred security blobCasey Schaufler2019-01-084-16/+64
* AppArmor: Abstract use of cred security blobCasey Schaufler2019-01-084-10/+24
* SELinux: Remove unused selinux_is_enabledCasey Schaufler2019-01-085-29/+1
* SELinux: Remove cred security blob poisoningCasey Schaufler2019-01-081-6/+0
* SELinux: Abstract use of cred security blobCasey Schaufler2019-01-083-29/+34
* Smack: Abstract use of cred security blobCasey Schaufler2019-01-084-43/+53
* procfs: add smack subdir to attrsCasey Schaufler2019-01-081-4/+20
* capability: Initialize as LSM_ORDER_FIRSTKees Cook2019-01-082-6/+8
* LSM: Introduce enum lsm_orderKees Cook2019-01-081-1/+8
* Yama: Initialize as ordered LSMKees Cook2019-01-083-3/+8
* LoadPin: Initialize as ordered LSMKees Cook2019-01-083-40/+8
* LSM: Split LSM preparation from initializationKees Cook2019-01-081-6/+15
* LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler2019-01-081-25/+20
* selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUEKees Cook2019-01-082-19/+1
* apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUEKees Cook2019-01-082-17/+1
* LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-085-4/+16
* LSM: Refactor "security=" in terms of enable/disableKees Cook2019-01-081-8/+20
* LSM: Prepare for reorganizing "security=" logicKees Cook2019-01-081-9/+8
* LSM: Tie enabling logic to presence in ordered listKees Cook2019-01-081-3/+11
* LSM: Introduce "lsm=" for boottime LSM selectionKees Cook2019-01-082-2/+15
* LSM: Introduce CONFIG_LSMKees Cook2019-01-082-5/+31
* LSM: Build ordered list of LSMs to initializeKees Cook2019-01-081-5/+53
* LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-085-52/+71
* LSM: Plumb visibility into optional "enabled" stateKees Cook2019-01-082-2/+4
* LSM: Provide separate ordered initializationKees Cook2019-01-081-0/+21
* LSM: Introduce LSM_FLAG_LEGACY_MAJORKees Cook2019-01-084-0/+4
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-056-741/+459
|\
| * smack: rewrite smack_sb_eat_lsm_opts()Al Viro2018-12-211-85/+23
| * smack: get rid of match_token()Al Viro2018-12-211-18/+38
| * smack: take the guts of smack_parse_opts_str() into a new helperAl Viro2018-12-211-57/+57
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-213-30/+24
| * selinux: rewrite selinux_sb_eat_lsm_opts()Al Viro2018-12-211-92/+54
| * selinux: regularize Opt_... names a bitAl Viro2018-12-211-8/+8
| * selinux: switch away from match_token()Al Viro2018-12-211-27/+55
| * selinux: new helper - selinux_add_opt()Al Viro2018-12-211-73/+53
| * smack: switch to private smack_mnt_optsAl Viro2018-12-211-102/+55
| * selinux: switch to private struct selinux_mnt_optsAl Viro2018-12-211-161/+101
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-213-32/+85
| * selinux: kill selinux_sb_get_mnt_opts()Al Viro2018-12-211-147/+51
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-213-12/+31
| * btrfs: sanitize security_mnt_opts useAl Viro2018-12-211-0/+1
| * selinux; don't open-code a loop in sb_finish_set_opts()Al Viro2018-12-211-4/+2
| * LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-213-27/+3
| * new helper: security_sb_eat_lsm_opts()Al Viro2018-12-211-3/+12