summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* integrity, KEYS: add a reference to platform keyringKairui Song2019-02-041-0/+3
* LSM: SafeSetID: remove unused includeMicah Morton2019-01-301-1/+0Star
* LSM: SafeSetID: 'depend' on CONFIG_SECURITYMicah Morton2019-01-291-0/+2
* LSM: Add 'name' field for SafeSetID in DEFINE_LSMMicah Morton2019-01-281-0/+1
* LSM: add SafeSetID module that gates setid callsMicah Morton2019-01-257-1/+526
* tomoyo: Allow multiple use_group lines.Tetsuo Handa2019-01-243-22/+42
* tomoyo: Coding style fix.Tetsuo Handa2019-01-2415-105/+309
* tomoyo: Swicth from cred->security to task_struct->security.Tetsuo Handa2019-01-235-122/+108Star
* security: keys: annotate implicit fall throughsMathieu Malaterre2019-01-231-0/+4
* security: keys: annotate implicit fall throughsMathieu Malaterre2019-01-231-0/+3
* security: keys: annotate implicit fall throughMathieu Malaterre2019-01-231-0/+1
* apparmor: Adjust offset when accessing task blob.Tetsuo Handa2019-01-221-1/+1
* Merge tag 'v5.0-rc3' into next-generalJames Morris2019-01-223-2/+12
|\
| * Merge branch 'fixes-v5.0-rc2' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-01-172-1/+10
| |\
| | * LSM: Check for NULL cred-security on freeJames Morris2019-01-171-0/+7
| | * Yama: Check for pid death before checking ancestryKees Cook2019-01-161-1/+3
| * | Merge tag 'selinux-pr-20190115' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-01-161-1/+2
| |\ \ | | |/ | |/|
| | * selinux: fix GPF on invalid policyStephen Smalley2019-01-111-1/+2
* | | LSM: Make some functions staticWei Yongjun2019-01-181-3/+3
* | | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-185-22/+11Star
* | | LSM: generalize flag passing to security_capableMicah Morton2019-01-109-39/+37Star
* | | TOMOYO: Update LSM flags to no longer be exclusiveKees Cook2019-01-081-1/+1
* | | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-085-121/+108Star
* | | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-082-5/+20
* | | SELinux: Abstract use of ipc security blobsCasey Schaufler2019-01-082-9/+22
* | | LSM: Infrastructure management of the task securityCasey Schaufler2019-01-083-27/+60
* | | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-085-98/+90Star
* | | Smack: Abstract use of inode security blobCasey Schaufler2019-01-082-18/+23
* | | SELinux: Abstract use of inode security blobCasey Schaufler2019-01-083-15/+21
* | | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-087-51/+71
* | | Smack: Abstract use of file security blobCasey Schaufler2019-01-082-4/+13
* | | SELinux: Abstract use of file security blobCasey Schaufler2019-01-082-9/+14
* | | Infrastructure management of the cred security blobCasey Schaufler2019-01-0810-102/+150
* | | TOMOYO: Abstract use of cred security blobCasey Schaufler2019-01-084-16/+64
* | | AppArmor: Abstract use of cred security blobCasey Schaufler2019-01-084-10/+24
* | | SELinux: Remove unused selinux_is_enabledCasey Schaufler2019-01-085-29/+1Star
* | | SELinux: Remove cred security blob poisoningCasey Schaufler2019-01-081-6/+0Star
* | | SELinux: Abstract use of cred security blobCasey Schaufler2019-01-083-29/+34
* | | Smack: Abstract use of cred security blobCasey Schaufler2019-01-084-43/+53
* | | procfs: add smack subdir to attrsCasey Schaufler2019-01-081-4/+20
* | | capability: Initialize as LSM_ORDER_FIRSTKees Cook2019-01-082-6/+8
* | | LSM: Introduce enum lsm_orderKees Cook2019-01-081-1/+8
* | | Yama: Initialize as ordered LSMKees Cook2019-01-083-3/+8
* | | LoadPin: Initialize as ordered LSMKees Cook2019-01-083-40/+8Star
* | | LSM: Split LSM preparation from initializationKees Cook2019-01-081-6/+15
* | | LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler2019-01-081-25/+20Star
* | | selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUEKees Cook2019-01-082-19/+1Star
* | | apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUEKees Cook2019-01-082-17/+1Star
* | | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-085-4/+16
* | | LSM: Refactor "security=" in terms of enable/disableKees Cook2019-01-081-8/+20