aboutsummaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2018-11-26audit: use current whenever possiblePaul Moore1-1/+1
2018-11-26selinux: make "selinux_policycap_names[]" const char *Alexey Dobriyan2-2/+2
2018-11-26selinux: always allow mounting submountsOndrej Mosnacek1-1/+1
2018-11-20selinux: refactor sidtab conversionOndrej Mosnacek3-41/+42
2018-11-20crypto: drop mask=CRYPTO_ALG_ASYNC from 'shash' tfm allocationsEric Biggers4-7/+6
2018-11-15Merge tag 'selinux-pr-20181115' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2-3/+10
2018-11-14apparmor: Fix warning about unused function apparmor_ipv6_postroutePetr Vorel1-0/+2
2018-11-13selinux: fix non-MLS handling in mls_context_to_sid()Paul Moore1-3/+7
2018-11-13integrity: support new struct public_key_signature encoding fieldMimi Zohar1-0/+1
2018-11-13selinux: check length properly in SCTP bind hookOndrej Mosnacek1-0/+3
2018-11-13integrity: support new struct public_key_signature encoding fieldMimi Zohar1-0/+1
2018-11-13tpm: use u32 instead of int for PCR indexTomas Winkler1-2/+3
2018-11-12Merge tag 'v4.20-rc2' into next-generalJames Morris39-326/+880
2018-11-05selinux: policydb - fix byte order and alignment issuesOndrej Mosnacek1-15/+36
2018-11-05tomoyo: fix small typoYangtao Li1-1/+1
2018-11-02Merge tag 'apparmor-pr-2018-11-01' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds12-17/+291
2018-11-01apparmor: clean an indentation issue, remove extraneous spaceColin Ian King1-1/+1
2018-11-01apparmor: fix checkpatch error in Parse secmark policyJohn Johansen1-1/+1
2018-10-26KEYS: Move trusted.h to include/keys [ver #2]Denis Kenzior2-137/+1
2018-10-26KEYS: trusted: Expose common functionality [ver #2]Denis Kenzior2-5/+21
2018-10-26KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]David Howells5-0/+405
2018-10-25Merge branch 'next-loadpin' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2-13/+17
2018-10-25Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds2-7/+11
2018-10-25Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds9-43/+54
2018-10-24Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds8-25/+50
2018-10-24Merge tag 'selinux-pr-20181022' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds5-111/+88
2018-10-24Merge branch 'siginfo-linus' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds4-4/+4
2018-10-18Merge tag 'loadpin-security-next' of https://git.kernel.org/pub/scm/linux/ker...James Morris2-13/+17
2018-10-18LoadPin: Rename boot param "enabled" to "enforce"Kees Cook2-12/+13
2018-10-18LoadPin: Report friendly block device nameKees Cook1-1/+4
2018-10-12apparmor: add #ifdef checks for secmark filteringArnd Bergmann2-0/+12
2018-10-10LSM: Don't ignore initialization failuresKees Cook1-1/+3
2018-10-10LSM: Provide init debugging infrastructureKees Cook1-0/+18
2018-10-10LSM: Record LSM name in struct lsm_infoKees Cook5-0/+5
2018-10-10LSM: Convert security_initcall() into DEFINE_LSM()Kees Cook5-5/+15
2018-10-10LSM: Convert from initcall to struct lsm_infoKees Cook2-9/+6
2018-10-10LSM: Remove initcall tracingKees Cook1-7/+1
2018-10-10LSM: Rename .security_initcall section to .lsm_infoKees Cook1-2/+2
2018-10-10LSM: Correctly announce start of LSM initializationKees Cook1-1/+2
2018-10-10ima: open a new file instance if no read permissionsGoldwyn Rodrigues1-20/+34
2018-10-10ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers1-3/+3
2018-10-10security/integrity: remove unnecessary 'init_keyring' variableEric Biggers1-7/+1
2018-10-10security/integrity: constify some read-only dataEric Biggers8-13/+16
2018-10-03signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman4-4/+4
2018-10-03apparmor: Fix uninitialized value in aa_split_fqnameZubin Mithra1-2/+4
2018-10-03apparmor: don't try to replace stale label in ptraceme checkJann Horn1-2/+2
2018-10-03apparmor: Replace spin_is_locked() with lockdepLance Roy1-1/+1
2018-10-03apparmor: Allow filtering based on secmark policyMatthew Garrett2-1/+177
2018-10-03apparmor: Parse secmark policyMatthew Garrett4-0/+77
2018-10-03apparmor: Add a wildcard secidMatthew Garrett2-2/+4