aboutsummaryrefslogtreecommitdiffstats
path: root/security (follow)
AgeCommit message (Expand)AuthorFilesLines
2013-09-07Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespaceLinus Torvalds1-5/+5
2013-09-07Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds28-547/+1666
2013-09-05Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-nextLinus Torvalds1-1/+6
2013-09-04Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linuxLinus Torvalds1-0/+2
2013-09-03Merge branch 'for-3.12' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroupLinus Torvalds1-39/+26
2013-08-30capabilities: allow nice if we are privilegedSerge Hallyn1-4/+4
2013-08-30userns: Allow PR_CAPBSET_DROP in a user namespace.Eric W. Biederman1-1/+1
2013-08-28Revert "SELinux: do not handle seclabel as a special flag"Eric Paris2-1/+4
2013-08-28selinux: consider filesystem subtype in policiesAnand Avati2-22/+60
2013-08-23Merge branch 'smack-for-3.12' of git://git.gitorious.org/smack-next/kernel into ra-nextJames Morris4-114/+150
2013-08-20module/lsm: Have apparmor module parameters work with no argsSteven Rostedt1-0/+2
2013-08-16Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-13/+11
2013-08-14apparmor: add the ability to report a sha1 hash of loaded policyJohn Johansen8-6/+199
2013-08-14apparmor: export set of capabilities supported by the apparmor moduleJohn Johansen4-1/+15
2013-08-14apparmor: add the profile introspection file to interfaceJohn Johansen1-0/+236
2013-08-14apparmor: add an optional profile attachment string for profilesJohn Johansen4-0/+40
2013-08-14apparmor: add interface files for profiles and namespacesJohn Johansen7-29/+436
2013-08-14apparmor: allow setting any profile into the unconfined stateJohn Johansen5-9/+22
2013-08-14apparmor: make free_profile available outside of policy.cJohn Johansen3-7/+7
2013-08-14apparmor: rework namespace free pathJohn Johansen2-35/+10
2013-08-14apparmor: update how unconfined is handledJohn Johansen3-83/+67
2013-08-14apparmor: change how profile replacement update is doneJohn Johansen6-87/+125
2013-08-14apparmor: convert profile lists to RCU based lockingJohn Johansen4-111/+167
2013-08-14apparmor: provide base for multiple profiles to be replaced at onceJohn Johansen4-146/+283
2013-08-14apparmor: add a features/policy dir to interfaceJohn Johansen1-0/+5
2013-08-14apparmor: enable users to query whether apparmor is enabledJohn Johansen1-1/+1
2013-08-14apparmor: remove minimum size check for vmalloc()Tetsuo Handa1-5/+0
2013-08-12Smack: parse multiple rules per write to load2, up to PAGE_SIZE-1 bytesRafal Krypa1-85/+82
2013-08-08cgroup: make css_for_each_descendant() and friends include the origin css in the iterationTejun Heo1-1/+1
2013-08-08cgroup: make hierarchy iterators deal with cgroup_subsys_state instead of cgroupTejun Heo1-8/+3
2013-08-08cgroup: pass around cgroup_subsys_state instead of cgroup in file methodsTejun Heo1-6/+6
2013-08-08cgroup: pass around cgroup_subsys_state instead of cgroup in subsystem methodsTejun Heo1-11/+11
2013-08-08cgroup: add css_parent()Tejun Heo1-13/+5
2013-08-08cgroup: add/update accessors which obtain subsys specific data from cssTejun Heo1-1/+1
2013-08-08cgroup: s/cgroup_subsys_state/cgroup_css/ s/task_subsys_state/task_css/Tejun Heo1-2/+2
2013-08-06Smack: IPv6 casting error fix for 3.11Casey Schaufler1-13/+11
2013-08-01Smack: network label match fixCasey Schaufler3-9/+31
2013-08-01security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski3-9/+37
2013-08-01security: smack: fix memleak in smk_write_rules_list()Tomasz Stanislawski1-22/+11
2013-07-31net: split rt_genid for ipv4 and ipv6fan.du1-1/+6
2013-07-25Add SELinux policy capability for always checking packet and peer classes.Chris PeBenito4-6/+30
2013-07-25selinux: fix problems in netnode when BUG() is compiled outPaul Moore1-0/+2
2013-07-25SELinux: use a helper function to determine seclabelEric Paris1-14/+24
2013-07-25SELinux: pass a superblock to security_fs_useEric Paris3-15/+11
2013-07-25SELinux: do not handle seclabel as a special flagEric Paris2-4/+1
2013-07-25SELinux: change sbsec->behavior to shortEric Paris3-3/+3
2013-07-25SELinux: renumber the superblock optionsEric Paris2-4/+5
2013-07-25SELinux: do all flags twiddling in one placeEric Paris1-7/+5
2013-07-25SELinux: rename SE_SBLABELSUPP to SBLABEL_MNTEric Paris2-15/+15
2013-07-25SELinux: use define for number of bits in the mnt flags maskEric Paris1-1/+4