summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* selinux: fix GPF on invalid policyStephen Smalley2019-01-221-1/+2
* LSM: Check for NULL cred-security on freeJames Morris2019-01-221-0/+7
* Yama: Check for pid death before checking ancestryKees Cook2019-01-221-1/+3
* selinux: policydb - fix byte order and alignment issuesOndrej Mosnacek2019-01-131-15/+36
* KEYS: fix parsing invalid pkey info stringEric Biggers2019-01-091-0/+2
* ima: cleanup the match_token policy codeMimi Zohar2018-12-171-5/+5
* security: don't use a negative Opt_err token indexLinus Torvalds2018-12-172-2/+2
* Merge tag 'selinux-pr-20181129' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2018-11-291-1/+12
|\
| * selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAINPaul Moore2018-11-291-1/+12
* | Merge tag 'selinux-pr-20181115' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2018-11-152-3/+10
|\|
| * selinux: fix non-MLS handling in mls_context_to_sid()Paul Moore2018-11-131-3/+7
| * selinux: check length properly in SCTP bind hookOndrej Mosnacek2018-11-131-0/+3
* | integrity: support new struct public_key_signature encoding fieldMimi Zohar2018-11-131-0/+1
* | Merge tag 'apparmor-pr-2018-11-01' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2018-11-0212-17/+291
|\ \
| * | apparmor: clean an indentation issue, remove extraneous spaceColin Ian King2018-11-011-1/+1
| * | apparmor: fix checkpatch error in Parse secmark policyJohn Johansen2018-11-011-1/+1
| * | apparmor: add #ifdef checks for secmark filteringArnd Bergmann2018-10-122-0/+12
| * | apparmor: Fix uninitialized value in aa_split_fqnameZubin Mithra2018-10-031-2/+4
| * | apparmor: don't try to replace stale label in ptraceme checkJann Horn2018-10-031-2/+2
| * | apparmor: Replace spin_is_locked() with lockdepLance Roy2018-10-031-1/+1
| * | apparmor: Allow filtering based on secmark policyMatthew Garrett2018-10-032-1/+177
| * | apparmor: Parse secmark policyMatthew Garrett2018-10-034-0/+77
| * | apparmor: Add a wildcard secidMatthew Garrett2018-10-032-2/+4
| * | apparmor: don't try to replace stale label in ptrace access checkJann Horn2018-09-132-2/+4
| * | apparmor: Fix network performance issue in aa_label_sk_permTony Jones2018-09-071-6/+9
* | | KEYS: Move trusted.h to include/keys [ver #2]Denis Kenzior2018-10-262-137/+1
* | | KEYS: trusted: Expose common functionality [ver #2]Denis Kenzior2018-10-262-5/+21
* | | KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]David Howells2018-10-265-0/+405
* | | Merge branch 'next-loadpin' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-252-13/+17
|\ \ \
| * \ \ Merge tag 'loadpin-security-next' of https://git.kernel.org/pub/scm/linux/ker...James Morris2018-10-182-13/+17
| |\ \ \
| | * | | LoadPin: Rename boot param "enabled" to "enforce"Kees Cook2018-10-182-12/+13
| | * | | LoadPin: Report friendly block device nameKees Cook2018-10-181-1/+4
* | | | | Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds2018-10-252-7/+11
|\ \ \ \ \
| * | | | | Smack: Mark expected switch fall-throughGustavo A. R. Silva2018-09-181-1/+1
| * | | | | Smack: ptrace capability use fixesCasey Schaufler2018-09-181-3/+10
| * | | | | Smack: remove set but not used variable 'root_inode'YueHaibing2018-09-181-3/+0
* | | | | | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-10-259-43/+54
|\ \ \ \ \ \
| * | | | | | ima: open a new file instance if no read permissionsGoldwyn Rodrigues2018-10-101-20/+34
| * | | | | | ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-10-101-3/+3
| * | | | | | security/integrity: remove unnecessary 'init_keyring' variableEric Biggers2018-10-101-7/+1
| * | | | | | security/integrity: constify some read-only dataEric Biggers2018-10-108-13/+16
| |/ / / / /
* | | | | | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-248-25/+50
|\ \ \ \ \ \ | | |/ / / / | |/| | | |
| * | | | | LSM: Don't ignore initialization failuresKees Cook2018-10-101-1/+3
| * | | | | LSM: Provide init debugging infrastructureKees Cook2018-10-101-0/+18
| * | | | | LSM: Record LSM name in struct lsm_infoKees Cook2018-10-105-0/+5
| * | | | | LSM: Convert security_initcall() into DEFINE_LSM()Kees Cook2018-10-105-5/+15
| * | | | | LSM: Convert from initcall to struct lsm_infoKees Cook2018-10-102-9/+6
| * | | | | LSM: Remove initcall tracingKees Cook2018-10-101-7/+1
| * | | | | LSM: Rename .security_initcall section to .lsm_infoKees Cook2018-10-101-2/+2
| * | | | | LSM: Correctly announce start of LSM initializationKees Cook2018-10-101-1/+2
| |/ / / /