summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | ima: Store the measurement again when appraising a modsigThiago Jung Bauermann2019-08-054-7/+47
| * | | | | ima: Define ima-modsig templateThiago Jung Bauermann2019-08-058-6/+156
| * | | | | ima: Collect modsigThiago Jung Bauermann2019-08-055-5/+60
| * | | | | ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-058-23/+209
| * | | | | ima: Factor xattr_verify() out of ima_appraise_measurement()Thiago Jung Bauermann2019-08-051-60/+81
| * | | | | ima: Add modsig appraise_type option for module-style appended signaturesThiago Jung Bauermann2019-08-056-2/+62
| * | | | | integrity: Select CONFIG_KEYS instead of depending on itThiago Jung Bauermann2019-08-051-1/+1
| * | | | | ima: initialize the "template" field with the default templateMimi Zohar2019-08-011-2/+4
* | | | | | KEYS: trusted: correctly initialize digests and fix locking issueRoberto Sassu2019-09-251-0/+5
* | | | | | Merge tag 'smack-for-5.4-rc1' of git://github.com/cschaufler/smack-nextLinus Torvalds2019-09-232-23/+23
|\ \ \ \ \ \
| * | | | | | smack: use GFP_NOFS while holding inode_smack::smk_lockEric Biggers2019-09-042-4/+4
| * | | | | | security: smack: Fix possible null-pointer dereferences in smack_socket_sock_...Jia-Ju Bai2019-09-041-0/+2
| * | | | | | smack: fix some kernel-doc notationsluanshi2019-09-041-18/+15
| * | | | | | Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is setJann Horn2019-09-041-1/+2
| | |/ / / / | |/| | | |
* | | | | | Merge tag 'safesetid-bugfix-5.4' of git://github.com/micah-morton/linuxLinus Torvalds2019-09-231-1/+2
|\ \ \ \ \ \
| * | | | | | LSM: SafeSetID: Stop releasing uninitialized rulesetMicah Morton2019-09-171-1/+2
| | |/ / / / | |/| | | |
* | | | | | Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-09-2312-296/+346
|\ \ \ \ \ \ | | |_|/ / / | |/| | | |
| * | | | | selinux: fix residual uses of current_security() for the SELinux blobStephen Smalley2019-09-042-11/+11
| * | | | | selinux: avoid atomic_t usage in sidtabOndrej Mosnacek2019-08-272-32/+35
| * | | | | fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel2019-08-123-2/+56
| * | | | | selinux: always return a secid from the network caches if we find onePaul Moore2019-08-053-47/+38
| * | | | | selinux: policydb - rename type_val_to_struct_arrayOndrej Mosnacek2019-08-053-11/+11
| * | | | | selinux: policydb - fix some checkpatch.pl warningsOndrej Mosnacek2019-08-051-4/+8
| * | | | | selinux: shuffle around policydb.c to get rid of forward declarationsPaul Moore2019-08-051-189/+187
* | | | | | keys: Fix missing null pointer check in request_key_auth_describe()Hillf Danton2019-09-051-0/+6
* | | | | | keys: ensure that ->match_free() is called in request_key_and_link()Eric Biggers2019-08-301-1/+1
* | | | | | KEYS: trusted: allow module init if TPM is inactive or deactivatedRoberto Sassu2019-08-131-13/+0
| |_|_|/ / |/| | | |
* | | | | Merge tag 'selinux-pr-20190801' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-08-021-1/+5
|\| | | | | |/ / / |/| | |
| * | | selinux: fix memory leak in policydb_init()Ondrej Mosnacek2019-07-311-1/+5
* | | | Merge tag 'meminit-v5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-07-281-0/+7
|\ \ \ \
| * | | | structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACKArnd Bergmann2019-07-251-0/+7
* | | | | Merge tag 'selinux-pr-20190726' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-07-261-0/+5
|\ \ \ \ \ | | |/ / / | |/| | |
| * | | | selinux: check sidtab limit before adding a new entryOndrej Mosnacek2019-07-241-0/+5
* | | | | Merge branch 'work.mount0' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-07-194-28/+67
|\ \ \ \ \
| * | | | | vfs: Convert smackfs to use the new mount APIDavid Howells2019-07-041-12/+22
| * | | | | vfs: Convert selinuxfs to use the new mount APIDavid Howells2019-07-041-5/+15
| * | | | | vfs: Convert securityfs to use the new mount APIDavid Howells2019-07-041-6/+15
| * | | | | vfs: Convert apparmorfs to use the new mount APIDavid Howells2019-07-041-5/+15
* | | | | | proc/sysctl: add shared variables for range checkMatteo Croce2019-07-183-20/+15
* | | | | | Merge tag 'docs/v5.3-1' of git://git.kernel.org/pub/scm/linux/kernel/git/mche...Linus Torvalds2019-07-162-2/+2
|\ \ \ \ \ \
| * | | | | | docs: cgroup-v1: add it to the admin-guide bookMauro Carvalho Chehab2019-07-151-1/+1
| * | | | | | docs: x86: move two x86-specific files to x86 arch dirMauro Carvalho Chehab2019-07-151-1/+1
* | | | | | | LSM: SafeSetID: fix use of literal -1 in capable hookJann Horn2019-07-151-1/+1
* | | | | | | LSM: SafeSetID: verify transitive constrainednessJann Horn2019-07-151-1/+37
* | | | | | | LSM: SafeSetID: add read handlerJann Horn2019-07-152-4/+32
* | | | | | | LSM: SafeSetID: rewrite userspace API to atomic updatesJann Horn2019-07-153-158/+144
* | | | | | | LSM: SafeSetID: fix userns handling in securityfsJann Horn2019-07-151-3/+3
* | | | | | | LSM: SafeSetID: refactor policy parsingJann Horn2019-07-151-51/+33
* | | | | | | LSM: SafeSetID: refactor safesetid_security_capable()Jann Horn2019-07-151-15/+26
* | | | | | | LSM: SafeSetID: refactor policy hash tableJann Horn2019-07-152-44/+37