summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2023-12-23selinux: fix style issues with security/selinux/include/policycap_names.hPaul Moore1-0/+3
2023-12-23selinux: fix style issues in security/selinux/include/policycap.hPaul Moore1-0/+1
2023-12-23selinux: fix style issues in security/selinux/include/objsec.hPaul Moore1-64/+65
2023-12-23selinux: fix style issues with security/selinux/include/netlabel.hPaul Moore1-33/+20
2023-12-23selinux: fix style issues in security/selinux/include/netif.hPaul Moore1-2/+2
2023-12-23selinux: fix style issues in security/selinux/include/ima.hPaul Moore1-1/+1
2023-12-23selinux: fix style issues in security/selinux/include/conditional.hPaul Moore1-2/+2
2023-12-23selinux: fix style issues in security/selinux/include/classmap.hPaul Moore1-210/+132
2023-12-23selinux: fix style issues in security/selinux/include/avc_ss.hPaul Moore1-1/+1
2023-12-23selinux: align avc_has_perm_noaudit() prototype with definitionPaul Moore1-1/+1
2023-12-23selinux: fix style issues in security/selinux/include/avc.hPaul Moore1-26/+15
2023-12-23selinux: fix style issues in security/selinux/include/audit.hPaul Moore1-1/+0
2023-12-21apparmorfs: don't duplicate kfree_link()Al Viro1-6/+1
2023-12-21keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiryDavid Howells4-22/+37
2023-12-21shm: Slim down dependenciesKent Overstreet2-0/+2
2023-12-21kexec_file: print out debugging message if requiredBaoquan He1-2/+2
2023-12-20evm: add support to disable EVM on unsupported filesystemsMimi Zohar1-1/+34
2023-12-20evm: don't copy up 'security.evm' xattrMimi Zohar2-1/+8
2023-12-16cred: get rid of CONFIG_DEBUG_CREDENTIALSJens Axboe1-6/+0
2023-12-12fsnotify: optionally pass access range in file permission hooksAmir Goldstein1-7/+1
2023-12-12fsnotify: split fsnotify_perm() into two hooksAmir Goldstein1-2/+2
2023-12-12io_uring: split out cmd api into a separate headerPavel Begunkov2-2/+2
2023-12-07selinux: remove the wrong comment about multithreaded process handlingMunehisa Kamata1-1/+0
2023-12-05iov_iter: replace import_single_range() with import_ubuf()Jens Axboe1-2/+2
2023-12-05iov_iter: remove unused 'iov' argument from import_single_range()Jens Axboe1-2/+1
2023-11-27KEYS: encrypted: Add check for strsepChen Ni1-0/+4
2023-11-27ima: Remove EXPERIMENTAL from KconfigEric Snowberg1-1/+1
2023-11-27ima: Reword IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARYEric Snowberg1-5/+5
2023-11-26apparmor: cleanup network hook commentsJohn Johansen1-44/+16
2023-11-22selinux: introduce an initial SID for early boot processesOndrej Mosnacek7-2/+76
2023-11-21selinux: refactor avtab_node comparisonsJacob Satterfield1-60/+41
2023-11-19apparmor: add missing params to aa_may_ptrace kernel-doc commentsJohn Johansen1-0/+2
2023-11-19apparmor: declare nulldfa as staticJohn Johansen1-1/+1
2023-11-19apparmor: declare stack_msg as staticJohn Johansen1-1/+1
2023-11-19apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256Dimitri John Ledkov3-17/+17
2023-11-16selinux: update filenametr_hash() to use full_name_hash()Paul Moore1-9/+2
2023-11-16selinux: saner handling of policy reloadsAl Viro1-78/+66
2023-11-13lsm: mark the lsm_id variables are marked as staticPaul Moore9-9/+9
2023-11-13lsm: convert security_setselfattr() to use memdup_user()Paul Moore1-8/+3
2023-11-13lsm: align based on pointer length in lsm_fill_user_ctx()Paul Moore1-1/+1
2023-11-13lsm: consolidate buffer size handling into lsm_fill_user_ctx()Paul Moore4-74/+63
2023-11-13lsm: correct error codes in security_getselfattr()Paul Moore1-2/+2
2023-11-13lsm: cleanup the size counters in security_getselfattr()Paul Moore1-1/+2
2023-11-13lsm: don't yet account for IMA in LSM_CONFIG_COUNT calculationRoberto Sassu1-1/+0
2023-11-13SELinux: Add selfattr hooksCasey Schaufler1-27/+107
2023-11-13AppArmor: Add selfattr hooksCasey Schaufler3-11/+92
2023-11-13Smack: implement setselfattr and getselfattr hooksCasey Schaufler1-5/+90
2023-11-13LSM: Helpers for attribute names and filling lsm_ctxCasey Schaufler2-0/+65
2023-11-13LSM: Create lsm_list_modules system callCasey Schaufler1-0/+39
2023-11-13LSM: syscalls for current process attributesCasey Schaufler3-0/+210