summaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin2014-10-073-7/+1
* integrity: do zero padding of the key idDmitry Kasatkin2014-10-061-1/+1
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2014-10-026-47/+94
|\
| * ima: detect violations for mmaped filesRoberto Sassu2014-09-182-9/+5
| * ima: fix race condition on ima_rdwr_violation_check and process_measurementRoberto Sassu2014-09-181-21/+33
| * ima: added ima_policy_flag variableRoberto Sassu2014-09-174-5/+34
| * ima: return an error code from ima_add_boot_aggregate()Roberto Sassu2014-09-171-6/+15
| * ima: provide 'ima_appraise=log' kernel optionDmitry Kasatkin2014-09-172-2/+5
| * ima: move keyring initialization to ima_init()Dmitry Kasatkin2014-09-172-8/+6
* | Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into nextJames Morris2014-10-015-83/+115
|\ \
| * | selinux: normalize audit log formattingRichard Guy Briggs2014-09-221-6/+8
| * | selinux: cleanup error reporting in selinux_nlmsg_perm()Richard Guy Briggs2014-09-221-4/+3
| * | selinux: make the netif cache namespace awarePaul Moore2014-09-104-36/+46
| * | selinux: register nf hooks with single nf_register_hooks callJiri Pirko2014-09-081-25/+10
| * | selinux: fix a problem with IPv6 traffic denials in selinux_ip_postroute()Paul Moore2014-09-031-0/+1
| * | selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.Stephen Smalley2014-08-281-12/+47
| * | Merge tag 'v3.16' into nextPaul Moore2014-08-0527-175/+490
| |\ \
* | \ \ Merge tag 'keys-next-20140922' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2014-09-2212-71/+82
|\ \ \ \
| * | | | KEYS: Make the key matching functions return boolDavid Howells2014-09-163-8/+8
| * | | | KEYS: Remove key_type::match in favour of overriding default by match_preparseDavid Howells2014-09-169-23/+15
| * | | | KEYS: Remove key_type::def_lookup_typeDavid Howells2014-09-163-9/+5
| * | | | KEYS: Preparse match dataDavid Howells2014-09-167-44/+65
| * | | | Merge tag 'keys-next-fixes-20140916' into keys-nextDavid Howells2014-09-161-2/+2
| |\ \ \ \
| | * | | | KEYS: Fix missing staticsDavid Howells2014-09-161-2/+2
| | | |_|/ | | |/| |
| * | | | Merge tag 'keys-fixes-20140916' into keys-nextDavid Howells2014-09-161-0/+2
| |\ \ \ \ | | |/ / / | |/| | |
| | * | | KEYS: Reinstate EPERM for a key type name beginning with a '.'David Howells2014-09-161-0/+2
* | | | | Merge branch 'smack-for-3.18' of git://git.gitorious.org/smack-next/kernel in...James Morris2014-09-185-274/+520
|\ \ \ \ \ | |/ / / / |/| | | |
| * | | | Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk2014-08-294-255/+233
| * | | | Fix a bidirectional UDS connect check typoLukasz Pawelczyk2014-08-291-2/+2
| * | | | Small fixes in comments describing function parametersLukasz Pawelczyk2014-08-291-9/+9
| * | | | Smack: Bring-up access modeCasey Schaufler2014-08-285-27/+294
| * | | | Smack: Fix setting label on successful file openMarcin Niesluchowski2014-08-251-1/+3
| * | | | Smack: remove unneeded NULL-termination from securtity labelKonstantin Khlebnikov2014-08-081-3/+3
| * | | | Smack: handle zero-length security labels without panicKonstantin Khlebnikov2014-08-082-3/+3
| * | | | Smack: fix behavior of smack_inode_listsecurityKonstantin Khlebnikov2014-08-081-5/+4
| |/ / /
* | | | integrity: make integrity files as 'integrity' moduleDmitry Kasatkin2014-09-091-3/+3
* | | | integrity: base integrity subsystem kconfig options on integrityDmitry Kasatkin2014-09-093-14/+18
* | | | integrity: move asymmetric keys config optionDmitry Kasatkin2014-09-091-12/+12
* | | | ima: initialize only required templateDmitry Kasatkin2014-09-091-24/+4
* | | | ima: remove usage of filename parameterDmitry Kasatkin2014-09-092-14/+10
* | | | ima: remove unnecessary appraisal testDmitry Kasatkin2014-09-091-2/+0
* | | | ima: add missing '__init' keywordsDmitry Kasatkin2014-09-093-5/+3
* | | | ima: remove unnecessary extra variableDmitry Kasatkin2014-09-091-4/+5
* | | | ima: simplify conditional statement to improve performanceDmitry Kasatkin2014-09-091-4/+2
* | | | integrity: remove declaration of non-existing functionsDmitry Kasatkin2014-09-092-10/+0
* | | | integrity: prevent flooding with 'Request for unknown key'Dmitry Kasatkin2014-09-091-2/+3
* | | | ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin2014-09-093-12/+12
* | | | evm: properly handle INTEGRITY_NOXATTRS EVM statusDmitry Kasatkin2014-09-091-0/+7
* | | | ima: provide flag to identify new empty filesDmitry Kasatkin2014-09-083-7/+13
* | | | evm: prevent passing integrity check if xattr read failsDmitry Kasatkin2014-09-081-3/+4