Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem updates from James Morris: "The main change in this kernel is Casey's generalized LSM stacking work, which removes the hard-coding of Capabilities and Yama stacking, allowing multiple arbitrary "small" LSMs to be stacked with a default monolithic module (e.g. SELinux, Smack, AppArmor). See https://lwn.net/Articles/636056/ This will allow smaller, simpler LSMs to be incorporated into the mainline kernel and arbitrarily stacked by users. Also, this is a useful cleanup of the LSM code in its own right" * 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (38 commits) tpm, tpm_crb: fix le64_to_cpu conversions in crb_acpi_add() vTPM: set virtual device before passing to ibmvtpm_reset_crq tpm_ibmvtpm: remove unneccessary message level. ima: update builtin policies ima: extend "mask" policy matching support ima: add support for new "euid" policy condition ima: fix ima_show_template_data_ascii() Smack: freeing an error pointer in smk_write_revoke_subj() selinux: fix setting of security labels on NFS selinux: Remove unused permission definitions selinux: enable genfscon labeling for sysfs and pstore files selinux: enable per-file labeling for debugfs files. selinux: update netlink socket classes signals: don't abuse __flush_signals() in selinux_bprm_committed_creds() selinux: Print 'sclass' as string when unrecognized netlink message occurs Smack: allow multiple labels in onlycap Smack: fix seq operations in smackfs ima: pass iint to ima_add_violation() ima: wrap event related data to the new ima_event_data structure integrity: add validity checks for 'path' parameter ...
Showing
- Documentation/ABI/testing/ima_policy 19 additions, 7 deletionsDocumentation/ABI/testing/ima_policy
- Documentation/kernel-parameters.txt 10 additions, 2 deletionsDocumentation/kernel-parameters.txt
- Documentation/security/Smack.txt 3 additions, 3 deletionsDocumentation/security/Smack.txt
- crypto/asymmetric_keys/asymmetric_keys.h 3 additions, 0 deletionscrypto/asymmetric_keys/asymmetric_keys.h
- crypto/asymmetric_keys/asymmetric_type.c 14 additions, 6 deletionscrypto/asymmetric_keys/asymmetric_type.c
- crypto/asymmetric_keys/x509_public_key.c 18 additions, 5 deletionscrypto/asymmetric_keys/x509_public_key.c
- drivers/char/tpm/tpm_crb.c 2 additions, 2 deletionsdrivers/char/tpm/tpm_crb.c
- drivers/char/tpm/tpm_ibmvtpm.c 3 additions, 2 deletionsdrivers/char/tpm/tpm_ibmvtpm.c
- drivers/char/tpm/tpm_of.c 1 addition, 1 deletiondrivers/char/tpm/tpm_of.c
- fs/xattr.c 5 additions, 5 deletionsfs/xattr.c
- include/linux/lsm_hooks.h 1888 additions, 0 deletionsinclude/linux/lsm_hooks.h
- include/linux/sched.h 0 additions, 1 deletioninclude/linux/sched.h
- include/linux/security.h 4 additions, 1619 deletionsinclude/linux/security.h
- kernel/signal.c 4 additions, 9 deletionskernel/signal.c
- security/Makefile 1 addition, 1 deletionsecurity/Makefile
- security/apparmor/domain.c 4 additions, 8 deletionssecurity/apparmor/domain.c
- security/apparmor/lsm.c 54 additions, 77 deletionssecurity/apparmor/lsm.c
- security/capability.c 0 additions, 1158 deletionssecurity/capability.c
- security/commoncap.c 33 additions, 8 deletionssecurity/commoncap.c
- security/integrity/digsig.c 1 addition, 1 deletionsecurity/integrity/digsig.c
Loading
Please register or sign in to comment