aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/Kconfig23
-rw-r--r--security/apparmor/.kunitconfig5
-rw-r--r--security/apparmor/af_unix.c2
-rw-r--r--security/apparmor/apparmorfs.c288
-rw-r--r--security/apparmor/audit.c2
-rw-r--r--security/apparmor/domain.c60
-rw-r--r--security/apparmor/file.c49
-rw-r--r--security/apparmor/include/audit.h2
-rw-r--r--security/apparmor/include/cred.h100
-rw-r--r--security/apparmor/include/label.h16
-rw-r--r--security/apparmor/include/lib.h49
-rw-r--r--security/apparmor/include/match.h13
-rw-r--r--security/apparmor/include/policy.h42
-rw-r--r--security/apparmor/include/policy_ns.h2
-rw-r--r--security/apparmor/include/policy_unpack.h75
-rw-r--r--security/apparmor/label.c71
-rw-r--r--security/apparmor/lib.c33
-rw-r--r--security/apparmor/lsm.c104
-rw-r--r--security/apparmor/match.c84
-rw-r--r--security/apparmor/net.c6
-rw-r--r--security/apparmor/path.c15
-rw-r--r--security/apparmor/policy.c114
-rw-r--r--security/apparmor/policy_compat.c16
-rw-r--r--security/apparmor/policy_ns.c4
-rw-r--r--security/apparmor/policy_unpack.c399
-rw-r--r--security/apparmor/resource.c5
-rw-r--r--security/apparmor/task.c32
-rw-r--r--security/commoncap.c4
-rw-r--r--security/commoncap_test.c288
-rw-r--r--security/device_cgroup.c2
-rw-r--r--security/inode.c10
-rw-r--r--security/integrity/Makefile1
-rw-r--r--security/integrity/digsig.c10
-rw-r--r--security/integrity/digsig_asymmetric.c63
-rw-r--r--security/integrity/efi_secureboot.c56
-rw-r--r--security/integrity/evm/evm.h3
-rw-r--r--security/integrity/evm/evm_crypto.c21
-rw-r--r--security/integrity/evm/evm_main.c71
-rw-r--r--security/integrity/evm/evm_secfs.c2
-rw-r--r--security/integrity/ima/Kconfig2
-rw-r--r--security/integrity/ima/ima.h35
-rw-r--r--security/integrity/ima/ima_api.c23
-rw-r--r--security/integrity/ima/ima_appraise.c95
-rw-r--r--security/integrity/ima/ima_crypto.c394
-rw-r--r--security/integrity/ima/ima_efi.c53
-rw-r--r--security/integrity/ima/ima_fs.c34
-rw-r--r--security/integrity/ima/ima_kexec.c39
-rw-r--r--security/integrity/ima/ima_main.c59
-rw-r--r--security/integrity/ima/ima_modsig.c8
-rw-r--r--security/integrity/ima/ima_mok.c2
-rw-r--r--security/integrity/ima/ima_policy.c29
-rw-r--r--security/integrity/ima/ima_queue.c6
-rw-r--r--security/integrity/ima/ima_queue_keys.c2
-rw-r--r--security/integrity/ima/ima_template.c13
-rw-r--r--security/integrity/integrity.h15
-rw-r--r--security/integrity/integrity_audit.c2
-rw-r--r--security/integrity/platform_certs/load_uefi.c2
-rw-r--r--security/ipe/audit.c2
-rw-r--r--security/ipe/digest.c3
-rw-r--r--security/ipe/hooks.c2
-rw-r--r--security/ipe/policy.c2
-rw-r--r--security/ipe/policy_parser.c6
-rw-r--r--security/keys/big_key.c2
-rw-r--r--security/keys/encrypted-keys/encrypted.c1
-rw-r--r--security/keys/key.c2
-rw-r--r--security/keys/keyctl.c4
-rw-r--r--security/keys/keyring.c2
-rw-r--r--security/keys/request_key_auth.c2
-rw-r--r--security/keys/trusted-keys/Kconfig8
-rw-r--r--security/keys/trusted-keys/Makefile2
-rw-r--r--security/keys/trusted-keys/trusted_core.c9
-rw-r--r--security/keys/trusted-keys/trusted_pkwm.c190
-rw-r--r--security/keys/trusted-keys/trusted_tee.c17
-rw-r--r--security/keys/trusted-keys/trusted_tpm1.c8
-rw-r--r--security/keys/trusted-keys/trusted_tpm2.c4
-rw-r--r--security/landlock/Makefile11
-rw-r--r--security/landlock/access.h39
-rw-r--r--security/landlock/audit.c82
-rw-r--r--security/landlock/audit.h3
-rw-r--r--security/landlock/cred.c6
-rw-r--r--security/landlock/cred.h14
-rw-r--r--security/landlock/domain.c53
-rw-r--r--security/landlock/domain.h5
-rw-r--r--security/landlock/errata/abi-1.h8
-rw-r--r--security/landlock/errata/abi-4.h7
-rw-r--r--security/landlock/errata/abi-6.h12
-rw-r--r--security/landlock/fs.c521
-rw-r--r--security/landlock/id.c2
-rw-r--r--security/landlock/limits.h4
-rw-r--r--security/landlock/net.c148
-rw-r--r--security/landlock/object.c2
-rw-r--r--security/landlock/ruleset.c115
-rw-r--r--security/landlock/ruleset.h8
-rw-r--r--security/landlock/syscalls.c96
-rw-r--r--security/landlock/task.c30
-rw-r--r--security/landlock/tsync.c619
-rw-r--r--security/landlock/tsync.h16
-rw-r--r--security/loadpin/loadpin.c40
-rw-r--r--security/lsm.h10
-rw-r--r--security/lsm_audit.c10
-rw-r--r--security/lsm_init.c16
-rw-r--r--security/min_addr.c5
-rw-r--r--security/safesetid/securityfs.c6
-rw-r--r--security/security.c125
-rw-r--r--security/selinux/avc.c2
-rw-r--r--security/selinux/hooks.c464
-rw-r--r--security/selinux/ibpkey.c2
-rw-r--r--security/selinux/include/classmap.h2
-rw-r--r--security/selinux/include/objsec.h18
-rw-r--r--security/selinux/include/policycap.h1
-rw-r--r--security/selinux/include/policycap_names.h1
-rw-r--r--security/selinux/include/security.h6
-rw-r--r--security/selinux/netif.c2
-rw-r--r--security/selinux/netnode.c2
-rw-r--r--security/selinux/netport.c2
-rw-r--r--security/selinux/selinuxfs.c22
-rw-r--r--security/selinux/ss/conditional.c22
-rw-r--r--security/selinux/ss/hashtab.c6
-rw-r--r--security/selinux/ss/policydb.c69
-rw-r--r--security/selinux/ss/services.c14
-rw-r--r--security/selinux/ss/sidtab.c2
-rw-r--r--security/selinux/xfrm.c4
-rw-r--r--security/smack/smack_access.c4
-rw-r--r--security/smack/smack_lsm.c26
-rw-r--r--security/smack/smackfs.c85
-rw-r--r--security/tomoyo/Makefile2
-rw-r--r--security/tomoyo/audit.c12
-rw-r--r--security/tomoyo/common.c58
-rw-r--r--security/tomoyo/common.h79
-rw-r--r--security/tomoyo/condition.c6
-rw-r--r--security/tomoyo/domain.c12
-rw-r--r--security/tomoyo/environ.c1
-rw-r--r--security/tomoyo/file.c5
-rw-r--r--security/tomoyo/gc.c28
-rw-r--r--security/tomoyo/mount.c2
-rw-r--r--security/tomoyo/network.c3
-rw-r--r--security/yama/yama_lsm.c4
137 files changed, 4209 insertions, 1993 deletions
diff --git a/security/Kconfig b/security/Kconfig
index 285f284dfcac..f7bf6cdc6229 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -21,16 +21,14 @@ config SECURITY_DMESG_RESTRICT
choice
prompt "Allow /proc/pid/mem access override"
- default PROC_MEM_ALWAYS_FORCE
+ default PROC_MEM_FORCE_PTRACE
help
Traditionally /proc/pid/mem allows users to override memory
permissions for users like ptrace, assuming they have ptrace
capability.
This allows people to limit that - either never override, or
- require actual active ptrace attachment.
-
- Defaults to the traditional behavior (for now)
+ require actual active ptrace attachment (default).
config PROC_MEM_ALWAYS_FORCE
bool "Traditional /proc/pid/mem behavior"
@@ -284,6 +282,23 @@ config LSM
If unsure, leave this as the default.
+config SECURITY_COMMONCAP_KUNIT_TEST
+ bool "Build KUnit tests for commoncap" if !KUNIT_ALL_TESTS
+ depends on KUNIT=y && USER_NS
+ default KUNIT_ALL_TESTS
+ help
+ This builds the commoncap KUnit tests.
+
+ KUnit tests run during boot and output the results to the debug log
+ in TAP format (https://testanything.org/). Only useful for kernel devs
+ running KUnit test harness and are not for inclusion into a
+ production build.
+
+ For m